全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

帧内复制粘贴视频伪造的盲检测

DOI: 10.11834/jig.20140602

Keywords: 帧内复制粘贴,关键帧,稠密SIFT流,视频伪造

Full-Text   Cite this paper   Add to My Lib

Abstract:

目的随着数字获取技术的发展,数字媒体文档的获取越来越方便,并已成为人们现代生活中不可缺少的组成部分。功能强大的视频编辑软件为视频复制粘贴提供了方便,因此视频伪造检测具有重大现实需求。利用传统的图像伪造检测算法逐帧对视频进行伪造检测计算量大、耗时冗长,且不能保证检测结果的时空一致性。方法提出了一种基于稠密SIFT(scaleinvariantfeaturetransform)流的帧内复制粘贴视频伪造盲检测算法。所提算法自适应地在内容最小变化帧位置把视频划分为多个视频段,提取每个视频段的关键帧;在关键帧利用匹配SIFT关键点定位初始疑似复制粘贴伪造区域,通过SIFT关键点和均值漂移分割区域的位置依赖关系细化疑似伪造区域;采用稠密SIFT流把关键帧检测结果过渡至非关键帧,最终实现视频的复制粘贴伪造盲检测。结果实验结果表明,所提算法的检测效率比传统算法快了一个数量级,检测平均准确率比传统算法提高了约20%。结论所提视频伪造盲检测方法能够高效地检测出帧内复制粘贴的视频伪造区域。

References

[1]  Wang W, Farid H. Exposing digital forgeries in video by detecting duplication[C]//Proceedings of the 9th Multimedia and Security Workshop. Piscataway, New Jersey: IEEE Press, 2007:35-42. [DOI:10.1145/1288869.1288876]
[2]  Bonneel N, Sunkavalli K, Paris S, et al. Example-based video color grading[J]. ACM Transactions on Graphics, 2013, 32(4):1-11. [DOI:10.1145/2461912.2461939]
[3]  Kancherla K, Mukkamala S. Novel blind video forgery detection using Markov models on motion residue[C]//Proceedings of Intelligent Information and Database Systems. Kaohsiung,Taiwan, China: Springer, 2012,7198:308-315.[DOI:10.1007/978-3-642-28493-9_33]
[4]  Kobayashi M, Okaba T, Sato Y. Detecting forgery from static-scene video based on inconsistency in noise level functions [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):883-892. [DOI: 10.1109/TIFS.2010.2074194]
[5]  Fridrich J, Soukal D, Lukas J. Detection of copy-move forgery in digital images[C]//Proceedings of Digital Forensic Research Workshop. Cleveland: Citeseex, 2003:55-61.
[6]  Wu Q, Li G H, Tu D, et al. A survey of blind digital image forensics technology for authenticity detection [J]. Acta Automatica Sinica, 2008, 34(12):1459-1466.[吴琼,李国辉,涂丹,等. 面向真实性鉴别的数字图像盲取证技术综述[J]. 自动化学报, 2008, 34(12):1459-1466.]
[7]  Li G, Wu Q, Tu D, et al. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD [C]//Proceedings of IEEE International Conference on Multimedia and Expo. Piscataway, New Jersey: IEEE Press, 2007:1750-1753. [DOI:10.1109/ICME.2007.4285009]
[8]  Johnson M, Farid H. Exposing digital forgeries through chromatic aberration [C]//Proceedings of the 8th Workshop on Multimedia and Security. Geneva, Switzerland:ACM Press, 2006:48-55. [DOI:10.1145/1161366.1161376]
[9]  Ng T, Chang S. A model for image splicing [C]//Proceedings of International Conference on Image Processing. Piscataway, New Jersey: IEEE Press,2004:1169-1172.[DOI:10.1109/ICIP.2004.1419512]
[10]  Yao H, Qiao T, Tang Z J, et al. Detecting copy-move forgery using non-negative matrix factorization [C]//Proceedings of the Third International Conference on Multimedia Information Networking and Security. Shanghai: IEEE Press, 2011:591-594. [DOI: 10.1109/MINES.2011.104]
[11]  Bayram S, Taha H, Memon N. An efficient and robust method for detecting copy-move forgery[C]//Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, New Jersey: IEEE Press, 2009:1053-1056. [DOI:10.1109/ICASSP.2009.4959768]
[12]  Zhang J, Feng Z, Su Y. A new approach for detecting copy-move forgery in digital images[C]//Proceedings of the 11th IEEE Singapore International Conference on Communication Systems. Piscataway, New Jersey: IEEE Press,2008:362-366. [DOI:10.1109/ICCS.2008.4737205]
[13]  Ng T T, Chang S F. Blind detection of photomontage using higher order statistics[C]//International Symposium on Circuits and System. Vancouver, Canada: IEEE Press, 2004:688-691. [DOI: 10.1109/ISCAS.2004.1329901]
[14]  Popescu A, Farid H. Exposing digital forgeries by detecting duplicated image regions[R]. Hanover, New Hampshire, USA: Dartmouth College, Computer Science, 2004.
[15]  Hsu C C, Hung T Y, Lin C W,et al. Video forgery detection using correlation of noise residue[C]//Proceeding of International Workshop on Multimedia Signal Processing. Piscataway, New Jersey: IEEE Press, 2008:170-174. [DOI: 10.1109/MMSP.2008.4665069]
[16]  Liu C, Yuen J, Torralba A. SIFT flow: dense correspondence across difference scene[C]//Proceedings of European Conference on Computer Vision. Marseille, France:Springer, 2008:28-42. [DOI: 10.1007/978-3-540-88690-7_3]
[17]  Zhuang Y, Rui Y, Huang T,et al. Adaptive key frame extraction using unsupervised clustering[C]//Proceedings of International Conference on Image Processing. Piscataway, New Jersey: IEEE Press, 1998:866-870. [DOI: 10.1109/ICIP. 1998. 723655]
[18]  Wang F S, Xu D, Wu W X. A cluster algorithm of automatic key frame extraction based on adaptive threshold [J]. Journal of Computer Research and Development, 2005, 42(10):1752-1757. [王方石,徐德,吴伟鑫. 基于自适应阈值的自动提取关键帧的聚类算法[J]. 计算机研究与发展, 2005, 42(10):1752-1757.]
[19]  Zhu C Z, Wu X Q, Zhou X, et al. Video booklet system[J]. Journal of Image and Graphics, 2008, 13(8):1544-1553. [朱才志, 吴秀清, 周晓, 等. 视频相册系统[J]. 中国图象图形学报, 2008, 13(8):1544-1553.]
[20]  Conotter V, James F, O\'Brien, et al. Exposing digital forgeries in ballistic motion [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1):283-295. [DOI: 10.1109/TIFS.2011.2165843]

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133