Skip to main content

Video Tamper Detection Based on Convolutional Neural Network and Perceptual Hashing Learning

  • Conference paper
  • First Online:
Advances in Computer Graphics (CGI 2019)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 11542))

Included in the following conference series:

Abstract

Perceptual hashing has been widely used in the field of multimedia security. The difficulty of the traditional perceptual hashing algorithm is to find suitable perceptual features. In this paper, we propose a perceptual hashing learning method for tamper detection based on convolutional neural network, where a hashing layer in the convolutional neural network is introduced to learn the features and hash functions. Specifically, the video is decomposed to obtain temporal representative frame (TRF) sequences containing temporal and spatial domain information. Convolutional neural network is then used to learn visual features of each TRF. We further put each feature into the hashing layer to learn independent hash functions and fuse these features to generate the video hash. Finally, the hash functions and the corresponding video hash are obtained by minimizing the classification loss and quantization error loss. Experimental results and comparisons with state-of-the-art methods show that the algorithm has better classification performance and can effectively perform tamper detection.

Supported in part by grants from the Natural Science Foundation of Guangdong Province, China (Nos. 2018A030313381), the Shenzhen Research Foundation for Basic Research, China (Nos. JCYJ20170302153551588).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Niu, X., Jiao, Y.: An overview of perceptual hashing. Acta Electronica Sinica 36(7), 1405–1411 (2008)

    Google Scholar 

  2. Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: 1996 Proceedings of International Conference on Image Processing, vol. 3, pp. 227–230. IEEE (1996)

    Google Scholar 

  3. Lu, J.: Video fingerprinting for copy identification: from research to industry applications. In: Media Forensics and Security, vol. 7254, p. 725402. International Society for Optics and Photonics (2009)

    Google Scholar 

  4. Wolfson, H.J., Rigoutsos, I.: Geometric hashing: an overview. IEEE Comput. Sci. Eng. 4(4), 10–21 (1997)

    Article  Google Scholar 

  5. Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097–1105 (2012)

    Google Scholar 

  6. Han, D., Liu, Q., Fan, W.: A new image classification method using CNN transfer learning and web data augmentation. Expert Syst. Appl. 95, 43–56 (2018)

    Article  Google Scholar 

  7. Lee, S., Yoo, C.D.: Video fingerprinting based on centroids of gradient orientations. In: Proceedings of 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2006, vol. 2, p. II. IEEE (2006)

    Google Scholar 

  8. De Roover, C., De Vleeschouwer, C., Lefebvre, F., Macq, B.: Robust video hashing based on radial projections of key frames. IEEE Trans. Sig. Process. 53(10), 4020–4037 (2005)

    Article  MathSciNet  Google Scholar 

  9. Coskun, B., Sankur, B., Memon, N.: Spatio-temporal transform based video hashing. IEEE Trans. Multimedia 8(6), 1190–1208 (2006)

    Article  Google Scholar 

  10. Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Sig. Process. Lett. 22(11), 1849–1853 (2015)

    Article  Google Scholar 

  11. Yao, Y., Shi, Y., Weng, S., Guan, B.: Deep learning for detection of object-based forgery in advanced video. Symmetry 10(1), 3 (2017)

    Article  Google Scholar 

  12. Liu, X., Sun, J., Liu, J.: Shot-based temporally respective frame generation algorithm for video hashing. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 109–114. IEEE (2013)

    Google Scholar 

  13. Wang, X., Gao, L., Song, J., Shen, H.: Beyond frame-level CNN: saliency-aware 3-D CNN with LSTM for video action recognition. IEEE Sig. Process. Lett. 24(4), 510–514 (2017)

    Article  Google Scholar 

  14. Peng, T., Li, F.: Image retrieval based on deep convolutional neural networks and binary hashing learning. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1742–1746. IEEE (2017)

    Google Scholar 

  15. Soomro, K., Zamir, A.R., Shah, M.: Ucf101: a dataset of 101 human actions classes from videos in the wild. arXiv preprint arXiv:1212.0402 (2012)

  16. Chen, S., Tan, S., Li, B., Huang, J.: Automatic detection of object-based forgery in advanced video. IEEE Trans. Circ. Syst. Video Technol. 26(11), 2138–2151 (2016)

    Article  Google Scholar 

  17. Lee, S., Yoo, C.D.: Robust video fingerprinting for content-based video identification. IEEE Trans. Circ. Syst. Video Technol. 18(7), 983–988 (2008)

    Article  Google Scholar 

  18. Saikia, N.: Perceptual hashing in the 3D-DWT domain. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 694–698. IEEE (2015)

    Google Scholar 

  19. Nie, X., Liu, J., Sun, J., Zhao, H.: Key-frame based robust video hashing using isometric feature mapping. J. Comput. Inf. Syst. 7(6), 2112–2119 (2011)

    Google Scholar 

  20. Ma, C., Gu, Y., Liu, W., Yang, J., He, X.: Unsupervised video hashing by exploiting spatio-temporal feature. In: Hirose, A., Ozawa, S., Doya, K., Ikeda, K., Lee, M., Liu, D. (eds.) ICONIP 2016. LNCS, vol. 9949, pp. 511–518. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46675-0_56

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yawen Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, H., Zhou, Y., Wen, Z. (2019). Video Tamper Detection Based on Convolutional Neural Network and Perceptual Hashing Learning. In: Gavrilova, M., Chang, J., Thalmann, N., Hitzer, E., Ishikawa, H. (eds) Advances in Computer Graphics. CGI 2019. Lecture Notes in Computer Science(), vol 11542. Springer, Cham. https://doi.org/10.1007/978-3-030-22514-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22514-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22513-1

  • Online ISBN: 978-3-030-22514-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics