Identifying Video Forgery Process Using Optical Flow

With the extensive equipment of surveillance systems, the assessment of the integrity of surveillance videos is of vital importance. In this paper, an algorithm based on optical flow and anomaly detection is proposed to authenticate digital videos and further identify the inter-frame forgery process (i.e. frame deletion, insertion, and duplication). This method relies on the fact that forgery operation will introduce discontinuity points to the optical flow variation sequence and these points show different characteristics depending on the type of forgery. The anomaly detection scheme is adopted to distinguish the discontinuity points. Experiments were performed on several real-world surveillance videos delicately forged by volunteers. The results show that the proposed algorithm is effective to identify forgery process with localization, and is robust to some degree of MPEG compression.

[1]  Paolo Bestagini,et al.  An overview on video forensics , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[2]  Jing Zhang,et al.  Exposing digital video forgery by ghost shadow artifact , 2009, MiFor '09.

[3]  Felix Naumann,et al.  Data fusion , 2009, CSUR.

[4]  Weizhi Nie,et al.  A frame tampering detection algorithm for MPEG videos , 2011, 2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference.

[5]  Selim Aksoy,et al.  Recognizing Patterns in Signals, Speech, Images and Videos , 2010, Lecture Notes in Computer Science.

[6]  Mo Chen,et al.  Source digital camcorder identification using sensor photo response non-uniformity , 2007, Electronic Imaging.

[7]  Mauro Barni,et al.  Detection of malevolent changes in digital video for forensic applications , 2007, Electronic Imaging.

[8]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.

[9]  Yun Q. Shi,et al.  Detection of Double MPEG Compression Based on First Digit Statistics , 2009, IWDW.

[10]  F. E. Grubbs Procedures for Detecting Outlying Observations in Samples , 1969 .

[11]  Takahiro Okabe,et al.  Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions , 2010, IEEE Transactions on Information Forensics and Security.

[12]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[13]  Chia-Wen Lin,et al.  Video forgery detection using correlation of noise residue , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[14]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[15]  Xinghao Jiang,et al.  A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency , 2012, IWDW.

[16]  James F. O'Brien,et al.  Exposing Digital Forgeries in Ballistic Motion , 2012, IEEE Transactions on Information Forensics and Security.

[17]  Cor J. Veenman,et al.  Verification of Video Source Camera Competition (CAMCOM 2010) , 2010, ICPR Contests.

[18]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting duplication , 2007, MM&Sec.

[19]  Min Wu,et al.  MPEG recompression detection based on block artifacts , 2008, Electronic Imaging.

[20]  Takeo Kanade,et al.  An Iterative Image Registration Technique with an Application to Stereo Vision , 1981, IJCAI.

[21]  Fernando Pérez-González,et al.  Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers , 2013, IWDW.

[22]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[23]  Gaobo Yang,et al.  A MCEA based passive forensics scheme for detecting frame-based video tampering , 2012, Digit. Investig..