Skip to main content
Log in

Multimedia file forensics system exploiting file similarity search

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the fast increase of multimedia contents, efficient forensics investigation methods for multimedia files have been required. In multimedia files, the similarity means that the identical media (audio and video) data are existing among multimedia files. This paper proposes an efficient multimedia file forensics system based on file similarity search of video contents. The proposed system needs two key techniques. First is a media-aware information detection technique. The first critical step for the similarity search is to find the meaningful keyframes or key sequences in the shots through a multimedia file, in order to recognize altered files from the same source file. Second is a video fingerprint-based technique (VFB) for file similarity search. The byte for byte comparison is an inefficient similarity searching method for large files such as multimedia. The VFB technique is an efficient method to extract video features from the large multimedia files. It also provides an independent media-aware identification method for detecting alterations to the source video file (e.g., frame rates, resolutions, and formats, etc.). In this paper, we focus on two key challenges: to generate robust video fingerprints by finding meaningful boundaries of a multimedia file, and to measure video similarity by using fingerprint-based matching. Our evaluation shows that the proposed system is possible to apply to realistic multimedia file forensics tools.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Allamanche, E., Herre, J., Hellmuth, O., Fröba, B., Kastner, T., & Cremer, M. (2001). Content-based Identification of Audio Material Using MPEG-7 Low Level Description. In ISMIR

  2. Anand A, Balachandran A, Akella A, Sekar V, Seshan S (2016) Enhancing video accessibility and availability using information-bound references. IEEE/ACM Trans Networking 24(2):1223–1236

    Article  Google Scholar 

  3. Baber, J., Afzulpurkar, N., Dailey, M. N., & Bakhtyar, M. (2011). Shot boundary detection from videos using entropy and local descriptor. In 2011 17th International Conference on Digital Signal Processing (DSP) (pp. 1–6). IEEE

  4. Bae, S., Nam, G., & Park, K. (2014) Effective content-based video caching with cache-friendly encoding and media-aware chunking. InProceedings of the 5th ACM Multimedia Systems Conference (pp. 203–212). ACM

  5. Chasanis VT, Likas AC, Galatsanos NP (2009) Scene detection in videos using shot clustering and sequence alignment. IEEE Trans Multimed 11(1):89–100

    Article  Google Scholar 

  6. S. Chen, J. Wang, Y. Ouyang, B. Wang, Q. Tian, H. Lu. (2010) Multi-level trajectory modeling for video copy detection. Proc IEEE Int Conf Acoustics Speech Sign Process (ICASSP’10), 2378–2381

  7. Coskun, B., & Sankur, B. (2004) Robust video hash extraction. In Signal Processing and Communications Applications Conference, 2004. Proceedings of the IEEE 12th (pp. 292–295). IEEE

  8. De Roover C, De Vleeschouwer C, Lefèbvre F, Macq B (2005) Robust video hashing based on radial projections of key frames. IEEE Trans Signal Process 53(10):4020–4037

    Article  MathSciNet  Google Scholar 

  9. Eshghi K, Lillibridge M, Wilcock L, Belrose G, Hawkes R (2007) Jumbo Store: Providing Efficient Incremental Upload and Versioning for a Utility Rendering Service. FAST 7:123–138

    Google Scholar 

  10. Forman, G., Eshghi, K. Chiocchetti, S. (2005) Finding similar files in large document repositories. In Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining (pp. 394–400). ACM

  11. Gionis A, Indyk P, Motwani R (1999) Similarity search in high dimensions via hashing. VLDB 99(6):518–529

    Google Scholar 

  12. Gloe T, Fischer A, Kirchner M (2014) Forensic analysis of video file formats. Digit Investig 11:S68–S76

    Article  Google Scholar 

  13. Haitsma J, Kalker T, Oostveen J (2001) Robust audio hashing for content identification. Int Workshop Content-Based Multimed Index 4:117–124

    MATH  Google Scholar 

  14. HotSync, P. (2007) Palm Developer Online Documentation

  15. Ko Y-W, Jung H-M, Lee W-Y, Kim M-J, Yoo C (2013) Stride Static Chunking Algorithm for Deduplication System. IEICE Trans Inf Syst 96(7):1544–1547

