Research Article
Frame Duplication Forgery Detection and Localization Algorithm Based on the Improved Levenshtein Distance
Figure 2
The process of frame duplication attack: an example. (a) The original video sequences. (b) The tampered video sequences.
(a) |
(b) |