Research Article

Frame Duplication Forgery Detection and Localization Algorithm Based on the Improved Levenshtein Distance

Figure 2

The process of frame duplication attack: an example. (a) The original video sequences. (b) The tampered video sequences.
(a)
(b)