Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A novel passive forgery detection algorithm for video region duplication

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

Forgery involving region duplication is one of the most common types of video tampering. However, few algorithms have been suggested for detecting this type of forgery effectively, especially for videos to which a mirroring operation was applied. In this paper, we summarize the properties of duplication forgery of video regions and propose a novel algorithm to detect this forgery. First, the algorithm extracts the feature points in the current frame. The tampered areas in the current frame are then searched, which is implemented in three steps. Finally, our algorithm detects the tampered areas in the remaining frames using spatio-temporal context learning and outputs the detection results. The experimental results demonstrate the satisfactory performance of our algorithm for detecting videos subjected to mirror operations and its higher efficiency than previous algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Al-Qershi, O. M., & Khoo, B. E. (2013). Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International, 231(1), 284–295.

    Article  Google Scholar 

  • Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 6(3), 1099–1110.

    Article  Google Scholar 

  • Cao, Y., Gao, T., Fan, L., & Yang, Q. (2012). A robust detection algorithm for copy-move forgery in digital images. Forensic Science International, 214(1), 33–43.

    Article  Google Scholar 

  • Chen, W., & Shi, Y. (2009). Detection of double mpeg compression based on first digit statistics. Lecture notes in computer science, Digital Watermarking, 5450, 16–30.

  • Dalal, N., & Triggs, B. (2005). Histograms of oriented gradients for human detection. In: IEEE computer society conference on computer vision and pattern recognition, 2005. CVPR 2005. 2005. IEEE (pp. 886–893).

  • Gao, B., & Jin, Y. (2010). Detection of Image copy-move tamper Using SURF in digital forensics. In: 2010 Asia-Pacific conference on information network and digital content security (pp. 58–62).

  • Hsu, C.-C., Hung, T.-Y., Lin, C.-W., & Hsu, C.-T. (2008). Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008 (pp. 170–174). IEEE.

  • Jolliffe, I. (2002). Principal component analysis. New York: Wiley.

    MATH  Google Scholar 

  • Kakar, P., & Sudha, N. (2012). Exposing postprocessed copy-paste forgeries through transform-invariant features. IEEE Transactions on Information Forensics and Security, 7(3), 1018–1028.

    Article  Google Scholar 

  • Kobayashi, M., Okabe, T., & Sato, Y. (2009). Detecting video forgeries based on noise characteristics. In: Advances in image and video technology (pp. 306–317). Berlin: Springer.

  • Li, W., Yuan, Y., & Yu, N. (2009). Passive detection of doctored JPEG image via block artifact grid extraction. Signal Processing, 89(9), 1821–1829.

    Article  MATH  Google Scholar 

  • Lowe, D. G. (2004). Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, 60(2), 91–110.

    Article  Google Scholar 

  • Ma, R., Chen, J., & Su, Z. (2010). MI-SIFT: Mirror and inversion invariant generalization for SIFT descriptor. In: Proceedings of the ACM international conference on image and video retrieval, ACM (pp. 228–235).

  • Milani, S., Fontani, M., Bestagini, P., Barni, M., Piva, A., Tagliasacchi, M., et al. (2012). An overview on video forensics. APSIPA Transactions on Signal and Information Processing, 1, e2.

    Article  Google Scholar 

  • Oppenheim, A. V., Willsky, A. S., & Nawab, S. H. (1983). Signals and systems, vol. 2. Englewood Cliffs, NJ: Prentice-Hall. 6(7):10.

  • Pun, C.-M., Yuan, X.-C., & Bi, X.-L. (2015). Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Transactions on Information Forensics and Security, 10(8), 1705–1716.

    Article  Google Scholar 

  • Qadir, G., Yahaya, S., & Ho, A. T. (2012). Surrey university library for forensic analysis (SULFA) of video content. In: IET conference on image processing (IPR 2012). IET (pp. 1–6).

  • Sencar, H. T., & Memon, N. (2008). Overview of state-of-the-art in digital image forensics. Algorithms, Architectures and Information Systems Security, 3, 325–348.

    Google Scholar 

  • Subramanyam, A., & Emmanuel, S. (2012). Video forgery detection using HOG features and compression properties. In: 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP), 2012. IEEE (pp. 89–94).

  • Torralba, A. (2003). Contextual priming for object detection. International Journal of Computer Vision, 53(2), 169–191.

    Article  MathSciNet  Google Scholar 

  • Wang, W., & Farid, H. (2007). Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th workshop on multimedia and security, ACM (pp. 35–42).

  • Wang, W., & Farid, H. (2009). Exposing digital forgeries in video by detecting double quantization. In: Proceedings of the 11th ACM workshop on multimedia and security, 2009 (pp. 39–48). ACM.

  • Yang, J., Huang, T., & Su, L. (2014). Using similarity analysis to detect frame duplication forgery in videos. Multimedia Tools and Applications, 1–19.

  • Yin, H., Hui, W., Li, H., Lin, C., & Zhu, W. (2012). A novel large-scale digital forensics service platform for Internet videos. IEEE Transactions on Multimedia, 14(1), 178–186.

    Article  Google Scholar 

  • Zhang, K., Zhang, L., Liu, Q., Zhang, D., & Yang, M.-H. (2014). Fast visual tracking via dense spatio-temporal context learning. In: Computer vision–ECCV 2014 (pp. 127–141). Springer.

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China under Grant Number 61373077, the Specialized Research Fund for the Doctoral Program of Higher Education of China (No. 20110121110020) and the National Defense Basic Scientific Research Program of China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lichao Su.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Su, L., Li, C. A novel passive forgery detection algorithm for video region duplication. Multidim Syst Sign Process 29, 1173–1190 (2018). https://doi.org/10.1007/s11045-017-0496-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-017-0496-6

Keywords

Navigation