Skip to main content

Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2015)

Abstract

With the easy availability and operability of video editing tools, any video could be edited in short span of time. Sometimes, these modifications change the actual meaning of targeted video. Hence, before making any judgment and opinion about such multimedia contents, it is necessary to verify their genuineness. A video can be tampered by various different attempts. Each different attempt derives a new type of forgery in videos. Among various types of attack on video, frame duplication is a common type of attack. Frames are duplicated and pasted into same video in order to either hide or add false information. We propose Sub Blocked based features to detect frame duplication. The experimental results show higher accuracy that not only detects but also localize duplicated frames as well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, W., Farid, H.: Exposing digital forgeries in video by detecting duplication. In: Proceedings of ACM 9th Workshop on Multimedia and Security, pp. 35–42 (2007)

    Google Scholar 

  2. Kobayashi, M., Okabe, T., Sato, Y.: Detecting video forgeries based on noise characteristics. In: Wada, T., Huang, F., Lin, S. (eds.) PSIVT 2009. LNCS, vol. 5414, pp. 306–317. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Hsu, C.-C., Hung, T.-Y., Lin, C.-W., Hsu, C.-T.: Video forgery detection using correlation of noise residue. In: Proceedings of IEEE 10th Workshop on Multimedia Signal Processing, pp. 170–174 (2008)

    Google Scholar 

  4. Lin, G.S., Chang, J.F., Chuang, C.H.: Detecting frame duplication based on spatial and temporal analyses. In: Proceedings of IEEE Conference on Computer Science and Education, pp. 1396–1399 (2011)

    Google Scholar 

  5. Bestagini, P., Milani, S., Tagliasacchi, M., Tubaro, S.: Local tampering detection in video sequences. In: IEEE International Workshop on Multimedia Signal Processing, pp. 488–493 (2013)

    Google Scholar 

  6. Mondaini, N., Caldelli, R., Piva, A., Barni, M., Cappellini, V.: Detection of malevolent changes in digital video for forensic applications. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505 (2007)

    Google Scholar 

  7. Tripathi, R.C., Singh, V.K.: Fast and efficient region duplication detection in digital images using sub-blocking method. Int. J. Adv. Sci. Technol. 35, 93–102 (2011)

    Google Scholar 

Download references

Acknowledgments

This work is supported by Tata Consultancy Service under RSP scheme.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vivek Kumar Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social informatics and Telecommunication Engineering

About this paper

Cite this paper

Singh, V.K., Pant, P., Tripathi, R.C. (2015). Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features. In: James, J., Breitinger, F. (eds) Digital Forensics and Cyber Crime. ICDF2C 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 157. Springer, Cham. https://doi.org/10.1007/978-3-319-25512-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25512-5_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25511-8

  • Online ISBN: 978-3-319-25512-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics