Skip to main content
Top

2014 | OriginalPaper | Chapter

Identifying Video Forgery Process Using Optical Flow

Authors : Wan Wang, Xinghao Jiang, Shilin Wang, Meng Wan, Tanfeng Sun

Published in: Digital-Forensics and Watermarking

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the extensive equipment of surveillance systems, the assessment of the integrity of surveillance videos is of vital importance. In this paper, an algorithm based on optical flow and anomaly detection is proposed to authenticate digital videos and further identify the inter-frame forgery process (i.e. frame deletion, insertion, and duplication). This method relies on the fact that forgery operation will introduce discontinuity points to the optical flow variation sequence and these points show different characteristics depending on the type of forgery. The anomaly detection scheme is adopted to distinguish the discontinuity points. Experiments were performed on several real-world surveillance videos delicately forged by volunteers. The results show that the proposed algorithm is effective to identify forgery process with localization, and is robust to some degree of MPEG compression.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 26(2), 16–25 (2009)CrossRef Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 26(2), 16–25 (2009)CrossRef
2.
go back to reference Milani, S., Fontani, M., Bestagini, P., Barni, M., Piva, A., et al.: An overview on video forensics. APSIPA Trans. Signal Inf. Process. 1, e2 (2012) Milani, S., Fontani, M., Bestagini, P., Barni, M., Piva, A., et al.: An overview on video forensics. APSIPA Trans. Signal Inf. Process. 1, e2 (2012)
3.
go back to reference Chen, M., Fridrich, J., Goljan, M., Lukáš, J.: Source digital camcorder identification using sensor photo response non-uniformity. In: SPIE 2007, vol. 6505 (2007) Chen, M., Fridrich, J., Goljan, M., Lukáš, J.: Source digital camcorder identification using sensor photo response non-uniformity. In: SPIE 2007, vol. 6505 (2007)
4.
go back to reference van Houten, W., Geradts, Z., Franke, K., Veenman, C.: Verification of video source camera competition (CAMCOM 2010). In: Ünay, D., Çataltepe, Z., Aksoy, S. (eds.) ICPR 2010. LNCS, vol. 6388, pp. 22–28. Springer, Heidelberg (2010)CrossRef van Houten, W., Geradts, Z., Franke, K., Veenman, C.: Verification of video source camera competition (CAMCOM 2010). In: Ünay, D., Çataltepe, Z., Aksoy, S. (eds.) ICPR 2010. LNCS, vol. 6388, pp. 22–28. Springer, Heidelberg (2010)CrossRef
5.
go back to reference Chen, W., Shi, Y.Q.: Detection of double MPEG compression based on first digit statistics. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 16–30. Springer, Heidelberg (2009)CrossRef Chen, W., Shi, Y.Q.: Detection of double MPEG compression based on first digit statistics. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 16–30. Springer, Heidelberg (2009)CrossRef
6.
go back to reference Luo, W.Q., Wu, M., Huang, J.W.: MPEG recompression detection based on block artifacts. In: SPIE 2008, vol. 6819 (2008) Luo, W.Q., Wu, M., Huang, J.W.: MPEG recompression detection based on block artifacts. In: SPIE 2008, vol. 6819 (2008)
7.
go back to reference Mondaini, N., Caldelli, R., Piva, A., Barni, M., Cappellini, V.: Detection of malevolent changes in digital video for forensic applications. In: SPIE 2007, vol. 6505 (2007) Mondaini, N., Caldelli, R., Piva, A., Barni, M., Cappellini, V.: Detection of malevolent changes in digital video for forensic applications. In: SPIE 2007, vol. 6505 (2007)
8.
go back to reference Hsu, C.C., Hung, T.Y., Lin, C.W., Hsu, C.T.: Video forgery detection using correlation of noise residue. In: MMSP 2008, pp. 170–174 (2008) Hsu, C.C., Hung, T.Y., Lin, C.W., Hsu, C.T.: Video forgery detection using correlation of noise residue. In: MMSP 2008, pp. 170–174 (2008)
9.
go back to reference Kobayashi, M., Okabe, T., Sato, Y.: Detecting forgery from static-scene video based on inconsistency in noise level functions. IEEE Trans. Inf. Forensics Secur. 5(4), 883–892 (2010)CrossRef Kobayashi, M., Okabe, T., Sato, Y.: Detecting forgery from static-scene video based on inconsistency in noise level functions. IEEE Trans. Inf. Forensics Secur. 5(4), 883–892 (2010)CrossRef
10.
go back to reference Wang, W.H., Farid, H.: Exposing digital forgeries in video by detecting double MPEG compression. In: MM&Sec 2006, pp. 37–47 (2006) Wang, W.H., Farid, H.: Exposing digital forgeries in video by detecting double MPEG compression. In: MM&Sec 2006, pp. 37–47 (2006)
11.
go back to reference Su, Y.T., Nie, W.Z., Zhang, C.Q.: A frame tampering detection algorithm for MPEG videos. In: ITAIC 2011, vol. 2, pp. 461–464 (2011) Su, Y.T., Nie, W.Z., Zhang, C.Q.: A frame tampering detection algorithm for MPEG videos. In: ITAIC 2011, vol. 2, pp. 461–464 (2011)
12.
go back to reference Dong, Q., Yang, G.B., Zhu, N.B.: A MCEA based passive forensics scheme for detecting frame-based video tampering. Digit. Investig. 9(2), 151–159 (2012)CrossRef Dong, Q., Yang, G.B., Zhu, N.B.: A MCEA based passive forensics scheme for detecting frame-based video tampering. Digit. Investig. 9(2), 151–159 (2012)CrossRef
13.
go back to reference Wang, W.H., Farid, H.: Exposing digital forgeries in video by detecting duplication. In: MM&Sec 2007, pp. 35–42 (2007) Wang, W.H., Farid, H.: Exposing digital forgeries in video by detecting duplication. In: MM&Sec 2007, pp. 35–42 (2007)
14.
go back to reference Zhang, J., Su, Y.T., Zhang, M.Y.: Exposing digital video forgery by ghost shadow artifact. In: MiFor 2009 and MM 2009, pp. 49–53 (2009) Zhang, J., Su, Y.T., Zhang, M.Y.: Exposing digital video forgery by ghost shadow artifact. In: MiFor 2009 and MM 2009, pp. 49–53 (2009)
15.
go back to reference Conotter, V., O’Brien, J.F., Farid, H.: Exposing digital forgeries in ballistic motion. IEEE Trans. Inf. Forensics Secur. 7(1), 283–296 (2012)CrossRef Conotter, V., O’Brien, J.F., Farid, H.: Exposing digital forgeries in ballistic motion. IEEE Trans. Inf. Forensics Secur. 7(1), 283–296 (2012)CrossRef
16.
go back to reference Chao, J., Jiang, X., Sun, T.: A novel video inter-frame forgery model detection scheme based on optical flow consistency. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 267–281. Springer, Heidelberg (2013)CrossRef Chao, J., Jiang, X., Sun, T.: A novel video inter-frame forgery model detection scheme based on optical flow consistency. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 267–281. Springer, Heidelberg (2013)CrossRef
17.
go back to reference Lucas, B.D., Kanade, T.: An iterative image registration technique with an application to stereo vision. In: 7th International Joint Conference on Artificial Intelligence, vol. 2, pp. 674–679 (1981) Lucas, B.D., Kanade, T.: An iterative image registration technique with an application to stereo vision. In: 7th International Joint Conference on Artificial Intelligence, vol. 2, pp. 674–679 (1981)
18.
go back to reference Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1–58 (2009)CrossRef Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1–58 (2009)CrossRef
19.
go back to reference Grubbs, F.: Procedures for detecting outlying observations in samples. Technometrics 11(1), 1–21 (1969)CrossRef Grubbs, F.: Procedures for detecting outlying observations in samples. Technometrics 11(1), 1–21 (1969)CrossRef
Metadata
Title
Identifying Video Forgery Process Using Optical Flow
Authors
Wan Wang
Xinghao Jiang
Shilin Wang
Meng Wan
Tanfeng Sun
Copyright Year
2014
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-43886-2_18

Premium Partner