Video Tamper Detection Based on Convolutional Neural Network and Perceptual Hashing Learning

  • Huisi Wu
  • Yawen ZhouEmail author
  • Zhenkun Wen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11542)


Perceptual hashing has been widely used in the field of multimedia security. The difficulty of the traditional perceptual hashing algorithm is to find suitable perceptual features. In this paper, we propose a perceptual hashing learning method for tamper detection based on convolutional neural network, where a hashing layer in the convolutional neural network is introduced to learn the features and hash functions. Specifically, the video is decomposed to obtain temporal representative frame (TRF) sequences containing temporal and spatial domain information. Convolutional neural network is then used to learn visual features of each TRF. We further put each feature into the hashing layer to learn independent hash functions and fuse these features to generate the video hash. Finally, the hash functions and the corresponding video hash are obtained by minimizing the classification loss and quantization error loss. Experimental results and comparisons with state-of-the-art methods show that the algorithm has better classification performance and can effectively perform tamper detection.


Video tamper detection Perceptual hashing Convolutional neural network Temporal representative frame 


  1. 1.
    Niu, X., Jiao, Y.: An overview of perceptual hashing. Acta Electronica Sinica 36(7), 1405–1411 (2008)Google Scholar
  2. 2.
    Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: 1996 Proceedings of International Conference on Image Processing, vol. 3, pp. 227–230. IEEE (1996)Google Scholar
  3. 3.
    Lu, J.: Video fingerprinting for copy identification: from research to industry applications. In: Media Forensics and Security, vol. 7254, p. 725402. International Society for Optics and Photonics (2009)Google Scholar
  4. 4.
    Wolfson, H.J., Rigoutsos, I.: Geometric hashing: an overview. IEEE Comput. Sci. Eng. 4(4), 10–21 (1997)CrossRefGoogle Scholar
  5. 5.
    Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097–1105 (2012)Google Scholar
  6. 6.
    Han, D., Liu, Q., Fan, W.: A new image classification method using CNN transfer learning and web data augmentation. Expert Syst. Appl. 95, 43–56 (2018)CrossRefGoogle Scholar
  7. 7.
    Lee, S., Yoo, C.D.: Video fingerprinting based on centroids of gradient orientations. In: Proceedings of 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2006, vol. 2, p. II. IEEE (2006)Google Scholar
  8. 8.
    De Roover, C., De Vleeschouwer, C., Lefebvre, F., Macq, B.: Robust video hashing based on radial projections of key frames. IEEE Trans. Sig. Process. 53(10), 4020–4037 (2005)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Coskun, B., Sankur, B., Memon, N.: Spatio-temporal transform based video hashing. IEEE Trans. Multimedia 8(6), 1190–1208 (2006)CrossRefGoogle Scholar
  10. 10.
    Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Sig. Process. Lett. 22(11), 1849–1853 (2015)CrossRefGoogle Scholar
  11. 11.
    Yao, Y., Shi, Y., Weng, S., Guan, B.: Deep learning for detection of object-based forgery in advanced video. Symmetry 10(1), 3 (2017)CrossRefGoogle Scholar
  12. 12.
    Liu, X., Sun, J., Liu, J.: Shot-based temporally respective frame generation algorithm for video hashing. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 109–114. IEEE (2013)Google Scholar
  13. 13.
    Wang, X., Gao, L., Song, J., Shen, H.: Beyond frame-level CNN: saliency-aware 3-D CNN with LSTM for video action recognition. IEEE Sig. Process. Lett. 24(4), 510–514 (2017)CrossRefGoogle Scholar
  14. 14.
    Peng, T., Li, F.: Image retrieval based on deep convolutional neural networks and binary hashing learning. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1742–1746. IEEE (2017)Google Scholar
  15. 15.
    Soomro, K., Zamir, A.R., Shah, M.: Ucf101: a dataset of 101 human actions classes from videos in the wild. arXiv preprint arXiv:1212.0402 (2012)
  16. 16.
    Chen, S., Tan, S., Li, B., Huang, J.: Automatic detection of object-based forgery in advanced video. IEEE Trans. Circ. Syst. Video Technol. 26(11), 2138–2151 (2016)CrossRefGoogle Scholar
  17. 17.
    Lee, S., Yoo, C.D.: Robust video fingerprinting for content-based video identification. IEEE Trans. Circ. Syst. Video Technol. 18(7), 983–988 (2008)CrossRefGoogle Scholar
  18. 18.
    Saikia, N.: Perceptual hashing in the 3D-DWT domain. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 694–698. IEEE (2015)Google Scholar
  19. 19.
    Nie, X., Liu, J., Sun, J., Zhao, H.: Key-frame based robust video hashing using isometric feature mapping. J. Comput. Inf. Syst. 7(6), 2112–2119 (2011)Google Scholar
  20. 20.
    Ma, C., Gu, Y., Liu, W., Yang, J., He, X.: Unsupervised video hashing by exploiting spatio-temporal feature. In: Hirose, A., Ozawa, S., Doya, K., Ikeda, K., Lee, M., Liu, D. (eds.) ICONIP 2016. LNCS, vol. 9949, pp. 511–518. Springer, Cham (2016). Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Shenzhen UniversityShenzhenChina

Personalised recommendations