Digital video forensics

We present new forensic tools that are capable of detecting traces of tampering in digital video without the use of watermarks or specialized hardware. These tools operate under the assumption that video contain naturally occurring properties which are disturbed by tampering, and which can be quantified, measured, and used to expose video fakes. In this context, we offer five new forensic tools (1) Interlaced, (2) De-interlaced, (3) Double Compression, (4) Duplication, and (5) Re-projection, where each technique targets a specific statistical or geometric artifact. Combined, these tools provide a valuable first set of forensic tools for authenticating digital video.

[1]  C. D. Kuglin,et al.  The phase correlation image alignment method , 1975 .

[2]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[3]  Takeo Kanade,et al.  An Iterative Image Registration Technique with an Application to Stereo Vision , 1981, IJCAI.

[4]  H. C. Longuet-Higgins,et al.  A computer algorithm for reconstructing a scene from two projections , 1981, Nature.

[5]  C. Morandi,et al.  Registration of Translated and Rotated Images Using Finite Fourier Transforms , 1987, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Y. J. Tejwani,et al.  Robot vision , 1989, IEEE International Symposium on Circuits and Systems,.

[7]  Olivier D. Faugeras,et al.  Some Properties of the E Matrix in Two-View Motion Estimation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[8]  C. Tomasi Detection and Tracking of Point Features , 1991 .

[9]  Richard I. Hartley,et al.  Estimation of Relative Camera Positions for Uncalibrated Cameras , 1992, ECCV.

[10]  Reginald L. Lagendijk,et al.  Motion compensated frame rate conversion of motion pictures , 1992, [Proceedings] ICASSP-92: 1992 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[11]  Carlo Tomasi,et al.  Good features to track , 1994, 1994 Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.

[12]  Roberto Castagno,et al.  A method for motion adaptive frame rate up-conversion , 1996, IEEE Trans. Circuits Syst. Video Technol..

[13]  Richard I. Hartley,et al.  In Defense of the Eight-Point Algorithm , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[14]  MPEG-1 and MPEG-2 Digital Video Coding Standards , 1997 .

[15]  Erwin B. Bellers,et al.  Deinterlacing-an overview , 1998, Proc. IEEE.

[16]  Kenji Kurosawa,et al.  CCD fingerprint method-identification of a video camera from videotaped images , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[17]  Eero P. Simoncelli Bayesian multi-scale differential optical flow , 1999 .

[18]  Jed Deame Motion Compensated De-Interlacing: The Key to the Digital Video Transition , 1999 .

[19]  Paulo R. S. Mendonça,et al.  A simple technique for self-calibration , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[20]  Kenji Sugiyama,et al.  A method of de-interlacing with motion compensated interpolation , 1999, 1999 Digest of Technical Papers. International Conference on Consumer Electronics (Cat. No.99CH36277).

[21]  Zhengyou Zhang,et al.  A Flexible New Technique for Camera Calibration , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[22]  Alexander D. Poularikas De-interlacing: A Key Technology for Scan Rate Conversion , 2000 .

[23]  Erwin B. Bellers,et al.  De-Interlacing: A Key Technology for Scan Rate Conversion , 2000 .

[24]  Bernhard P. Wrobel,et al.  Multiple View Geometry in Computer Vision , 2001 .

[25]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[26]  E. Delp,et al.  Security, steganography, and watermarking of multimedia contents , 2004 .

[27]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[28]  Eero P. Simoncelli,et al.  Differentiation of Discrete Multi-Dimensional Signals , 2004 .

[29]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[30]  Shih-Fu Chang,et al.  A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[31]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[32]  David J. Fleet,et al.  Performance of optical flow techniques , 1994, International Journal of Computer Vision.

[33]  Ketan Mayer-Patel,et al.  The berkeley software MPEG-1 video decoder , 2005, TOMCCAP.

[34]  Ming Gu,et al.  Advanced Motion Search and Adaptation Techniques for Deinterlacing , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[35]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[36]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[37]  Jiwu Huang,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[38]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.

[39]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[40]  Junfeng He,et al.  Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.

[41]  Micah K. Johnson,et al.  Metric Measurements on a Plane from a Single Image , 2006 .

[42]  Qiong Wu,et al.  A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[43]  Hany Farid,et al.  Exposing Digital Forgeries Through Specular Highlights on the Eye , 2007, Information Hiding.

[44]  Shih-Fu Chang,et al.  Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[45]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[46]  Mo Chen,et al.  Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries , 2007, Information Hiding.

[47]  Hany Farid,et al.  Detecting Photographic Composites of People , 2008, IWDW.

[48]  Mauro Barni,et al.  Detection of malevolent changes in digital video for forensic applications , 2007, Electronic Imaging.

[49]  Mo Chen,et al.  Source digital camcorder identification using sensor photo response non-uniformity , 2007, Electronic Imaging.

[50]  H. Farid A Survey of Image Forgery Detection , 2008 .

[51]  Chia-Wen Lin,et al.  Video forgery detection using correlation of noise residue , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[52]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .