{"id":"https://openalex.org/W4414070894","doi":"https://doi.org/10.32604/cmc.2025.069129","title":"A Comprehensive Review on File Containers-Based Image and Video Forensics","display_name":"A Comprehensive Review on File Containers-Based Image and Video Forensics","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414070894","doi":"https://doi.org/10.32604/cmc.2025.069129"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.069129","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.069129","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.069129","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102823241","display_name":"Pengpeng Yang","orcid":"https://orcid.org/0000-0002-4655-8291"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pengpeng Yang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066436978","display_name":"Chen Zhou","orcid":"https://orcid.org/0009-0006-6739-8430"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen Zhou","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085854897","display_name":"Dasara Shullani","orcid":"https://orcid.org/0000-0003-2753-366X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dasara Shullani","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Lanxi Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lanxi Liu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5011507764","display_name":"Daniele Baracchi","orcid":"https://orcid.org/0000-0002-7364-1955"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daniele Baracchi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102823241"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22138254,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"2","first_page":"2487","last_page":"2526"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.609499990940094},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.5379999876022339},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46540001034736633},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.43479999899864197},{"id":"https://openalex.org/keywords/image-editing","display_name":"Image editing","score":0.3400999903678894},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.31949999928474426},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.28859999775886536}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7885000109672546},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.609499990940094},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.5379999876022339},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4936999976634979},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46540001034736633},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.43479999899864197},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40149998664855957},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.35989999771118164},{"id":"https://openalex.org/C2776674983","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image editing","level":3,"score":0.3400999903678894},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.31949999928474426},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.31470000743865967},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.296099990606308},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.28859999775886536},{"id":"https://openalex.org/C171906077","wikidata":"https://www.wikidata.org/wiki/Q1360677","display_name":"Crime scene","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.27219998836517334},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2646999955177307},{"id":"https://openalex.org/C3018587665","wikidata":"https://www.wikidata.org/wiki/Q7268696","display_name":"Qualitative analysis","level":3,"score":0.2630000114440918},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C2988634675","wikidata":"https://www.wikidata.org/wiki/Q34508","display_name":"Video recording","level":2,"score":0.25760000944137573},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.069129","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.069129","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.069129","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.069129","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1983586459","https://openalex.org/W2021655674","https://openalex.org/W2040903332","https://openalex.org/W2056132907","https://openalex.org/W2081326817","https://openalex.org/W2116380715","https://openalex.org/W2135480257","https://openalex.org/W2149706766","https://openalex.org/W2284026552","https://openalex.org/W2437771197","https://openalex.org/W2560026874","https://openalex.org/W2762911267","https://openalex.org/W2773666902","https://openalex.org/W2887134435","https://openalex.org/W2911964244","https://openalex.org/W2942374856","https://openalex.org/W2949140057","https://openalex.org/W2978675624","https://openalex.org/W3005430906","https://openalex.org/W3006891130","https://openalex.org/W3010352349","https://openalex.org/W3021715071","https://openalex.org/W3034530968","https://openalex.org/W3042005979","https://openalex.org/W3142599389","https://openalex.org/W3164725880","https://openalex.org/W3186914719","https://openalex.org/W3187944112","https://openalex.org/W4210738268","https://openalex.org/W4213423307","https://openalex.org/W4281703385","https://openalex.org/W4294643307","https://openalex.org/W4297498506","https://openalex.org/W4386453505","https://openalex.org/W4391777562","https://openalex.org/W4397031504","https://openalex.org/W4403242678","https://openalex.org/W4408054937","https://openalex.org/W4410284936"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Images":[0],"and":[1,11,22,29,63,70,74,88,120,152,170,188,214],"videos":[2],"play":[3],"an":[4,57,175],"increasingly":[5],"vital":[6],"role":[7],"in":[8,19,27,155,205],"daily":[9],"life":[10],"are":[12,82,198],"widely":[13],"utilized":[14],"as":[15,43,112],"key":[16],"evidentiary":[17],"sources":[18],"judicial":[20],"investigations":[21],"forensic":[23,115,196],"analysis.":[24,172],"Simultaneously,":[25],"advancements":[26],"image":[28,97,151],"video":[30,99,153],"processing":[31],"technologies":[32],"have":[33,78],"facilitated":[34],"the":[35,68,106,161,182,186,191,203],"widespread":[36],"availability":[37],"of":[38,72,108,129,135,148,190],"powerful":[39],"editing":[40],"tools,":[41],"such":[42],"Deepfakes,":[44],"enabling":[45],"anyone":[46],"to":[47,60,93,139,180,210],"easily":[48],"create":[49],"manipulated":[50],"or":[51,98],"fake":[52],"visual":[53],"content,":[54],"which":[55,81],"poses":[56],"enormous":[58],"threat":[59],"social":[61],"security":[62],"public":[64],"trust.":[65],"To":[66],"verify":[67],"authenticity":[69],"integrity":[71],"images":[73],"videos,":[75],"numerous":[76],"approaches":[77],"been":[79],"proposed,":[80],"primarily":[83],"based":[84],"on":[85,132],"content":[86],"analysis":[87,111,169],"their":[89],"effectiveness":[90],"is":[91,125,178],"susceptible":[92],"interference":[94],"from":[95],"various":[96],"post-processing":[100],"operations.":[101],"Recent":[102],"research":[103,207],"has":[104],"highlighted":[105],"potential":[107],"file":[109,149],"containers":[110],"a":[113,127,145],"promising":[114],"approach":[116],"that":[117],"offers":[118],"efficient":[119],"interpretable":[121],"results.":[122],"However,":[123],"there":[124],"still":[126],"lack":[128],"review":[130,147],"articles":[131],"this":[133,141,156,206],"kind":[134],"approach.":[136],"In":[137,173],"order":[138],"fill":[140],"gap,":[142],"we":[143,159,201],"present":[144],"comprehensive":[146],"containers-based":[150],"forensics":[154],"paper.":[157],"Specifically,":[158],"categorize":[160],"existing":[162],"methods":[163],"into":[164],"two":[165],"distinct":[166],"stages,":[167],"qualitative":[168],"quantitative":[171],"addition,":[174],"overall":[176],"framework":[177],"proposed":[179],"organize":[181],"exiting":[183],"approaches.":[184],"Then,":[185],"advantages":[187],"disadvantages":[189],"schemes":[192],"used":[193],"across":[194],"different":[195],"tasks":[197],"provided.":[199],"Finally,":[200],"outline":[202],"trends":[204],"area,":[208],"aiming":[209],"provide":[211],"valuable":[212],"insights":[213],"technical":[215],"guidance":[216],"for":[217],"future":[218],"research.":[219]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
