[1] 谌志鹏, 邹建成. 基于对象的抗几何攻击的视频水印算法[J]. 北京邮电大学学报, 2012, 35(4): 33-37. Chen Zhipeng, Zou Jiancheng. Object based watermarking algorithm robust to geometric transformation attacks[J]. Journal of Beijing University of Posts and Telecommunications, 2012, 35(4): 33-37.[2] Wang Weihong, Farid H. Exposing digital forgeries in video by detecting double MPEG compression[C]//MM and Sec ACM (2006). New York: [s.n.], 2006: 37-47.[3] Stamm M C, Sabrinalin W, Rayliu K J. Temporal forensics and anti-forensics for motion compensated video[J]. IEEE Trans on IFS, 2012, 7(4): 1315-1329.[4] Feng Chunhui, Xu Zhengquan, Zhang Wenting, et al. Automatic location of frame deletion point for digital video forensics [C]//IH & MMSec 2014. Salzburg: [s.n.], 2014: 171-179.[5] 黄添强, 陈智文, 苏立超, 等. 利用内容连续性的数字视频篡改检测[J]. 南京大学学报(自然科学), 2011, 47(5): 493-503. Huang Tianqiang, Chen Zhiwen, Su Lichao, et al. Digital video forgeries detection based on content continuity[J]. Journal of Nanjing University (Natural Science), 2011, 47(5): 493-503.[6] Chao Juan, Jiang Xinghao, Sun Tanfeng. A novel video inter-frame forgery model detection scheme based on optical flow consistency[C]//Lecture Notes in Computer Science (2013). Berlin: Spring, 2013: 267-281.[7] Zhang Zhenzhen, Hou Jianjun, Ma Qinglong, et al. Efficient video-frame insertion and deletion detection based on inconsistency of correlations between LBP-coded frames[J]. Security & Communication Networks, 2015, 8(2): 311-320.[8] Wang Zhou, Bovik A C, Sheikh H M, et al. Image quality assessment: from error visibility to structural similarity[J]. IEEE Trans on Image Processing, 2004, 13(4): 600-612. |