{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:41:31Z","timestamp":1762508491288,"version":"build-2065373602"},"reference-count":37,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R\\&amp;D Program Special Fund Grant","award":["No. 2018YFC1505805"],"award-info":[{"award-number":["No. 2018YFC1505805"]}]},{"name":"Natural Science Foundation of China","award":["No. 62072106, No. 61070062"],"award-info":[{"award-number":["No. 62072106, No. 61070062"]}]},{"name":"General Project of Natural Science Foundation in Fujian Province","award":["No. 2020J01168"],"award-info":[{"award-number":["No. 2020J01168"]}]},{"name":"Open project of Fujian Key Laboratory of Severe Weather","award":["No. 2020KFKT04"],"award-info":[{"award-number":["No. 2020KFKT04"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Digital video forensics plays a vital role in judicial forensics, media reports, e-commerce, finance, and public security. Although many methods have been developed, there is currently no efficient solution to real-life videos with illumination noises and jitter noises. To solve this issue, we propose a detection method that adapts to brightness and jitter for video inter-frame forgery. For videos with severe brightness changes, we relax the brightness constancy constraint and adopt intensity normalization to propose a new optical flow algorithm. For videos with large jitter noises, we introduce motion entropy to detect the jitter and extract the stable feature of texture changes fraction for double-checking. Experimental results show that, compared with previous algorithms, the proposed method is more accurate and robust for videos with significant brightness variance or videos with heavy jitter on public benchmark datasets.<\/jats:p>","DOI":"10.3390\/s21123953","type":"journal-article","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T21:16:58Z","timestamp":1623187018000},"page":"3953","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Overcome the Brightness and Jitter Noises in Video Inter-Frame Tampering Detection"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4088-5494","authenticated-orcid":false,"given":"Han","family":"Pu","sequence":"first","affiliation":[{"name":"School of Mathematics and Information, Fujian Normal University, Fuzhou 350007, China"}]},{"given":"Tianqiang","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Mathematics and Information, Fujian Normal University, Fuzhou 350007, China"},{"name":"Digital Fujian Institute of Big Data Security Technology, Fujian Normal University, Fuzhou 350007, China"},{"name":"Engineering Technology Research Center for Public Service Big Data Mining and Application of Fujian Province, Fujian Normal University, Fuzhou 350007, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1291-0154","authenticated-orcid":false,"given":"Bin","family":"Weng","sequence":"additional","affiliation":[{"name":"School of Mathematics and Information, Fujian Normal University, Fuzhou 350007, China"},{"name":"Digital Fujian Institute of Big Data Security Technology, Fujian Normal University, Fuzhou 350007, China"},{"name":"Engineering Technology Research Center for Public Service Big Data Mining and Application of Fujian Province, Fujian Normal University, Fuzhou 350007, China"}]},{"given":"Feng","family":"Ye","sequence":"additional","affiliation":[{"name":"School of Mathematics and Information, Fujian Normal University, Fuzhou 350007, China"},{"name":"Digital Fujian Institute of Big Data Security Technology, Fujian Normal University, Fuzhou 350007, China"},{"name":"Engineering Technology Research Center for Public Service Big Data Mining and Application of Fujian Province, Fujian Normal University, Fuzhou 350007, China"}]},{"given":"Chenbin","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,6,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s00530-017-0538-9","article-title":"Aggarwal, A. Video content authentication techniques: A comprehensive survey","volume":"24","author":"Singh","year":"2017","journal-title":"Multimed. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Zheng, L., Sun, T., and Shi, Y.-Q. (2014, January 1\u20134). Inter-Frame Video Forgery Detection Based on Block-Wise Brightness Variance Descriptor. Proceedings of the IWDW 2014: Digital-Forensics and Watermarking, Taipei, Taiwan.","DOI":"10.1007\/978-3-319-19321-2_2"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"25767","DOI":"10.1007\/s11042-017-4762-2","article-title":"Inter-frame forgery detection in H.264 videos using motion and brightness gradients","volume":"76","author":"Kingra","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_4","first-page":"235","article-title":"Video Frame Interpolation Tamper Detection Based on Illumination Information","volume":"40","author":"Wu","year":"2014","journal-title":"Comput. Eng."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Wang, W., Jiang, X., Wang, S., Wan, M., and Sun, T. (2013, January 1\u20134). Identifying Video Forgery Process Using Optical Flow. In Proceeding of the IWDW 2013: Digital-Forensics and Watermarking, Auckland, New Zealand.","DOI":"10.1007\/978-3-662-43886-2_18"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"25323","DOI":"10.1109\/ACCESS.2018.2819624","article-title":"Coarse-to-fine copy-move forgery detection for video forensics","volume":"6","author":"Jia","year":"2018","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1145\/212094.212141","article-title":"The computation of optical flow","volume":"27","author":"Beauchemin","year":"1995","journal-title":"ACM Comput. Surv."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/0004-3702(81)90024-2","article-title":"Determining Optical Flow","volume":"17","author":"Horn","year":"1981","journal-title":"Artif. Intell."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s00530-015-0478-1","article-title":"Exposing video inter-frame forgery by Zernike opponent chromaticity moments and coarseness analysis","volume":"23","author":"Liu","year":"2017","journal-title":"Multimed. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Sun, T., Wang, W., and Jiang, X. (2012, January 25\u201330). Exposing video forgeries by detecting MPEG double compression. Proceedings of the 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan.","DOI":"10.1109\/ICASSP.2012.6288150"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"063010","DOI":"10.1117\/1.JEI.28.6.063010","article-title":"Low rank theory-based inter-frame forgery detection for blurry video","volume":"28","author":"Lin","year":"2019","journal-title":"J. Electron. Imaging"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Liao, S.-Y., and Huang, T.-Q. (2014). Video copy-move forgery detection and localization based on Tamura texture features. International Congress on Image & Signal Processing, IEEE.","DOI":"10.1109\/CISP.2013.6745286"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2543","DOI":"10.1109\/TCSVT.2016.2593612","article-title":"Motion-adaptive frame deletion detection for digital video forensics","volume":"27","author":"Feng","year":"2016","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_14","unstructured":"Gennert, M.A., and Negahdaripour, S. (1987). Relaxing the Brightness Constancy Assumption in Computing Optical Flow, Massachusetts Inst. of Tech. Cambridge Artificial Intelligence Lab."},{"key":"ref_15","unstructured":"Kapulla, R., Hoang, P., Szijarto, R., and Fokken, J. (2011, January 6\u20138). Parameter sensitivity of optical flow applied to PIV Images. Proceedings of the Fachtagung \u201cLasermethoden in der Str\u00f6mungsmesstechnik\u201d, Ilmenau, Germany."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"25389","DOI":"10.1007\/s11042-018-5791-1","article-title":"Inter-frame passive-blind forgery detection for video shot based on similarity analysis","volume":"77","author":"Zhao","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","first-page":"84","article-title":"Video-frame insertion and deletion detection based on consistency of quotients of MSSIM","volume":"38","author":"Zhang","year":"2015","journal-title":"J. Beijing Univ. Posts Telecommun"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Su, Y., Zhang, J., and Liu, J. (2009, January 11\u201313). Exposing digital video forgery by detecting motion-compensated edge artifac. Proceedings of the 2009 International Conference on Computational Intelligence and Software Engineering, Wuhan, China.","DOI":"10.1109\/CISE.2009.5366884"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, S., and Bian, S. (2014, January 5\u20138). Detecting Frame Deletion in H.264 Video. Proceedings of the 10th International Conference, ISPEC 2014, Fuzhou, China.","DOI":"10.1007\/978-3-319-06320-1_20"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"20691","DOI":"10.1007\/s11042-016-4004-z","article-title":"Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects","volume":"76","author":"Aghamaleki","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Su, Y., and Xu, J. (2010, January 22\u201323). Detection of double-compression in MPEG-2 videos. Proceedings of the 2010 2nd International Workshop on Intelligent Systems and Applications, Wuhan, China.","DOI":"10.1109\/IWISA.2010.5473474"},{"key":"ref_22","first-page":"243","article-title":"Moving object tracking using gaussian mixture model and optical flow","volume":"3","author":"Chauhan","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/0004-3702(87)90041-5","article-title":"On the estimation of optical flow: Relations between different approaches and some new results","volume":"33","author":"Nagel","year":"1987","journal-title":"Artif. Intell."