Skip to main content
Log in

Video logo removal detection based on sparse representation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the popularity of multimedia editing tools, more and more forged multimedia content appeared on the network. Thus, the legal authorities need novel techniques to distinguish copyright infringements from a large number of videos on the Internet. Since logo removal is a common editing operation during unauthorized reproduction, logo removal detection is often equivalent to copyright infringements detection to some extent. In this paper, we proposed a video forensics framework for logo removal detection. Our framework mainly contains two stages: the removal traces detection and the removal region location. In the first stage, we use sparse representation to show the difference between the tampered areas and the original areas in sparsity. In the second stage, spatial priors and temporal correlations are used to refine the location of the removal regions. Finally, a spatiotemporal suspected region can obviously show the edited regions. The proposed method is validated on our video logo removal dataset by extensive experiments, showing promising results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. http://www.infognition.com/VirtualDubFilters/subtitles.html

  2. http://voidon.republika.pl/virtualdub/ladocs301/logoaway.html

References

  1. Aharon M, Elad M, Bruckstein A (2006) K-SVD: an algorithm for designing overcomplete dictionaries for sparse representation. IEEE Trans Signal Process 54 (11):4311–4322

    Article  Google Scholar 

  2. Akbari M, Hu X, Nie L, Chua TS (2016) From tweets to wellness: wellness event detection from twitter streams. In: Proceedings of AAAI, pp 87–93

  3. Bestagini P, Milani S, Tagliasacchi M, Tubaro S (2013) Local tampering detection in video sequences. In: Proceedings of IEEE international workshop on multimedia signal processing, pp 488–493

  4. Bestagini P, Visentini-Scarzanella M, Tagliasacchi M, Dragotti PL, Tubaro S (2013) Video recapture detection based on ghosting artifact analysis. In: Proceedings of IEEE international conference on image processing, pp 4457–4461

  5. Chen J, Han Y, Cao X, Tian Q (2013) Object coding on the semantic graph for scene classification. In: Proceedings of ACM international conference on multimedia, pp 493–496

  6. Chen S, Tan S, Li B, Huang J (2016) Automatic detection of object-based forgery in advanced video. IEEE Trans Circuits Syst Video Technol 26(11):2138–2151

    Article  Google Scholar 

  7. Costa FDO, Lameri S, Bestagini P, Dias Z, Rocha A, Tagliasacchi M, Tubaro S (2015) Phylogeny reconstruction for misaligned and compressed video sequences. In: Proceedings of IEEE international conference on image processing, pp 301–305

  8. Costa FDO, Lameri S, Bestagini P, Dias Z, Tubaro S, Rocha A (2016) Hash-based frame selection for video phylogeny. In: Proceedings of IEEE international workshop on information forensics and security, pp 1–6

  9. D’Avino D, Cozzolino D, Poggi G, Verdoliva L (2017) Autoencoder with recurrent neural networks for video forgery detection. Electronic Imaging 2017(7):92–99

    Article  Google Scholar 

  10. Dias Z, Rocha A, Goldenstein S (2011) Video phylogeny: recovering near-duplicate video relationships. In: Proceedings of IEEE international workshop on information forensics and security, pp 1–6

  11. Elad M (2010) Sparse and redundant representations: from theory to applications in signal and image processing, 1st edn. Springer, New York

    Book  Google Scholar 

  12. Ellis JG, Jou B, Chang SF (2014) Why we watch the news: a dataset for exploring sentiment in broadcast video news. In: Proceedings of ACM international conference on multimodal interaction, pp 104–111

  13. Feng C, Xu Z, Zhang W, Xu Y (2014) Automatic location of frame deletion point for digital video forensics. In: Proceedings of ACM workshop on information hiding and multimedia security, pp 171–179

  14. Feng F, Nie L, Wang X, Hong R, Chua TS (2017) Computational social indicators: a case study of chinese university ranking. In: Proceedings of international ACM SIGIR conference on research and development in information retrieval, pp 455–464

  15. Gironi A, Fontani M, Bianchi T, Piva A, Barni M (2014) A video forensic technique for detecting frame deletion and insertion. In: Proceedings of IEEE international conference on acoustics, speech and signal processing, pp 6226–6230

  16. Han Y, Wu F, Tao D, Shao J, Zhuang Y, Jiang J (2012) Sparse unsupervised dimensionality reduction for multiple view data. IEEE Trans Circuits Syst Video Technol 22(10):1485–1496

    Article  Google Scholar 

  17. Han Y, Wei X, Cao X, Yang Y, Zhou X (2014) Augmenting image descriptions using structured prediction output. IEEE Trans Multimedia 16(6):1665–1676

    Article  Google Scholar 

  18. Han Y, Yang Y, Ma Z, Shen H, Sebe N, Zhou X (2014) Image attribute adaptation. IEEE Trans Multimedia 16(4):1115–1126

    Article  Google Scholar 

  19. Han Y, Yang Y, Yan Y, Ma Z, Sebe N, Zhou X (2015) Semisupervised feature selection via spline regression for video semantic recognition. IEEE Transactions on Neural Networks and Learning Systems 26(2):252–264

    Article  MathSciNet  Google Scholar 

  20. He P, Jiang X, Sun T, Wang S (2016) Double compression detection based on local motion vector field analysis in static-background videos. J Vis Commun Image Represent 35:55–66

    Article  Google Scholar 

  21. He P, Jiang X, Sun T, Wang S (2017) Detection of double compression in MPEG-4 videos based on block artifact measurement. Neurocomputing 228:84–96

