Multimedia Tools and Applications

, Volume 75, Issue 21, pp 13833–13853 | Cite as

Forensics and counter anti-forensics of video inter-frame forgery

  • Xiangui Kang
  • Jingxian Liu
  • Hongmei Liu
  • Z. Jane Wang
Article

Abstract

Among different types of video manipulations, video inter-frame forgery is a powerful and common tampering operation. Several forensic and anti-forensic techniques have been proposed to deal with this challenge. In this paper, we first improve an existing video frame deletion detection algorithm. The improvement is attributed to the combination of two properties resulted from video frame deletion, the periodicity and the magnitude of the fingerprint in the P-frame prediction error. We then analyze a typical anti-forensic method of video frame deletion, and prove that the fingerprint of frame deletion still can be discovered after being anti-forensically modified. We thus further propose a counter anti-forensics approach by estimating the true prediction error and comparing it with the prediction error stored in videos. We show that the detection algorithm is not only useful in detecting video frame deletion, but also useful for detecting video frame insertion. Compared with the existing counter anti-forensics, our proposed approach is robust when different motion estimation algorithms are used in the initial compression. Furthermore, the forensics and counter anti-forensics are combined to perform a two-phase test to detect video inter-frame forgery. A Video Inter-frame Forgery (VIF) game, which is zero-sum, simultaneous-move, is defined to analyze the interplay between the forger and the investigator. Mixed strategy Nash equilibrium is introduced to solve the VIF game and we can obtain the optimal strategies for both players. Experimental results show that the proposed forensic and counter anti-forensic methods not only outperform existing methods in detecting frame deletion and anti-forensics, but also outperform them in the VIF game.

Keywords

Video forensics Inter-frame forgery Counter anti-forensics Mixed strategy Nash equilibrium 

References

  1. 1.
    Barni M (2012) A Game theoretic approach to source identification with known statics. Proc. of ICASSP 1745-1748Google Scholar
  2. 2.
    Bestagini P, et al (2012) Video codec identification. Proc. of ICASSP 2257-2260Google Scholar
  3. 3.
    Chao J, Jiang XH, Sun TF(2012) A novel video inter-frame model deletion scheme based on optical flow consistency. Proc. of IWDW 267-281Google Scholar
  4. 4.
    Gironi A, Fontani M, Bianchi T, Piva A, Barni M (2014) A video forensic technique for detecting frame deletion and insertion. Proc. of ICASSP 6226-6230Google Scholar
  5. 5.
    Grant M, Boyd S (2008) Graph implementations for non-smooth convex programs. recent Advances in learning and control, lecture notes in control and information sciences, Springer 95–110Google Scholar
  6. 6.
    Hespanha J (2011) An introductory course in non-cooperative game theory. Published online, available at http://www.ece.ucsb.edu/"hespanha/
  7. 7.
    ISO (2008) Information technology - generic coding of moving pictures and associated audio information - part 2: Video. International Organization for Standardization. ISO/IEC IS 13818–2Google Scholar
  8. 8.
    ISO (2009) Information technology - coding of audio-visual objects-part 2: Visual. International Organization for Standardization, ISO/IEC IS 14496–2. GenevaGoogle Scholar
  9. 9.
    ISO (2010) Information technology - coding of audio-visual objects-part 10: Advanced video coding (avc). International Organization for Standardization, ISO/IEC IS 14496–10Google Scholar
  10. 10.
    Jiang X, Wang W, Sun T, Shi YQ, Wang S (2013) Detection of double compression in MPEG-4 videos based on Markov statistics. IEEE Signal Process Lett 20(5):447–450CrossRefGoogle Scholar
  11. 11.
    Liu L, Cohen R, Sun H, Vetro A, Zhuang S (2010) New techniques for next generation video coding. Proc. of BMSB: p 1-6Google Scholar
  12. 12.
    Liu H, Li S, Bian S (2013) Detecting frame deletion in H.264 video. Proc. of ISPEC 262-270Google Scholar
  13. 13.
    Luo W, Wu M, Huang J (2008) MPEG recompression detection based on block artifacts. Proc. of SPIE 68190X 1-12Google Scholar
  14. 14.
    Milani S, Bestagini P, Tagliasacchi M, Tubaro S (2012) Mul-tiple compression detection for video sequences. Proc. of MMSP 112–117Google Scholar
  15. 15.
    Milani S et al (2012) An overview on video forensics. In APSIPA trans. Signal Inf Process 1:1–18MathSciNetGoogle Scholar
  16. 16.
    Osborne MJ, Rubinstein A (1994) A course in game theory. MIT PressGoogle Scholar
  17. 17.
    Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broad., 61(2):166--176.Google Scholar
  18. 18.
    Rocha A, Scheirer W, Boult T et al (2011) Vision of the unseen: current trends and challenges in digital image and video forensics. ACM Comput Surv 43(5):1–42CrossRefGoogle Scholar
  19. 19.
    Stamm MC, Lin WS, Liu KJR (2012) Temporal forensics and anti-forensics for motion compensated video. IEEE Trans Inf Forensics Sec 7(4):1315–1329CrossRefGoogle Scholar
  20. 20.
    Stamm MC, Lin WS, Liu KJR (2012) Forensics vs. anti-forensics: a decision and game theoretic framework. Proc. of ICASSP 1749-1752Google Scholar
  21. 21.
    Stamm MC, Liu KJR (2011) Anti-forensics for frame deletion/addition in MPEG video. Proc. of ICASSP 1876-1879Google Scholar
  22. 22.
    Vazquez-Padin D, Fontani M, Bianchi T, Comesana P, Piva A, Barni M(2012) Detection of video double encoding with GOP size estimation. in Proc. of WIFS 151–156Google Scholar
  23. 23.
    Wang W, Farid H (2006) Exposing digital forgeries in video by detecting double MPEG compression. Proc. of ACM Multimedia Secur Workshop 37–47Google Scholar
  24. 24.
    Wu Y, Jiang X, Sun T, Wang W (2014) Exposing video inter-frame forgery based on velocity field consistency. Proc. of ICASSP 2674-2678Google Scholar
  25. 25.
    Xu J, Su Y, Liu Q (2013) Detection of double MPEG-2 compression based on distributions of DCT coefficients. Int J Pattern Recognit Artif Intell 27(1):1354001MathSciNetCrossRefGoogle Scholar
  26. 26.
    Zeng H, Kang X (2013) Camera source identification game with incomplete information. in Proc. of international workshop of digital-dorensics and watermarking. Aucland, New zealand, 2013Google Scholar
  27. 27.
    Zeng H, Kang X, Huang J (2013) Mixed-strategy Nash equilibrium in the camera source identification game. Proc. of IEEE Int. Conf. Image Process 4472–4476Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • Xiangui Kang
    • 1
    • 2
  • Jingxian Liu
    • 2
  • Hongmei Liu
    • 2
  • Z. Jane Wang
    • 3
  1. 1.College of Computer and SoftwareNanjing University of Information Science & TechnologyNanjingChina
  2. 2.School of Information Science & Technology, Guangdong Key Lab of Information Security technologySun Yat-Sen UniversityGuangzhouChina
  3. 3.Electrical and Computer Engineering DepartmentUniversity of British ColumbiaVancouverCanada

Personalised recommendations