Abstract
Forgery involving region duplication is one of the most common types of video tampering. However, few algorithms have been suggested for detecting this type of forgery effectively, especially for videos to which a mirroring operation was applied. In this paper, we summarize the properties of duplication forgery of video regions and propose a novel algorithm to detect this forgery. First, the algorithm extracts the feature points in the current frame. The tampered areas in the current frame are then searched, which is implemented in three steps. Finally, our algorithm detects the tampered areas in the remaining frames using spatio-temporal context learning and outputs the detection results. The experimental results demonstrate the satisfactory performance of our algorithm for detecting videos subjected to mirror operations and its higher efficiency than previous algorithms.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Al-Qershi, O. M., & Khoo, B. E. (2013). Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International, 231(1), 284–295.
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 6(3), 1099–1110.
Cao, Y., Gao, T., Fan, L., & Yang, Q. (2012). A robust detection algorithm for copy-move forgery in digital images. Forensic Science International, 214(1), 33–43.
Chen, W., & Shi, Y. (2009). Detection of double mpeg compression based on first digit statistics. Lecture notes in computer science, Digital Watermarking, 5450, 16–30.
Dalal, N., & Triggs, B. (2005). Histograms of oriented gradients for human detection. In: IEEE computer society conference on computer vision and pattern recognition, 2005. CVPR 2005. 2005. IEEE (pp. 886–893).
Gao, B., & Jin, Y. (2010). Detection of Image copy-move tamper Using SURF in digital forensics. In: 2010 Asia-Pacific conference on information network and digital content security (pp. 58–62).
Hsu, C.-C., Hung, T.-Y., Lin, C.-W., & Hsu, C.-T. (2008). Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008 (pp. 170–174). IEEE.
Jolliffe, I. (2002). Principal component analysis. New York: Wiley.
Kakar, P., & Sudha, N. (2012). Exposing postprocessed copy-paste forgeries through transform-invariant features. IEEE Transactions on Information Forensics and Security, 7(3), 1018–1028.
Kobayashi, M., Okabe, T., & Sato, Y. (2009). Detecting video forgeries based on noise characteristics. In: Advances in image and video technology (pp. 306–317). Berlin: Springer.
Li, W., Yuan, Y., & Yu, N. (2009). Passive detection of doctored JPEG image via block artifact grid extraction. Signal Processing, 89(9), 1821–1829.
Lowe, D. G. (2004). Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, 60(2), 91–110.
Ma, R., Chen, J., & Su, Z. (2010). MI-SIFT: Mirror and inversion invariant generalization for SIFT descriptor. In: Proceedings of the ACM international conference on image and video retrieval, ACM (pp. 228–235).
Milani, S., Fontani, M., Bestagini, P., Barni, M., Piva, A., Tagliasacchi, M., et al. (2012). An overview on video forensics. APSIPA Transactions on Signal and Information Processing, 1, e2.
Oppenheim, A. V., Willsky, A. S., & Nawab, S. H. (1983). Signals and systems, vol. 2. Englewood Cliffs, NJ: Prentice-Hall. 6(7):10.
Pun, C.-M., Yuan, X.-C., & Bi, X.-L. (2015). Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Transactions on Information Forensics and Security, 10(8), 1705–1716.
Qadir, G., Yahaya, S., & Ho, A. T. (2012). Surrey university library for forensic analysis (SULFA) of video content. In: IET conference on image processing (IPR 2012). IET (pp. 1–6).
Sencar, H. T., & Memon, N. (2008). Overview of state-of-the-art in digital image forensics. Algorithms, Architectures and Information Systems Security, 3, 325–348.
Subramanyam, A., & Emmanuel, S. (2012). Video forgery detection using HOG features and compression properties. In: 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP), 2012. IEEE (pp. 89–94).
Torralba, A. (2003). Contextual priming for object detection. International Journal of Computer Vision, 53(2), 169–191.
Wang, W., & Farid, H. (2007). Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th workshop on multimedia and security, ACM (pp. 35–42).
Wang, W., & Farid, H. (2009). Exposing digital forgeries in video by detecting double quantization. In: Proceedings of the 11th ACM workshop on multimedia and security, 2009 (pp. 39–48). ACM.
Yang, J., Huang, T., & Su, L. (2014). Using similarity analysis to detect frame duplication forgery in videos. Multimedia Tools and Applications, 1–19.
Yin, H., Hui, W., Li, H., Lin, C., & Zhu, W. (2012). A novel large-scale digital forensics service platform for Internet videos. IEEE Transactions on Multimedia, 14(1), 178–186.
Zhang, K., Zhang, L., Liu, Q., Zhang, D., & Yang, M.-H. (2014). Fast visual tracking via dense spatio-temporal context learning. In: Computer vision–ECCV 2014 (pp. 127–141). Springer.
Acknowledgements
This work was supported by National Natural Science Foundation of China under Grant Number 61373077, the Specialized Research Fund for the Doctoral Program of Higher Education of China (No. 20110121110020) and the National Defense Basic Scientific Research Program of China.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Su, L., Li, C. A novel passive forgery detection algorithm for video region duplication. Multidim Syst Sign Process 29, 1173–1190 (2018). https://doi.org/10.1007/s11045-017-0496-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11045-017-0496-6