Skip to main content

Semi-automatic Methods in Video Forgery Detection Based on Multi-view Dimension

  • Conference paper
  • First Online:
Recent Trends in Information and Communication Technology (IRICT 2017)

Abstract

The availability of powerful editing software sophisticated digital cameras, and region duplication is becoming more and more popular in video manipulation where parts of video frames is pasted to another location to conceal undesirable objects. Most existing techniques to detect such tampering are mainly at the cost of higher computational complexity. Multi-view video contains locating a moving object (or multiple objects) over time and several frames representing different views of the same scene of the true width and height of an object in the front view are placed in the sequences of frames plane. In this paper, a new technique for video forgery detection using semi-automatic methods can be used for the three types of video forgery detection: (1) Copy-Move, (2) Splicing, and (3) Swapping-Frames based on a new dimension of multi-view frames. Thus, this idea is proposing new video views based on slices of video frames in Top-View and Side-View in doctored video. Experiment results show that our proposed schemes for new video views enable easy detection of visual inspection is used for the evaluation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Suhail, M.A., Obaidat, M.S.: Digital watermarking-based DCT and JPEG model. IEEE Trans. Instrum. Meas. 52, 1640–1647 (2003)

    Article  Google Scholar 

  2. Di Martino, F., Sessa, S.: Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf. Sci. 195, 62–90 (2012)

    Article  Google Scholar 

  3. Ram, S., Bischof, H., Birchbauer, J.: Active fingerprint ridge orientation models. In: International Conference on Biometrics, pp. 534–543. Springer (2009)

    Google Scholar 

  4. Boice, C.E., Hall, B.A., Ngai, A.Y., Westermann, E.F.: Method of precise buffer management for MPEG video splicing. Google Patents (2001)

    Google Scholar 

  5. Liao, S.-Y., Huang, T.-Q.: Video copy-move forgery detection and localization based on Tamura texture features. In: IEEE 2013 6th International Congress on Image and Signal Processing (CISP), pp. 864–868. IEEE Press (2013)

    Google Scholar 

  6. Al-Sanjary, O.I., Ahmed, A.A., Sulong, G.: Development of a video tampering dataset for forensic investigation. Forensic Sci. Int. 266, 565–572 (2016)

    Article  Google Scholar 

  7. Bestagini, P., Milani, S., Tagliasacchi, M., Tubaro, S.: Local tampering detection in video sequences. In: 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp. 488–493. IEEE (2013)

    Google Scholar 

  8. Mahmood, T., Nawaz, T., Irtaza, A., Ashraf, R., Shah, M., Mahmood, M.T.: Copy-move forgery detection technique for forensic analysis in digital images. Math. Probl. Eng. 2016, 1–13 (2016)

    Article  Google Scholar 

  9. Hsu, C.-C., Hung, T.-Y., Lin, C.-W., Hsu, C.-T.: Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 170–174. IEEE Press (2008)

    Google Scholar 

  10. Lin, G.-S., Chang, J.-F., Chuang, C.-H.: Detecting frame duplication based on spatial and temporal analyses. In: 2011 6th International Conference on Computer Science and Education (ICCSE), pp. 1396–1399. IEEE Press (2011)

    Google Scholar 

  11. D’Amiano, L., Cozzolino, D., Poggi, G., Verdoliva, L.: Video forgery detection and localization based on 3D patchmatch. In: 2015 IEEE International Conference on Multimedia and Expo Workshops (ICMEW), pp. 1–6. IEEE Press (2015)

    Google Scholar 

  12. Lin, C.-S., Tsay, J.-J.: A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digit. Invest. 11, 120–140 (2014)

    Article  Google Scholar 

  13. Kobayashi, M., Okabe, T., Sato, Y.: Detecting forgery from static-scene video based on inconsistency in noise level functions. IEEE Trans. Inf. Forensics Secur. 5, 883–892 (2010)

    Article  Google Scholar 

  14. Parveen, S.S., Palanikkumar, D.: A novel approach for inter frame copy move forgery detection. Int. J. Appl. Inf. Commun. Eng. 1, 60–62 (2015)

    Google Scholar 

  15. Subramanyam, A., Emmanuel, S.: Video forgery detection using HOG features and compression properties. In: IEEE 14th International Workshop on Multimedia Signal Processing (MMSP), pp. 89–94. IEEE Press (2012)

    Google Scholar 

  16. Qadir, G., Yahaya, S., Ho, A.T.: Surrey University Library for Forensic Analysis (SULFA) of video content. In: IET Conference on Image Processing (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omar Ismael Al-Sanjary .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Al-Sanjary, O.I., Ghazali, N., Ahmed, A.A., Sulong, G. (2018). Semi-automatic Methods in Video Forgery Detection Based on Multi-view Dimension. In: Saeed, F., Gazem, N., Patnaik, S., Saed Balaid, A., Mohammed, F. (eds) Recent Trends in Information and Communication Technology. IRICT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 5. Springer, Cham. https://doi.org/10.1007/978-3-319-59427-9_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59427-9_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59426-2

  • Online ISBN: 978-3-319-59427-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics