Research Article
Frame Duplication Forgery Detection and Localization Algorithm Based on the Improved Levenshtein Distance
Figure 2
The process of frame duplication attack: an example. (a) The original video sequences. (b) The tampered video sequences.
| (a) |
| (b) |