skip to main content
10.1145/2600918.2600923acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Automatic location of frame deletion point for digital video forensics

Published:11 June 2014Publication History

ABSTRACT

Detection of frame deletion is of great significance in the field of video forensics. Several approaches have been presented through analyzing the side effect caused by frame deletion. However, most of the current approaches can detect the existence of frame deletion but not the exact location of it. In this paper, we present a method which can directly locate the frame deletion point. Through the analysis of the distinguishing fluctuation feature of motion residual caused by frame deletion compared to interference frames and ordinary video content jitter in tampered video sequence, an algorithm based on the total motion residual of video frame is proposed to detect the frame deletion point. Moreover, an initiative processing procedure for frame motion residual and an adaptive threshold detector are introduced so that the robustness of the detection can be markedly improved. Experimental results show that the proposed algorithm is effective in generalized scenarios such as different encoding settings, rapid or slow motion sequences and multiple group of picture deletion. It also has a high performance that the true positive rate reaches 90% and the false alarm rate is less than 0.8%.

References

  1. P. Bestagini, M. Fontani, S. Milani et al. An Overview on Video Forensics. 2012 Proceedings of the 20th European Signal Processing Conference, Bucharest, Romania, August 27 - 31, 2012.Google ScholarGoogle Scholar
  2. J. Chao, X. Jiang, and T. Sun. A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency. Digital Forensics and Watermarking, LNCS 7809: 267--281, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. J. Cox, M. L. Miller, and J. A. Bloom. Digital Watermarking. San Francisco, CA: Morgan Kaufmann, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Chen and Y.Q. Shi. Detection of Double MPEG Compression Based on First Digit Statistics. Digital Watermarking, 2009, 5450: 16--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. C. Gonzalez and R. E. Woods. Digital Image Processing. (2nd ed.) Prentice-Hall, New Jersey (2002): 793 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Katzenbeisser and F. A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Norwood, MA: Artec House, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. Luo, Z. Qu, J. Huang, and G. Qiu. A Novel Method for Detecting Cropped and Recompressed Image Block. IEEE International Conference on Acoustics, Speech and Signal Processing, 2: II-217--II-220.Google ScholarGoogle Scholar
  8. J. Lee, I. Shin, and H. Park. Adaptive Intra-Frame Assignment and Bit-Rate Estimation for Variable GOP Length in H.264. IEEE Transactions on Circuits and Systems for Video Technology, 16(10): 1271--1279, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Ostermann, J. Bormans, P. List, et al. Video Coding with H.264/AVC: Tools, Performance, and Complexity. IEEE Transactions on Circuits and Systems for Video Technology, 15(7): 7--28, 2005.Google ScholarGoogle Scholar
  10. A. C. Popescu and H. Farid. Statistical Tools for Digital Forensics. Information Hiding, LNCS 3200: 128--147, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. V. Padín, M. Fontani, T. Bianchi, et al. Detection of video double encoding with GOP size estimation. The IEEE International Workshop on Information Forensics and Security, 2--5, 2012.Google ScholarGoogle Scholar
  12. M. C. Stamm, W. S. Lin, and K. J. R. Liu. Temporal Forensics and Anti-Forensics for Motion Compensated Video. IEEE Transactions on Information Forensics and Security, 7(4): 1315--1329, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Swaminathan, M. Wu, and K. J. R. Liu. Digital Image Forensics via Intrinsic Fingerprints. IEEE Transactions on Information Forensics and Security, 3(1): 101--117, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Y. Su, J. Zhang, and J. Liu. Exposing Digital Video Forgery by Detecting Motion-compensated Edge Artifacts. International Conference on Computational Intelligence and Software Engineering: 1--4, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  15. T. Shanableh. Detection of Frame Deletion for Digital Video Forensics. Digital Investigation, 10(4): 350--360, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. W. Wang and H. Farid. Exposing Digital Forgeries in Interlaced and Deinterlaced Video. IEEE Transactions on Information Forensics and Security, 2(3): 438--449, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. W. Wang and Hany Farid. Exposing Digital Forgeries in Video by Detecting Double MPEG Compression. MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security, 2006: 37--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Weihong Wang and Hany Farid. Exposing Digital Forgeries in Video by Detecting Duplication. MM&Sec '07 Proceedings of the 9th workshop on Multimedia and security, 2007: 35--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. W. Wang, H. Farid. Exposing Digital Forgeries in Video by Detecting Double Quantization. MM&Sec '07 Proceedings of the 9th workshop on Multimedia and security, 2009: 39--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H.264 / MPEG-4 Part 10 White Paper. Prediction of Intra Macroblocks; Prediction of Inter Macroblocks in P- slices.Google ScholarGoogle Scholar
  21. http://en.wikipedia.org/wiki/Frame_rateGoogle ScholarGoogle Scholar
  22. http://www.videolan.org/developers/x264.htmlGoogle ScholarGoogle Scholar
  23. http://trace.eas.asu.edu/yuv/Google ScholarGoogle Scholar

Index Terms

  1. Automatic location of frame deletion point for digital video forensics

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security
      June 2014
      212 pages
      ISBN:9781450326476
      DOI:10.1145/2600918

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 June 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      IH&MMSec '14 Paper Acceptance Rate24of64submissions,38%Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader