Skip to main content

Identifying Video Forgery Process Using Optical Flow

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8389))

Abstract

With the extensive equipment of surveillance systems, the assessment of the integrity of surveillance videos is of vital importance. In this paper, an algorithm based on optical flow and anomaly detection is proposed to authenticate digital videos and further identify the inter-frame forgery process (i.e. frame deletion, insertion, and duplication). This method relies on the fact that forgery operation will introduce discontinuity points to the optical flow variation sequence and these points show different characteristics depending on the type of forgery. The anomaly detection scheme is adopted to distinguish the discontinuity points. Experiments were performed on several real-world surveillance videos delicately forged by volunteers. The results show that the proposed algorithm is effective to identify forgery process with localization, and is robust to some degree of MPEG compression.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 26(2), 16–25 (2009)

    Article  Google Scholar 

  2. Milani, S., Fontani, M., Bestagini, P., Barni, M., Piva, A., et al.: An overview on video forensics. APSIPA Trans. Signal Inf. Process. 1, e2 (2012)

    Google Scholar 

  3. Chen, M., Fridrich, J., Goljan, M., Lukáš, J.: Source digital camcorder identification using sensor photo response non-uniformity. In: SPIE 2007, vol. 6505 (2007)

    Google Scholar 

  4. van Houten, W., Geradts, Z., Franke, K., Veenman, C.: Verification of video source camera competition (CAMCOM 2010). In: Ünay, D., Çataltepe, Z., Aksoy, S. (eds.) ICPR 2010. LNCS, vol. 6388, pp. 22–28. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Chen, W., Shi, Y.Q.: Detection of double MPEG compression based on first digit statistics. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 16–30. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Luo, W.Q., Wu, M., Huang, J.W.: MPEG recompression detection based on block artifacts. In: SPIE 2008, vol. 6819 (2008)

    Google Scholar 

  7. Mondaini, N., Caldelli, R., Piva, A., Barni, M., Cappellini, V.: Detection of malevolent changes in digital video for forensic applications. In: SPIE 2007, vol. 6505 (2007)

    Google Scholar 

  8. Hsu, C.C., Hung, T.Y., Lin, C.W., Hsu, C.T.: Video forgery detection using correlation of noise residue. In: MMSP 2008, pp. 170–174 (2008)

    Google Scholar 

  9. Kobayashi, M., Okabe, T., Sato, Y.: Detecting forgery from static-scene video based on inconsistency in noise level functions. IEEE Trans. Inf. Forensics Secur. 5(4), 883–892 (2010)

    Article  Google Scholar 

  10. Wang, W.H., Farid, H.: Exposing digital forgeries in video by detecting double MPEG compression. In: MM&Sec 2006, pp. 37–47 (2006)

    Google Scholar 

  11. Su, Y.T., Nie, W.Z., Zhang, C.Q.: A frame tampering detection algorithm for MPEG videos. In: ITAIC 2011, vol. 2, pp. 461–464 (2011)

    Google Scholar 

  12. Dong, Q., Yang, G.B., Zhu, N.B.: A MCEA based passive forensics scheme for detecting frame-based video tampering. Digit. Investig. 9(2), 151–159 (2012)

    Article  Google Scholar 

  13. Wang, W.H., Farid, H.: Exposing digital forgeries in video by detecting duplication. In: MM&Sec 2007, pp. 35–42 (2007)

    Google Scholar 

  14. Zhang, J., Su, Y.T., Zhang, M.Y.: Exposing digital video forgery by ghost shadow artifact. In: MiFor 2009 and MM 2009, pp. 49–53 (2009)

    Google Scholar 

  15. Conotter, V., O’Brien, J.F., Farid, H.: Exposing digital forgeries in ballistic motion. IEEE Trans. Inf. Forensics Secur. 7(1), 283–296 (2012)

    Article  Google Scholar 

  16. Chao, J., Jiang, X., Sun, T.: A novel video inter-frame forgery model detection scheme based on optical flow consistency. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 267–281. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  17. Lucas, B.D., Kanade, T.: An iterative image registration technique with an application to stereo vision. In: 7th International Joint Conference on Artificial Intelligence, vol. 2, pp. 674–679 (1981)

    Google Scholar 

  18. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1–58 (2009)

    Article  Google Scholar 

  19. Grubbs, F.: Procedures for detecting outlying observations in samples. Technometrics 11(1), 1–21 (1969)

    Article  Google Scholar 

  20. TREC Video Retrieval Evaluation. http://trecvid.nist.gov/

Download references

Acknowledgment

We would like to thank Juan Chao and Dongyang Cheng for the fruitful technical discussion. We also show our appreciation to Yuxing Wu and Peisong He for their incredible patience in creating the forged video dataset. This work was supported by the National Science Foundation of China under Grants 61071153, 61170220, 61272249, and 61272439, the Specialized Research Fund for the Doctoral Program of Higher Education under Grant 20120073110053, and by the Project of International Cooperation and Exchanges supported by Shanghai Committee of Science and Technology under Grant 12510708500. Credits for the use of the TRECVID SED video dataset are given to the National Institute of Standards and Technology (NIST).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinghao Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, W., Jiang, X., Wang, S., Wan, M., Sun, T. (2014). Identifying Video Forgery Process Using Optical Flow. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43886-2_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43885-5

  • Online ISBN: 978-3-662-43886-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics