|
Algorithm 1: Reduce the impact of illumination changes |
|
as threshold selected for peak point,
|
|
. |
| Output: store position of suspicious tampering point in S.
|
|
, C = 0 //C is the variable counter for peak point |
|
do
|
|
|
|
then
|
|
|
|
| 7: end if
|
| 8: end for
|
|
|
| 11: (a) return FORGED VIDEO
|
|
| 14: else run Algorithm 2
|
| 15: end if
|
| 16:else return ORIGINAL VIDEO
|
| 17:end if
|