Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects

被引:22
作者
Aghamaleki, Javad Abbasi [1 ]
Behrad, Alireza [1 ]
机构
[1] Shahed Univ, Dept Elect Engn, Tehran, Iran
关键词
Video forgery detection; Passive forensics; Frame deletion/insertion; Residual error; First digit distribution; Benford's law; DOUBLE COMPRESSION; FORENSICS;
D O I
10.1007/s11042-016-4004-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new algorithm is proposed for forgery detection in MPEG videos using spatial and time domain analysis of quantization effect on DCT coefficients of I and residual errors of P frames. The proposed algorithm consists of three modules, including double compression detection, malicious tampering detection and decision fusion. Double compression detection module employs spatial domain analysis using first significant digit distribution of DCT coefficients in I frames to detect single and double compressed videos using an SVM classifier. Double compression does not necessarily imply the existence of malignant tampering in the video. Therefore, malicious tampering detection module utilizes time domain analysis of quantization effect on residual errors of P frames to identify malicious inter-frame forgery comprising frame insertion or deletion. Finally, decision fusion module is used to classify input videos into three categories, including single compressed videos, double compressed videos without malicious tampering and double compressed videos with malicious tampering. The experimental results and the comparison of the results of the proposed method with those of other methods show the efficiency of the proposed algorithm.
引用
收藏
页码:20691 / 20717
页数:27
相关论文
共 30 条
[1]   A robust video watermarking technique for the tamper detection of surveillance systems [J].
Arab, Farnaz ;
Abdullah, Shahidan M. ;
Hashim, Siti Zaiton Mohd ;
Manaf, Azizah Abdul ;
Zamani, Mazdak .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) :10855-10885
[2]  
Bestagini P, 2013, IEEE INT WORKSH MULT, P488, DOI 10.1109/MMSP.2013.6659337
[3]  
Carter T., 2007, INTRO INFORM THEORY
[4]   A tutorial on v-support vector machines [J].
Chen, PH ;
Lin, CJ ;
Schölkopf, B .
APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY, 2005, 21 (02) :111-136
[5]  
Chen W, 2009, LECT NOTES COMPUT SC, V5450, P16, DOI 10.1007/978-3-642-04438-0_2
[6]   A MCEA based passive forensics scheme for detecting frame-based video tampering [J].
Dong, Qiong ;
Yang, Gaobo ;
Zhu, Ningbo .
DIGITAL INVESTIGATION, 2012, 9 (02) :151-159
[7]  
Dueck D, 2001, MPEG 2 VIDEO TRANSCO
[8]  
Feng C, 2014, P 2 ACM WORKSH INF H, P171, DOI DOI 10.1145/2600918.2600923
[9]  
Gironi A., 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P6226, DOI 10.1109/ICASSP.2014.6854801
[10]   Detection of Double Compression in MPEG-4 Videos Based on Markov Statistics [J].
Jiang, Xinghao ;
Wang, Wan ;
Sun, Tanfeng ;
Shi, Yun Q. ;
Wang, Shilin .
IEEE SIGNAL PROCESSING LETTERS, 2013, 20 (05) :447-450