skip to main content
10.1145/2766498.2766502acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Liveness verifications for citizen journalism videos

Published:22 June 2015Publication History

ABSTRACT

Citizen journalism videos increasingly complement or even replace the professional news coverage through direct reporting by event witnesses. This raises questions of the integrity and credibility of such videos. We introduce Vamos, the first user transparent video "liveness" verification solution based on video motion, that can be integrated into any mobile video capture application without requiring special user training. Vamos' algorithm not only accommodates the full range of camera movements, but also supports videos of arbitrary length. We develop strong attacks both by utilizing fully automated attackers and by employing trained human experts for creating fraudulent videos to thwart mobile video verification systems.

We introduce the concept of video motion categories to annotate the camera and user motion characteristics of arbitrary videos. We share motion annotations of YouTube citizen journalism videos and of free-form video samples that we collected through a user study. We observe that the performance of Vamos differs across video motion categories. We report the expected performance of Vamos on the real citizen journalism video chunks, by projecting on the distribution of categories. Even though Vamos is based on motion, we observe a surprising and seemingly counter-intuitive resilience against attacks performed on relatively "static" video chunks, which turn out to contain hard-to-imitate involuntary movements. We show that the accuracy of Vamos on the task of verifying whole length videos exceeds 93% against the new attacks.

References

  1. British Broadcasting Corporation. http://www.bbc.com/.Google ScholarGoogle Scholar
  2. Cable News Network. www.cnn.com.Google ScholarGoogle Scholar
  3. Citizen Evidence Lab. http://citizenevidence.org/.Google ScholarGoogle Scholar
  4. Citizentube. http://www.citizentube.com/.Google ScholarGoogle Scholar
  5. CNN iReport. Explore. Discover. Contribute. http://ireport.cnn.com/.Google ScholarGoogle Scholar
  6. Global Specialties R680 C-Programmable Banshi Robotic Arm. http://www.testequipmentdepot.com/products.htm?item=R680&ref=gbase&gclid=CNnOrqi2zsICFe7m7AodMS8A8A.Google ScholarGoogle Scholar
  7. InformaCam: Verified Mobile Media. https://guardianproject.info/apps/informacam/.Google ScholarGoogle Scholar
  8. Open Source Computer Vision. http://opencv.org/.Google ScholarGoogle Scholar
  9. RobotGeek Snapper Robotic Arm. http://www.trossenrobotics.com/robotgeek-snapper-robotic-arm?feed=Froogle&gclid=CNOOps22zsICFcxQ7Aod0GUArw.Google ScholarGoogle Scholar
  10. Sensor Delay. http://developer.android.com/reference/android/hardware/SensorManager.html.Google ScholarGoogle Scholar
  11. Stringwire. Live Video. Made Social. https://stringwire.com/.Google ScholarGoogle Scholar
  12. Weka. http://www.cs.waikato.ac.nz/ml/weka/.Google ScholarGoogle Scholar
  13. Wikipedia current events. http://en.wikipedia.org/wiki/Category:Current_events.Google ScholarGoogle Scholar
  14. Witness. See it. Film it. Change it. witness.org.Google ScholarGoogle Scholar
  15. Witness.org. http://witness.org/.Google ScholarGoogle Scholar
  16. YouTube. http://www.youtube.com.Google ScholarGoogle Scholar
  17. Youtube videos. http://seclab.cs.fiu.edu/resources.Google ScholarGoogle Scholar
  18. Us intelligence officials working to establish authenticity of video of sotloff being killed, reportedly by the same fighter who murdered james foley. http://www.theguardian.com/world/2014/sep/02/isis-video-steven-sotloff-beheading, September 2014.Google ScholarGoogle Scholar
  19. G. Abdollahian, C. M. Taskiran, Z. Pizlo, and E. J. Delp. Camera motion-based analysis of user generated video. IEEE Transactions on Multimedia, 12(1):28--41, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Arlot. Model selection by resampling penalization, 2007.Google ScholarGoogle Scholar
  21. C. M. Bishop. Neural Networks for Pattern Recognition. Oxford University Press, Inc., New York, NY, USA, 1995. Google ScholarGoogle ScholarCross RefCross Ref
  22. L. Breiman. Bagging predictors. Mach. Learn., 24(2):123--140, Aug. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. L. Breiman. Random forests. Machine Learning, 45:5--32, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. L. Cai and H. Chen. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. In Proceedings of the 6th USENIX Conference on Hot Topics in Security (HotSec), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S.-C. Chu, L. C. Jain, H.-C. Huang, and J.-S. Pan. Error-resilient triple-watermarking with multiple description coding. Journal of Networks, 5(3):267--274, 2010.Google ScholarGoogle Scholar
  26. R. free form dataset. http://users.cis.fiu.edu/~mrahm004/RATC/.Google ScholarGoogle Scholar
  27. S. I. Gallant. Perceptron-based learning algorithms. Trans. Neur. Netw., 1(2):179--191, June 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. P. Indyk, G. Iyengar, and N. Shivakumar. Finding pirated video sequences on the internet. Technical report, Stanford University, 1999.Google ScholarGoogle Scholar
  29. H. Liu, S. Saroiu, A. Wolman, and H. Raj. Software abstractions for trusted sensors. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, MobiSys '12, pages 365--378, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Y. Liu, H. Liu, Y. Liu, and F. Sun. User-generated-video summarization using sparse modelling. In Neural Networks (IJCNN), 2014 International Joint Conference on, pages 3909--3915, July 2014.Google ScholarGoogle ScholarCross RefCross Ref
  31. P. Marquardt, A. Verma, H. Carter, and P. Traynor. (sp) iPhone: Decoding Vibrations from Nearby Keyboards using Mobile Phone Accelerometers. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pages 551--562. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M. MÃijller. Dynamic time warping. In Information Retrieval for Music and Motion, pages 69--84. Springer Berlin Heidelberg, 2007.Google ScholarGoogle Scholar
  33. M. Rahman, U. Topkara, and B. Carbunar. Seeing is Not Believing: Visual Verifications Through Liveness Analysis using Mobile Devices. In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. T. Shelton. The most disturbing fake videos making the rounds in Syria. http://www.globalpost.com/dispatch/news/regions/middle-east/syria/121109/fake-syria-videos-images, November 2012.Google ScholarGoogle Scholar
  35. W. Zhang, R. Zhang, X. Liu, C. Wu, and X. Niu. A video watermarking algorithm of h. 264/avc for content authentication. Journal of Networks, 7(8):1150--1154, 2012.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Liveness verifications for citizen journalism videos

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
            June 2015
            256 pages
            ISBN:9781450336239
            DOI:10.1145/2766498

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 22 June 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate98of338submissions,29%

            Upcoming Conference

            WiSec '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader