Abstract
In this paper, we propose a novel scheme to detect double MPEG-4 compression with block artifact analysis. An adaptive measurement of block artifact in decompressed frames is proposed and then combined with the Variation of Prediction Footprint (VPF) in an effective way. Based on such measurement, periodic analysis is used to detect double compression. The proposed scheme is verified on several publically available standard videos and compared with the state-of-the-art method. Experimental results demonstrate that it has more robust detection capability.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Freely available at this website: http://trace.eas.asu.edu/yuv/. Chosen sequences are: akiyo, bridge-close, bridge-far, coastguard, container, foreman, hall, highway, mobile, news, paris, silent, tempete, waterfall.
References
Milani, S., Fontani, M., Bestagini, P., Barni, M., Piva, A., Tagliasacchi, M., Tubaro, S.: An overview on video forensics. APSIPA Trans. Signal Inf. Process. 1, e2 (2012)
Wang, W., Farid, H.: Exposing digital forgeries in video by detecting double mpeg compression. In: 8th Workshop on Multimedia and Security, pp. 37–47. ACM (2006)
Wang, W., Farid, H.: Exposing digital forgeries in video by detecting double quantization. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 39–48. ACM (2009)
Xu, J., Su, Y., Liu, Q.: Detection of double MPEG-2 compression based on distributions of DCT coefficients. Int. J. Pattern Recogn. Artif. Intell. 27(01), 1354001 (2013)
Chen, W., Shi, Y.Q.: Detection of double MPEG compression based on first digit statistics. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 16–30. Springer, Heidelberg (2009)
Sun, T., Wang, W., Jiang, X.: Exposing video forgeries by detecting MPEG double compression. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1389–1392. IEEE (2012)
Subramanyam, A., Emmanuel, S.: Pixel estimation based video forgery detection. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3038–3042. IEEE (2013)
Jiang, X., Wang, W., Sun, T., Shi, Y.Q., Wang, S.: Detection of double compression in MPEG-4 videos based on markov statistics. Signal Process. Lett. IEEE 20(5), 447–450 (2013)
Luo, W., Wu, M., Huang, J.: MPEG recompression detection based on block artifacts. In: Electronic Imaging 2008, pp. 68190X–68190X. International Society for Optics and Photonics (2008)
Bestagini, P., Allam, A., Milani, S., Tagliasacchi, M., Tubaro, S.: Video codec identification. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2257–2260. IEEE (2012)
Vázquez-Padin, D., Fontani, M., Bianchi, T., Comesana, P., Piva, A., Barni, M.: Detection of video double encoding with gop size estimation. In: IEEE International Workshop on Information Forensics and Security (WIFS) (2012)
Park, H., Lee, Y.L.: A postprocessing method for reducing quantization effects in low bit-rate moving picture coding. IEEE Trans. Circ. Syst. Video Technol. 9(1), 161–171 (1999)
Acknowledgments
This work was supported by the National Natural Science Foundation of China (No. 61272249, 61272439), and the Specialized Research Fund for the Doctoral Program of Higher Education (No. 20120073110053).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
He, P., Sun, T., Jiang, X., Wang, S. (2015). Double Compression Detection in MPEG-4 Videos Based on Block Artifact Measurement with Variation of Prediction Footprint. In: Huang, DS., Han, K. (eds) Advanced Intelligent Computing Theories and Applications. ICIC 2015. Lecture Notes in Computer Science(), vol 9227. Springer, Cham. https://doi.org/10.1007/978-3-319-22053-6_84
Download citation
DOI: https://doi.org/10.1007/978-3-319-22053-6_84
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22052-9
Online ISBN: 978-3-319-22053-6
eBook Packages: Computer ScienceComputer Science (R0)