    Article  Google Scholar 

  22. Hsu CC, Hung TY, Lin CW, Hsu CT (2008) Video forgery detection using correlation of noise residue. In: Proceedings of IEEE workshop on multimedia signal processing, pp 170–174

  23. Jiang YG, Jiang Y, Wang J (2014) VCDB: a large-scale database for partial copy detection in videos. In: Proceedings of European conference on computer vision, pp 357–371

    Google Scholar 

  24. Jing P, Su Y, Nie L, Gu H (2017) Predicting image memorability through adaptive transfer learning from external sources. IEEE Trans Multimedia 19(5):1050–1062

    Article  Google Scholar 

  25. Kobayashi M, Okabe T, Sato Y (2010) Detecting forgery from static-scene video based on inconsistency in noise level functions. IEEE Trans Inf Forensics Secur 5(4):883–892

    Article  Google Scholar 

  26. Labartino D, Bianchi T, De Rosa A, Fontani M, Vazquez-Padin D, Piva A, Barni M (2013) Localization of forgeries in MPEG-2 video through GOP size and DQ analysis. In: Proceedings of IEEE international workshop on multimedia signal processing, pp 494–499

  27. Lee JW, Lee MJ, Oh TW, Ryu SJ, Lee HK (2010) Screenshot identification using combing artifact from interlaced video. In: Proceedings of ACM workshop on multimedia and security, pp 49–54

  28. Lin CS, Tsay JJ (2014) A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digit Investig 11(2):120–140

    Article  Google Scholar 

  29. Lin H, Jia J, Nie L, Shen G, Chua TS (2016) What does social media say about your stress?. In: Proceedings of international joint conferences on artificial intelligence, pp 3775–3781

  30. Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. In: Proceedings of AAAI, pp 201–207

  31. Mondaini N, Caldelli R, Piva A, Barni M, Cappellini V (2007) Detection of malevolent changes in digital video for forensic applications. In: Proceedings of SPIE conference on security, steganography, and watermarking of multimedia contents, p 65050

  32. Nie L, Hong R, Zhang L, Xia Y, Tao D, Sebe N (2016) Perceptual attributes optimization for multivideo summarization. IEEE Transactions on Cybernetics 46(12):2991–3003

    Article  Google Scholar 

  33. Nie L, Zhang L, Wang M, Hong R, Farseev A, Chua TS (2017) Learning user attributes via mobile social multimedia analytics. ACM Trans Intell Syst Technol 8(3):36

    Article  Google Scholar 

  34. Song X, Ming ZY, Nie L, Zhao YL, Chua TS (2016) Volunteerism tendency prediction via harvesting multiple social networks. ACM Trans Inf Syst 34(2):10

    Article  Google Scholar 

  35. Sun T, Wang W, Jiang X (2012) Exposing video forgeries by detecting MPEG double compression. In: Proceedings of IEEE international conference on acoustics, speech and signal processing, pp 1389–1392

  36. Visentini-Scarzanella M, Dragotti PL (2013) Modelling radial distortion chains for video recapture detection. In: Proceedings of IEEE international workshop on multimedia signal processing, pp 412–417

  37. Wang W, Farid H (2006) Exposing digital forgeries in video by detecting double MPEG compression. In: Proceedings of ACM workshop on multimedia and security, pp 37–47

  38. Wang W, Farid H (2007) Exposing digital forgeries in video by detecting duplication. In: Proceedings of ACM workshop on multimedia and security, pp 35–42

  39. Wang W, Farid H (2009) Exposing digital forgeries in video by detecting double quantization. In: Proceedings of ACM workshop on multimedia and security, pp 39–48

  40. Wang J, Liu Q, Duan L, Lu H, Xu C (2007) Automatic TV logo detection, tracking and removal in broadcast video. In: Proceedings of international conference on multimedia modeling, pp 63–72

  41. Wang X, Zhao YL, Nie L, Gao Y, Nie W, Zha ZJ, Chua TS (2015) Semantic-based location recommendation with multimodal venue semantics. IEEE Trans Multimedia 17(3):409–419

    Article  Google Scholar 

  42. Wu Y, Jiang X, Sun T, Wang W (2014) Exposing video inter-frame forgery based on velocity field consistency. In: Proceedings of IEEE international conference on acoustics, speech and signal processing, pp 2674–2678

  43. Yan W, Wang J, Kankanhalli MS (2005) Automatic video logo detection and removal. Multimedia Systems 10(5):379–391

    Article  Google Scholar 

  44. Zhang J, Su Y (2009) Detecting logo-removal forgery by inconsistencies of blur. In: Proceedings of IEEE international conference on industrial mechatronics and automation, pp 32–36

  45. Zhang D, Nie L, Luan H, Tan KL, Chua TS, Shen HT (2017) Compact indexing and judicious searching for Billion-Scale microblog retrieval. ACM Trans Inf Syst 35(3):27

    Google Scholar 

  46. Zhu L, Shen J, Liu X, Xie L, Nie L (2016) Learning compact visual representation with canonical views for robust mobile landmark search. In: Proceedings of international joint conferences on artificial intelligence, pp 3959–3965

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (61572356 and 61303208) and the Tianjin Research Program of Application Foundation and Advanced Technology (15JCQNJC41600) and a grant from the China Scholarship Council (201706250187).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuting Su.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jin, X., Su, Y., Zou, L. et al. Video logo removal detection based on sparse representation. Multimed Tools Appl 77, 29303–29322 (2018). https://doi.org/10.1007/s11042-018-5959-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5959-8

Keywords

Navigation