Abstract
Video frame manipulation has become commonplace with the growing easy access to powerful computing abilities. One of the most common types of video frame tampers is the copy-paste tamper, wherein a region from a video frame is replaced with another region from the same frame. In order to improve the robustness of passive video tampering detection, we propose a content-based video similarity tamper passive blind detection algorithm based on multi-scale normalized mutual information which can implement video frame copy, frame insertion and frame deletion tamper detection. The detail implementation of the proposed algorithm consists of multi-scale content analysis, single-scale content similarity measure, multi-scale content similarity measure, and tampering positioning. Firstly, we get the scales of the visual content of the video frame using Gaussian pyramid transform; Secondly, to measure the similarity of single-scale visual content, we define adjacent normalized mutual information of two frames according to information theory; Thirdly, we construct the multi-scale normalized mutual information descriptors to achieve the multi-scale visual content similarity measure of adjacent two frames using a linear combination. Finally, we use the local outlier isolated factor detection algorithm to detect the position of the video tampering. Experimental results show that the proposed approach can not only detect the video frame tampering position of delete, copy, and insert effectively, but also can detect the tampering of different and homology video encoding formats. We obtain a feature detecting accuracy in excess of 93% and detection rate of 96% across post processing operations, and are able to detect the delete, copy, and insert regions with a high true positive rate and lower false positive rate than the existing time field tamper detection methods.





Similar content being viewed by others
References
Ardizzone E, Mazzola G (2009) Detection of duplicated regions in tampered digital images by bit-plane analysis. In: International conference on image analysis and processing. Springer, Berlin Heidelberg
Breunig MM et al (2000) LOF: identifying density-based local outliers. ACM Sigmod Rec 29(2). ACM
Chen Y, Hao C, Wu W, Wu E (2016) Robust dense reconstruction by range merging based on confidence estimation. SCIENCE CHINA Inf Sci 59(9):1C11. https://doi.org/10.1007/s11432-015-0957-4
Conotter V, O’Brien JF, Farid H (2012) Exposing digital forgeries in ballistic motion. IEEE Trans Inf Forens Secur 7.1:283–296
Coskun B, Sankur B, Memon N (2006) SpatioCtemporal transform based video hashing. IEEE Trans Multimed 8.6:1190–1208
Dong Q, Yang G, Zhu N (2012) A MCEA based passive forensics scheme for detecting frame-based video tampering. Dig Investig 9.2:151–159
Farid H (2009) Image forgery detection–A survey
Goutte C, Gaussier E (2005) A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. In: European conference on information retrieval. Springer, Berlin Heidelberg
Gu B, Sun X, Sheng VS (2016) Structural minimax probability machine. IEEE Trans Neural Netw Learn Syst. https://doi.org/10.1109/TNNLS.2016.2544779
Huang TQ, Chen ZW (2011) Digital video forgeries detection based on bidirectional motion vectors. Shandong Daxue Xuebao(GongxueBan) 41.4:13–19
Hsu C-C et al (2008) Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th workshop on IEEE multimedia signal processing
Hyun D-K et al (2013) Detection of upscale-crop and partial manipulation in surveillance video based on sensor pattern noise. Sensors 13.9:12605–12631
Jinshi C, Ye L, Xu Y, Huijing Z (2013) Tracking generic human motion via fusion of low- and high-dimensional approaches. IEEE Trans Syst Man Cybernet: Syst 43(4):996–1002
Kakar P, Natarajan S, Ser Wee (2010) Detecting digital image forgeries through inconsistent motion blur. In: 2010 IEEE international conference on IEEE multimedia and expo (ICME)
Kobayashi M, Okabe T, Sato Y (2009) Detecting video forgeries based on noise characteristics. In: Pacific-rim symposium on image and video technology. Springer, Berlin Heidelberg
Koenderink JJ (1984) The structure of images. Biol Cybern 50.5:363–370
Lin G-S, Chang J-F (2012) Detection of frame duplication forgery in videos based on spatial and temporal analysis. Int J Pattern Recogn Artif Intell 26.07:1250017
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forens Secur 10(3):507–518. https://doi.org/10.1109/TIFS.2014.2381872
Luming Z, Mingli S, Zicheng L, Xiao L, Bu J, Chun C (2013) Probabilistic graphlet cut: Exploiting spatial structure cue for weakly supervised image segmentation. In: 2013 IEEE conference on computer vision and pattern recognition (CVPR). USA, pp 1908–1915
Luming Z, Mingli S, Zicheng L et al (2013) Probabilistic graphlet cut: exploring spatial structure cue for weakly supervised image segmentation. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 1820–1826
Math S, Tripathi RC (2011) Image quality feature based detection algorithm for forgery in images. Int J Comput Graph Animat 1.1:13
Murali S, Chittapur GB, Anami BS (2013) Comparision and analysis of photo image forgery detection techniques. arXiv preprint arXiv:http://arXiv.org/abs/1302.3119
Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broadcast 61 (2):166–176. https://doi.org/10.1109/TBC.2015.2419824
Pan Z, Jin P, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast reference frame selection based on content similarity for low complexity HEVC encoder. J Vis Commun Image Represent, Part B 40:516–524. https://doi.org/10.1016/j.jvcir.2016.07.018
Pan Z, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast motion estimation based on content property for low-complexity H.265/HEVC encoder. IEEE Trans Broadcast 62(3):675–684. https://doi.org/10.1109/TBC.2016.2580920
Qazi T et al (2013) Survey on blind image forgery detection. IET Image Processing 7.7:660–670
Qin Y, Sun G, Zhang X (2009) Exposing digital forgeries in video via motion vectors. Journal of computer research and development:227–233
Qiu G, Morris J, Fan X (2007) Visual guided navigation for image retrieval. Pattern Recogn 40.6:1711–1721
Su Y et al (2010) Exposing digital video logo-removal forgery by inconsistency of blur. Int J Pattern Recogn Artif Intell 24.07:1027–104
Tong M, Zhang W, Zhang J, Chen T (2012) A video watermarking framework resistant to super strong cropping attacks based on nmf with sparseness constraints on parts of the basis matrix. J Electron Inf Technol 34.8:1819–1826
Wang W, Farid H (2000) Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th workshop on multimedia & security. ACM
Wang W, Farid H (2006) Exposing digital forgeries in video by detecting double MPEG compression. In: Proceedings of the 8th workshop on multimedia and security. ACM
Wei W, Qi Y (2011) Information potential fields navigation in wireless Ad-Hoc sensor networks[J]. Sensors 11(5):4794–4807
Wei W, Yang XL, Zhou B et al (2012) Combined energy minimization for image reconstruction from few views[J]. Math Probl Eng 16(7):2213–2223
Wei W, Fan X, Song H, Fan X, Yang J (2016) Imperfect information dynamic stackelberg game based resource allocation using hidden Markov for cloud computing. IEEE Trans Services Comput PP(99):1. https://doi.org/10.1109/TSC.2016.2528246
Wu J, Guo S, Li J, Zeng D (2016) Big data meet green challenges: big data toward green applications. IEEE Syst J 10(3):888–900
Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75 (4):1947–1962. https://doi.org/10.1007/s11042-014-2381-8
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608. https://doi.org/10.1109/TIFS.2016.2590944
Xing L, Ma Q, Zhu M (2013) Double semantic watermark algorithm for digital audio based on neural network. J Univ Electron Sci Technol China 42.2:260–265
Xu J-Y, Yu-ting S (2013) Smoothing filtering detection for digital image forensics. J Electron Inf Technol 10:001
Ye L, Jinshi C, Huijing Z, Zha H (2012) Fusion of low-and high-dimensional approaches by trackers sampling for generic human motion tracking. In: International conference on pattern recognition, pp 898–901
Yuan X, Huang T, Chen Z et al (2012) Digital video forgeries detection based on textural features[J]. Comput Syst Appl 21.06:91–95
Zhan W, Liu J, Zhang G, Zhiquan W, Yuewei D (2008) Detection of forgery in digital video based on pattern noise. Journal of Southeast University (Natural Science Edition) 38(S2): 13–17
Zhou Z, Yang C-N, Chen B, Sun X, Liu Q, Wu QMJ (2016) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans Inf systems E99-D(6):1531–1540. https://doi.org/10.1587/transinf.2015EDP7341
Zhou Z, Wang Y, Wu QMJ, Yang C-N, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48–63. https://doi.org/10.1109/TIFS.2016.2601065
Acknowledgements
This job is supported by Scientific Research Program Funded by Shaanxi Provincial Education Department (Program No.2013JK1139) and Supported by China Postdoctoral Science Foundation (No.2013M542370) and the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20136118120010). And this project is also supported by NSFC Grant (Program No. 11301414 and No.61472318 and No.11226173) and by the Open Program of Xiamen Key Laboratory of Computer Vision and Pattern Recognition, Huaqiao University(600005-Z17X0001).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wei, W., Fan, X., Song, H. et al. Video tamper detection based on multi-scale mutual information. Multimed Tools Appl 78, 27109–27126 (2019). https://doi.org/10.1007/s11042-017-5083-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5083-1