Skip to main content
Log in

Detection and localization of frame duplication using binary image template

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Videos are one of the most substantial evidence that can be used to detect incidents. However, videos can be altered easily using current technologies. Alterations can be made for malicious purposes. Therefore, it is essential to determine the integrity of the videos that will be used as evidence or to give people the right idea. Alterations on the videos that have not previously added control data are within the scope of passive fraud detection. This study proposes an effective solution for detecting frame duplication attacks, which is one of the passive forgery types. The study is based on the visualization of feature vectors. A binary image is created with the feature matrix using feature vectors. Thus, a representative approach to the problem is presented. The forged frame-group template is obtained by processing the binary image, and then a search is done using this template. The proposed method provides solutions for both uncompressed and compressed videos. The algorithm’s durability against compression has been tested by evaluating MPEG4 and H264 coded videos. A blurring attack can also be applied to the altered videos to hide the forgery. The results show that it is resistant to blurring attacks. Another factor that complicates fraud detection is the location of the forgery. The algorithm can detect forgery at the beginning or end of the video. The source of the forged frames can also be detected in the study. Experimental results show that the algorithm is resistant to compression, fast, and has a high accuracy rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29

Similar content being viewed by others

Data availability

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Bakas J, Naskar R, Dixit R (2019) Detection and localization of inter-frame video forgeries based on inconsistency in correlation distribution between Haralick coded frames. Multimed Tools Appl 78(4):4905–4935. https://doi.org/10.1007/s11042-018-6570-8

    Article  Google Scholar 

  2. Bakas J, Naskar R, Bakshi S (2021) Detection and localization of inter-frame forgeries in videos based on macroblock variation and motion vector analysis. Comput Electr Eng 89:106929. https://doi.org/10.1016/j.compeleceng.2020.106929

    Article  Google Scholar 

  3. Bozkurt I, Bozkurt MH, Ulutaş G (2017) A new video forgery detection approach based on forgery line. Turk J Electr Eng Comput Sci 25(6):4558–4574

    Article  Google Scholar 

  4. Fadl SM, Han Q, Li Q (2018) Authentication of surveillance videos: detecting frame duplication based on residual frame. J Forensic Sci 63(4):1099–1109. https://doi.org/10.1111/1556-4029.13658

    Article  Google Scholar 

  5. Fayyaz MA, Anjum A, Ziauddin S, Khan A, Sarfaraz A (2020) An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues. Multimed Tools Appl 79(9):5767–5788. https://doi.org/10.1007/s11042-019-08236-2

    Article  Google Scholar 

  6. Hosler B, Mayer O, Bayar B, Zhao X, Chen C, Shackleford JA, Stamm MC (2019) A video camera model identification system using deep learning and fusion. In: ICASSP 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 8271–8275

  7. Hosny KM, Hamza HM, Lashin NA (2018) Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators. Imaging Sci J 66(6):330–345. https://doi.org/10.1080/13682199.2018.1461345

    Article  Google Scholar 

  8. Hosny KM, Hamza HM, Lashin NA (2019) Copy-for-duplication forgery detection in colour images using QPCETMs and sub-image approach. IET Image Process 13(9):1437–1446

    Article  Google Scholar 

  9. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800–801

    Article  Google Scholar 

  10. IeeeXplore. https://ieeexplore.ieee.org/search/searchresult.jsp?newsearch=true&querytext=passive%20video%20forgery. Accessed 16 Jan 2022

  11. Jain AK (1989) Fundamentals of digital image processing. Prentice-Hall, Inc., Englewood Cliffs

    MATH  Google Scholar 

  12. Kharat J, Chougule S (2020) A passive blind forgery detection technique to identify frame duplication attack. Multimed Tools Appl 79(11):8107–8123. https://doi.org/10.1007/s11042-019-08272-y

    Article  Google Scholar 

  13. Li F, Huang T (2014) Video copy-move forgery detection and localization based on structural similarity. In: Proceedings of the 3rd international conference on multimedia technology (ICMT 2013). Springer, Berlin, pp 63–76

  14. Li X, Xiao X, Li J, Hu C, Yao J, Li S (2022) A CNN-based misleading video detection model. Sci Rep 12(1):1–9. https://doi.org/10.1038/s41598-022-10117-y

    Article  Google Scholar 

  15. Lin GS, Chang JF, Chuang CH (2011) Detecting frame duplication based on spatial and temporal analyses. In: 2011 6th international conference on computer science & education (ICCSE). IEEE, pp 1396–1399

  16. Long C, Basharat A, Hoogs A (2022) Video frame deletion and duplication. In: Multimedia forensics. Springer, Singapore, pp 333–362

  17. Meena KB, Tyagi V (2019) A copy-move image forgery detection technique based on Gaussian-Hermite moments. Multimed Tools Appl 78(23):33505–33526. https://doi.org/10.1007/s11042-019-08082-2

    Article  Google Scholar 

  18. Mukherjee P, Mitra S (2015) A review on copy-move forgery detection techniques based on DCT and DWT. Int J Comput Sci Mob Comput IJCSMC 4(3):702–708

    Google Scholar 

  19. Nabi ST, Kumar M, Singh P, Aggarwal N, Kumar K (2022) A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions. Multimedia Systems 28:1–54. https://doi.org/10.1007/s00530-021-00873-8

    Article  Google Scholar 

  20. Pennebaker WB, Mitchell JL (1992) JPEG: still image data compression standard. Springer Science & Business Media

  21. Peterson LL, Davie BS (2007) Computer networks: a systems approach. Elsevier

    MATH  Google Scholar 

  22. Prasath R, Kathirvalavakumar T (2013) Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): preface. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 8284 Lnai. https://doi.org/10.1007/978-3-319-03844-5

  23. Pu H, Huang T, Weng B, Ye F, Zhao C (2021) Overcome the brightness and jitter noises in video inter-frame tampering detection. Sensors 21(12):3953. https://doi.org/10.3390/s21123953

    Article  Google Scholar 

  24. Qadir G, Yahaya S, Ho AT (2012) Surrey university library for forensic analysis (SULFA) of video content

  25. Ren H, Atwa W, Zhang H, Muhammad S, Emam M (2021) Frame duplication forgery detection and localization algorithm based on the improved Levenshtein distance. Sci Program 2021. https://doi.org/10.1155/2021/5595850

  26. Sciencedirect. https://www.sciencedirect.com/search?qs=passive%20video%20forgery&subjectareas=1700&lastselectedfacet=subjectareas. Accessed 16 Jan 2022

  27. Scopus. https://www.scopus.com/term/analyzer.uri?sid=9d9cc2ec729fd090502e7115ddf07853&origin=resultslist&src=s&s=key%28passive+video+forgery%29&sort=plf-f&sdt=b&sot=b&sl=26&count=32&analyzeresults=analyze+results&txgid=b059578e91d5f859d3579b9f84eb8afa. Accessed 16 Jan 2022

  28. Shelke NA, Kasana SS (2021) A comprehensive survey on passive techniques for digital video forgery detection. Multimed Tools Appl 80(4):6247–6310. https://doi.org/10.1007/s11042-020-09974-4

    Article  Google Scholar 

  29. Shelke NA, Kasana SS (2021) Multiple forgeries identification in digital video based on correlation consistency between entropy coded frames. Multimed Syst:1–14. https://doi.org/10.1007/s00530-021-00837-y

  30. Singh RD, Aggarwal N (2017) Optical flow and prediction residual based hybrid forensic system for inter-frame tampering detection. J Circuits Syst Comput 26(07):1750107. https://doi.org/10.1142/S0218126617501079

    Article  Google Scholar 

  31. Singh RD, Aggarwal N (2021) Optical flow and pattern noise-based copy–paste detection in digital videos. Multimed Syst 27(3):449–469. https://doi.org/10.1007/s00530-020-00749-3

    Article  Google Scholar 

  32. Singh G, Singh K (2019) Video frame and region duplication forgery detection based on correlation coefficient and coefficient of variation. Multimed Tools Appl 78(9):11527–11562. https://doi.org/10.1007/s11042-018-6585-1

    Article  Google Scholar 

  33. Sitara K, Mehtre BM (2018) Detection of inter-frame forgeries in digital videos. Forensic Sci Int 289:186–206. https://doi.org/10.1016/j.forsciint.2018.04.056

    Article  Google Scholar 

  34. Su Y, Xu J (2010) Detection of double-compression in MPEG-2 videos. In: 2010 2nd international workshop on intelligent systems and applications. IEEE, pp 1–4

  35. Su Y, Nie W, Zhang C (2011) A frame tampering detection algorithm for MPEG videos. In: 2011 6th IEEE joint international information technology and artificial intelligence conference, vol 2. IEEE, pp 461–464

  36. Thajeel SA, Mahmood AS, Humood WR, Sulong G (2019) Detection copy-move forgery in image via quaternion polar harmonic transforms. KSII Trans Internet Inf Syst (TIIS) 13(8):4005–4025. https://doi.org/10.3837/tiis.2019.08.010

    Article  Google Scholar 

  37. Trace Library. Http://Trace.Eas.Asu.Edu/Yuv/Index.Html. Accessed 16 Jan 2022

  38. Ulutas G, Ustubioglu B, Ulutas M, Nabiyev V (2017) Frame duplication/mirroring detection method with binary features. IET Image Process 11(5):333–342

    Article  Google Scholar 

  39. Ulutas G, Ustubioglu B, Ulutas M, Nabiyev VV (2018) Frame duplication detection based on bow model. Multimedia Systems 24(5):549–567. https://doi.org/10.1007/s00530-017-0581-6

    Article  Google Scholar 

  40. Ulutas G, Ustubioglu B, Ulutas M, Nabiyev V (2020) Video forgery detection method based on local difference binary. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi 26(5):983–992

    Google Scholar 

  41. Ustubioglu B, Ulutas G, Ulutas M, Nabiyev V, Ustubioglu A (2016) LBP-DCT based copy move forgery detection algorithm. In: information sciences and systems 2015. Springer, Cham, pp 127–136

  42. Vinolin V, Sucharitha M (2021) Video forgery detection using distance-based features and deep convolutional neural network. In: 2021 4th international conference on computing and communications technologies (ICCCT). IEEE, pp 350–355

  43. Wang W, Farid H (2007) Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th workshop on multimedia & security, pp 35–42. https://doi.org/10.1145/1288869.1288876

  44. Wang W, Farid H (2009) Exposing digital forgeries in video by detecting double quantization. In: Proceedings of the 11th ACM workshop on multimedia and security, pp 39–48

  45. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  46. Wang C, Zhang Z, Li Q, Zhou X (2019) An image copy-move forgery detection method based on SURF and PCET. IEEE Access 7:170032–170047

    Article  Google Scholar 

  47. Wei W, Fan X, Song H, Wang H (2019) Video tamper detection based on multi-scale mutual information. Multimed Tools Appl 78(19):27109–27126. https://doi.org/10.1007/s11042-017-5083-1

    Article  Google Scholar 

  48. Xu J, Su Y, You X (2012) Detection of video transcoding for digital forensics. In: 2012 international conference on audio, language and image processing. IEEE, pp 160–164

  49. Xu J, Su Y, Liu Q (2013) Detection of double MPEG-2 compression based on distributions of DCT coefficients. Int J Pattern Recognit Artif Intell 27(01):1354001. https://doi.org/10.1142/S0218001413540013

    Article  MathSciNet  Google Scholar 

  50. Yang J, Huang T, Su L (2016) Using similarity analysis to detect frame duplication forgery in videos. Multimed Tools Appl 75(4):1793–1811. https://doi.org/10.1007/s11042-014-2374-7

    Article  Google Scholar 

  51. Zhang Z, Hou J, Li Z, Li D (2015) Inter-frame forgery detection for static-background video based on MVP consistency. In: International workshop on digital watermarking. Springer, Cham, pp 94–106. https://doi.org/10.1007/978-3-319-31960-5_9

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Işılay Bozkurt.

Ethics declarations

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bozkurt, I., Ulutaş, G. Detection and localization of frame duplication using binary image template. Multimed Tools Appl 82, 31001–31034 (2023). https://doi.org/10.1007/s11042-023-14602-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14602-y

Keywords

Navigation