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1109\/34.24783","article-title":"Optical flow with an intensity-weighted smoothing","volume":"11","author":"Aisbett","year":"1989","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_25","unstructured":"Deng, G., and Cahill, L. (November, January 31). An adaptive Gaussian filter for noise reduction and edge detection. Proceedings of the 1993 IEEE Conference Record Nuclear Science Symposium and Medical Imaging Conference, San Francisco, CA, USA."},{"key":"ref_26","unstructured":"Feng, C. (2015). Study on Motion-Adaptive Frame Deletion Detection for Digital Video Forensics, Wuhan University."},{"key":"ref_27","first-page":"1559","article-title":"Motion detection based on frame difference method","volume":"4","author":"Singla","year":"2014","journal-title":"Int. J. Inf. Comput. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ramakrishnan, N., Wu, M., Lam, S.-K., and Srikanthan, T. (2014, January 14-17). Automated thresholding for low-complexity corner detection. Proceedings of the 2014 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS), Leicester, UK.","DOI":"10.1109\/AHS.2014.6880164"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11263-010-0390-2","article-title":"A database and evaluation methodology for optical flow","volume":"92","author":"Baker","year":"2011","journal-title":"Int. J. Comput. Vis."},{"key":"ref_30","first-page":"1","article-title":"Reproduction angular error: An improved performance metric for illuminant estimation","volume":"310","author":"Finlayson","year":"2014","journal-title":"Perception"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1637","DOI":"10.1016\/S0021-9290(96)80018-2","article-title":"Endpoint error in smoothing and differentiating raw kinematic data: An evaluation of four popular methods","volume":"29","author":"Vint","year":"1996","journal-title":"J. Biomech."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Qadir, G., Yahaya, S., and Ho, A.T. (2012, January 3\u20134). Surrey university library for forensic analysis (SULFA) of video content. Proceedings of the IET Conference on Image Processing, London, UK.","DOI":"10.1049\/cp.2012.0422"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Goyette, N., Jodoin, P.-M., Porikli, F., Konrad, J., and Ishwar, P. (2012, January 16\u201321). Changedetection. net: A new change detection benchmark dataset. Proceedings of the 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, Providence, RI, USA.","DOI":"10.1109\/CVPRW.2012.6238919"},{"key":"ref_34","first-page":"57","article-title":"Construction and Evaluation of Video Forgery Detection Database","volume":"45","author":"Hu","year":"2017","journal-title":"J. S. China Univ. Technol."},{"key":"ref_35","unstructured":"Jia, S., Feng, C., Xu, Z., Xu, Y., and Wang, T. ACE algorithm in the application of video forensics. Proceedings of Multimedia, Communication and Computing Application: Proceedings of the 2014 International Conference on Multimedia, Communication and Computing Application (MCCA 2014), Xiamen, China, 16\u201317 October 2014."},{"key":"ref_36","first-page":"61","article-title":"The data flow anomaly detection analysis based on Lip\u2013Chebyshev method","volume":"18","author":"He","year":"2009","journal-title":"Comput. Syst. Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1016\/j.cose.2018.04.013","article-title":"A multi-channel approach through fusion of audio for detecting video inter-frame forgery","volume":"77","author":"Huang","year":"2018","journal-title":"Comput. Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/12\/3953\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:12:05Z","timestamp":1760163125000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/12\/3953"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,8]]},"references-count":37,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,6]]}},"alternative-id":["s21123953"],"URL":"https:\/\/doi.org\/10.3390\/s21123953","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,6,8]]}}}