no code implementations • 26 Jan 2021 • Pengpeng Yang, Daniele Baracchi, Massimo Iuliani, Dasara Shullani, Rongrong Ni, Yao Zhao, Alessandro Piva
Furthermore, it is capable of correctly identifying the operating system of the source device for most of the tampered videos.