Skip to main content

Toward Video Tampering Exposure: Inferring Compression Parameters from Pixels

  • Conference paper
  • First Online:
Engineering Applications of Neural Networks (EANN 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 893))

Abstract

Video tampering detection remains an open problem in the field of digital media forensics. Some existing methods focus on recompression detection because any changes made to the pixels of a video will require recompression of the complete stream. Recompression can be ascertained whenever there is a mismatch between compression parameters encoded in the syntax elements of the compressed bitstream and those derived from the pixels themselves. However, deriving compression parameters directly and solely from the pixels is not trivial. In this paper we propose a new method to estimate the H.264/AVC quantisation parameter (QP) in frame patches from raw pixels using Convolutional Neural Networks (CNN) and class composition. Extensive experiments show that QP of key-frames can be estimated using CNN. Results also show that accuracy drops for predicted frames. These results open new, interesting research directions in the domain of video tampering/forgery detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Available from Derf’s Media Collection: https://media.xiph.org/video/derf/.

  2. 2.

    UCID images from http://jasoncantarella.com/downloads/ucid.v2.tar.gz.

  3. 3.

    Training sequences: akiyo, bridge-close, bridge-far, carphone, claire, coastguard, foreman, hall, highway, mobile, mother-daughter, paris, silent, stefan, waterfall, old_town_cross, crowd_run, ducks_take_off, in_to_tree, mobcal, old_town_cross, parkrun, shields. Test sequences: bus, flower, news, tempete.

References

  1. Suwajanakorn, S., Seitz, S.M., Kemelmacher-Shlizerman, I.: Synthesizing obama: learning lip sync from audio. ACM Trans. Graph. 36, 95 (2017)

    Article  Google Scholar 

  2. Liu, M.-Y., Breuel, T., Kautz, J.: Unsupervised image-to-image translation networks. In: Advances in Neural Information Processing Systems (2017)

    Google Scholar 

  3. Sitara, K., Mehtre, B.M.: Digital video tampering detection: an overview of passive techniques. Digit. Invest. 18, 8–22 (2016)

    Article  Google Scholar 

  4. Qureshi, M.A., Deriche, M.: A bibliography of pixel-based blind image forgery detection techniques. Signal Process. Image Commun. 39, 46–74 (2015)

    Article  Google Scholar 

  5. Chauhan, D., Kasat, D., Jain, S., Thakare, V.: Survey on keypoint based copy-move forgery detection methods on image. Procedia Comput. Sci. 85, 206–212 (2016)

    Article  Google Scholar 

  6. Pandey, R.C., Singh, S.K., Shukla, K.K.: Passive forensics in image and video using noise features: a review. Digit. Invest. 19, 1–28 (2016)

    Article  Google Scholar 

  7. Singh, R.D., Aggarwal, N.: Video content authentication techniques: a comprehensive survey. Multimed. Syst. 24, 211–240 (2017)

    Article  Google Scholar 

  8. Ravi, H., Subramanyam, A.V., Gupta, G., Kumar, B.A.: Compression noise based video forgery detection. In: IEEE International Conference on Image Processing. IEEE (2014)

    Google Scholar 

  9. ITU-T. H.264: Advanced video coding for generic audiovisual services. ITU-T (2016)

    Google Scholar 

  10. ITU-T. H.262: Information technology - Generic coding of moving pictures and associated audio information: Video. ITU-T (2012)

    Google Scholar 

  11. Dodge, S., Karam, L.: Understanding how image quality affects deep neural networks. In: International Conference on Quality of Multimedia Experience. IEEE (2016)

    Google Scholar 

  12. Lin, C.-S., Tsay, J.-J.: A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digit. Invest. 11, 120–140 (2014)

    Article  Google Scholar 

  13. Elyan, E., Gaber, M.M.: A fine-grained random forests using class decomposition: an application to medical diagnosis. Neural Comput. Appl. 27, 2279–2288 (2016)

    Article  Google Scholar 

  14. Bosse, S., Maniry, D., Wiegand, T., Samek, W.: A deep neural network for image quality assessment. In: IEEE International Conference on Image Processing. IEEE (2016)

    Google Scholar 

  15. Chen, Y.-J., Lin, Y.-J., Hsieh, S.-L.: Analysis of video quality variation with different bit rates of H. 264 compression. J. Comput. Commun. 4, 32 (2016)

    Article  Google Scholar 

  16. Richardson, I.E.: The H. 264 Advanced Video Compression Standard. Wiley, Hoboken (2011)

    Google Scholar 

  17. ITU-T. H.265: High efficiency video coding. ITU-T (2016)

    Google Scholar 

  18. Sun, T., Wang, W., Jiang, X.: Exposing video forgeries by detecting mpeg double compression. In: IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE (2012)

    Google Scholar 

  19. Milani, S., Bestagini, P., Tagliasacchi, M., Tubaro, S.: Multiple compression detection for video sequences. In: IEEE International Workshop on Multimedia Signal Processing. IEEE (2012)

    Google Scholar 

  20. Schaefer, G., Stich, M.: Ucid: an uncompressed color image database. In: Storage and Retrieval Methods and Applications for Multimedia. International Society for Optics and Photonics (2003)

    Google Scholar 

  21. Bondi, L., Lameri, S., Güera, D., Bestagini, P., Delp, E.J., Tubaro, S.: Tampering detection and localization through clustering of camera-based CNN features. In: CVPR Workshops (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pamela Johnston .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Johnston, P., Elyan, E., Jayne, C. (2018). Toward Video Tampering Exposure: Inferring Compression Parameters from Pixels. In: Pimenidis, E., Jayne, C. (eds) Engineering Applications of Neural Networks. EANN 2018. Communications in Computer and Information Science, vol 893. Springer, Cham. https://doi.org/10.1007/978-3-319-98204-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98204-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98203-8

  • Online ISBN: 978-3-319-98204-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics