International Conference on Digital Forensics and Cyber Crime

Digital Forensics and Cyber Crime pp 29-38 | Cite as

Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features

  • Vivek Kumar Singh
  • Pallav Pant
  • Ramesh Chandra Tripathi
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 157)


With the easy availability and operability of video editing tools, any video could be edited in short span of time. Sometimes, these modifications change the actual meaning of targeted video. Hence, before making any judgment and opinion about such multimedia contents, it is necessary to verify their genuineness. A video can be tampered by various different attempts. Each different attempt derives a new type of forgery in videos. Among various types of attack on video, frame duplication is a common type of attack. Frames are duplicated and pasted into same video in order to either hide or add false information. We propose Sub Blocked based features to detect frame duplication. The experimental results show higher accuracy that not only detects but also localize duplicated frames as well.


Frame duplication Image forensic Sub-blocking method Video forgery Correlation 


  1. 1.
    Wang, W., Farid, H.: Exposing digital forgeries in video by detecting duplication. In: Proceedings of ACM 9th Workshop on Multimedia and Security, pp. 35–42 (2007)Google Scholar
  2. 2.
    Kobayashi, M., Okabe, T., Sato, Y.: Detecting video forgeries based on noise characteristics. In: Wada, T., Huang, F., Lin, S. (eds.) PSIVT 2009. LNCS, vol. 5414, pp. 306–317. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  3. 3.
    Hsu, C.-C., Hung, T.-Y., Lin, C.-W., Hsu, C.-T.: Video forgery detection using correlation of noise residue. In: Proceedings of IEEE 10th Workshop on Multimedia Signal Processing, pp. 170–174 (2008)Google Scholar
  4. 4.
    Lin, G.S., Chang, J.F., Chuang, C.H.: Detecting frame duplication based on spatial and temporal analyses. In: Proceedings of IEEE Conference on Computer Science and Education, pp. 1396–1399 (2011)Google Scholar
  5. 5.
    Bestagini, P., Milani, S., Tagliasacchi, M., Tubaro, S.: Local tampering detection in video sequences. In: IEEE International Workshop on Multimedia Signal Processing, pp. 488–493 (2013)Google Scholar
  6. 6.
    Mondaini, N., Caldelli, R., Piva, A., Barni, M., Cappellini, V.: Detection of malevolent changes in digital video for forensic applications. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505 (2007)Google Scholar
  7. 7.
    Tripathi, R.C., Singh, V.K.: Fast and efficient region duplication detection in digital images using sub-blocking method. Int. J. Adv. Sci. Technol. 35, 93–102 (2011)Google Scholar

Copyright information

© Institute for Computer Sciences, Social informatics and Telecommunication Engineering 2015

Authors and Affiliations

  • Vivek Kumar Singh
    • 1
  • Pallav Pant
    • 1
  • Ramesh Chandra Tripathi
    • 1
  1. 1.Department of Information TechnologyIndian Institute of Information TechnologyAllahabadIndia

Personalised recommendations