    Article  Google Scholar 

  16. Li J, Ding Y, Shi Y, Li W (2010) A Divide-And-Rule Scheme For Shot Boundary Detection Based on SIFT. JDCTA 4(3):202–214

    Article  Google Scholar 

  17. Lu, J. (2009). Video fingerprinting for copy identification: from research to industry applications. In IS&T/SPIE Electronic Imaging (pp. 725402–725402). International Society for Optics and Photonics

  18. Mas J, Fernandez G (2003) Video shot boundary detection based on color histogram. Notebook Papers TRECVID2003. NIST, Gaithersburg, Maryland

    Google Scholar 

  19. Median filter, http://en.wikipedia.org/wiki/Median_filter

  20. Meunier, P., Nystrom, S., Kamara, S., Yost, S., Alexander, K., Noland, D., Crane, J. (2002) ActiveSync, TCP/IP and 802.11 b Wireless Vulnerabilities of WinCE-based PDAs, pp. 145–150. IEEE

  21. Muthitacharoen A, Chen B, Mazieres D (2001) A low-bandwidth network file system. ACM SIGOPS OperA Syst Rev 35:174–187

    Article  Google Scholar 

  22. OpenCV. Open source computer vision, http://www.opencv.org

  23. pHash. The Open source perceptual hash library, http://phash.org

  24. Pucha, H., Andersen, D. G., & Kaminsky, M. (2007). Exploiting Similarity for Multi-Source Downloads Using File Handprints. In NSDI

  25. Quinlan S, Dorward S (2002) Venti: A New Approach to Archival Storage. FAST 2:89–101

    Google Scholar 

  26. Standaert, F. X., Lefebvre, E., Rouvroy, G., Macq, B., Quisquater, J. J., & Legat, J. D. (2005). Practical evaluation of a radial soft hash algorithm. International Conference on Information Technology: Coding and Computing (ITCC'05)-Volume II (Vol. 2, pp. 89–94). IEEE

  27. Starobinski D, Trachtenberg A, Agarwal S (2003) Efficient PDA synchronization. IEEE Trans Mob Comput 2:40–51

    Article  Google Scholar 

  28. Steinebach, M., Liu, H., & Yannikos, Y. (2014). Efficient Cropping-Resistant Robust Image Hashing. In Availability, Reliability and Security (ARES), 2014 Ninth International Conference on (pp. 579-585). IEEE

  29. Tridgell, A. (1999) Efficient algorithms for sorting and synchronization. PhD thesis, The Australian National University

  30. Vukelic, B., & Baca, M. (2014). Comparison of RADIAL variance based and Maar-Hildreth operator perceptual image hash functions on biometric templates. In Central European Conference on Information and Intelligent Systems (p. 286). Faculty of Organization and Informatics Varazdin

  31. Wu, C., Zhu, J., & Zhang, J. (2012). A content-based video copy detection method with randomly projected binary features. 2012 I.E. Computer Society Conference on Computer Vision and Pattern Recognition Workshops (pp. 21–26). IEEE

  32. Xu D, Sheng Y, Ju D, Wu J, Wang D (2011) High Effective Two-round Remote File Fast Synchronization Algorithm. Jisuanji Kexue yu Tansuo 5:38–49

    Google Scholar 

  33. Yan, H., Irmak, U., Suel, T. (2008) Algorithms for low-latency remote file synchronization, pp. 156–160. IEEE

  34. Yang, B., Gu, F., & Niu, X. (2006). Block mean value based image perceptual hashing. In 2006 International Conference on Intelligent Information Hiding and Multimedia (pp. 167–172). IEEE

  35. You, L., & Karamanolis, C. T. (2004). Evaluation of Efficient Archival Storage Techniques. In MSST (pp. 227–232)

  36. Zauner, C. (2010). Implementation and benchmarking of perceptual image hash functions. na

Download references

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT and future Planning (2014R1A2A1A11054160). And this research was supported by The Leading Human Resource Training Program of Regional Neo industry through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT and future Planning (2016H1D5A1910630)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Young-Woong Ko.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, MJ., Yoo, C. & Ko, YW. Multimedia file forensics system exploiting file similarity search. Multimed Tools Appl 78, 5233–5254 (2019). https://doi.org/10.1007/s11042-017-4969-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4969-2

Keywords

Navigation