Skip to main content

Texture Feature Analysis for Inter-Frame Video Tampering Detection

  • Conference paper
  • First Online:
Proceedings of International Joint Conference on Advances in Computational Intelligence

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 497 Accesses

Abstract

Inter-frame video forgeries can involve insertion, deletion, or duplication of frames with malicious intentions. Most of the available passive methods follow a pixel-correlation based approach that is computationally expensive as it compares each pixel of video frames to identify forgery. In this paper, a histogram-based approach is proposed that is computationally efficient and results in better classification accuracy. It computes histograms of frames having texture characteristics encoded with Local Binary Pattern (LBP). Histogram similarity of adjacent LBP coded frames is measured through the Histogram Intersection comparison metric. The differences of these adjacent metric values provide significant cues for forgery detection, that are further normalized and quantized to obtain a fixed-length feature vector. It makes the proposed approach scalable and hence enhances its applicability for variable-length videos. Training and testing are done using SVM classifier with RBF kernel. The method is capable to detect different kinds of interframe forgeries that include insertion, deletion and duplication. Due to lack of benchmark dataset of interframe video forgeries, a customized dataset is prepared through MoviePy tool that comprises total 1370 videos with interframe forgeries (frame deletion, insertion and duplication). Experimental results demonstrate an overall detection accuracy of 99% that can efficiently detect various kinds of inter-frame video forgeries. A comparative analysis with existing interframe forgery detection approaches is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ismael Al-Sanjary O, Ahmed AA, Sulong G (2016) Development of a video tampering dataset for forensic investigation. Forensic Sci Int 266:565–572

    Google Scholar 

  2. Shanableh T (2013) Detection of frame deletion for digital video forensics. Digit Investig 10(4):350–360

    Google Scholar 

  3. Singh RD, Aggarwal N (2018) Video content authentication techniques: a comprehensive survey. Multimedia Syst 24(2):211–240

    Google Scholar 

  4. Yao Y, Yang G, Sun X, Li L (2016) Detecting video frame-rate up-conversion based on periodic properties of edge-intensity. J Inf Secur Appl 26:39–50

    Google Scholar 

  5. Bozkurt I, Bozkurt MH, Ulutaş G (2017) A new video forgery detection approach based on forgery line. Turk J Electr Eng Comput Sci 25(6):4558–4574

    Google Scholar 

  6. Hyun DK, Ryu SJ, Lee HY, Lee HK (2013) Detection of upscale-crop and partial manipulation in surveillance video based on sensor pattern noise. Sensors 13(9):12605–12631

    Google Scholar 

  7. Wang W, Farid H (2009) Exposing digital forgeries in a video by detecting double quantization. In: Proceedings of the 11th ACM multimedia security workshop, pp 39–47

    Google Scholar 

  8. Singh RD, Aggarwal N (2017) Detection of upscale-crop and splicing for digital video authentication. Digit Investig 21:31–52

    Google Scholar 

  9. Li L, Xia Z, Hadid A, Jiang X, Zhang H, Feng X (2019) Replayed video attack detection based on motion blur analysis. IEEE Trans Inf Forensics Securi 14(9):2246–2261

    Google Scholar 

  10. Zhang Y, Dubey RK, Hua G, Thing VLL (2019) Face spoofing video detection using spatio-temporal statistical binary pattern. In: IEEE Region 10 annual international conference, proceedings/TENCON, October 2018, pp 309–314

    Google Scholar 

  11. Schaber P, Dong S, Guthier B, Kopf S, Effelsberg W (2015) Modeling temporal effects in the re-captured video. In: Proceedings of the 2015 ACM multimedia conference, pp 1279–1282

    Google Scholar 

  12. Esmaeili MM, Fatourechi M, Ward RK (2011) A robust and fast video copy detection system using content-based fingerprinting. IEEE Trans Inf Forensics Secur 6(1):213–226

    Google Scholar 

  13. Lameri S, Bondi L, Bestagini P, Tubaro S (2018, September) Near-duplicate video detection exploiting noise residual traces. In: Proceedings - international conference on image processing, ICIP, vol 2017, pp 1497–1501

    Google Scholar 

  14. Yang X, Li Y, Lyu S (2019, May) Exposing deep fakes using inconsistent head poses. In: ICASSP, IEEE international conference on acoustics, speech and signal processing - proceedings, vol 2019, pp 8261–8265

    Google Scholar 

  15. Zheng L Sun T, Shi YQ (2015) Inter-frame video forgery detection based on block-wise brightness variance descriptor. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 9023, pp 18–30

    Google Scholar 

  16. Wang Q, Li Z, Zhang Z, Ma Q (2014) Video inter-frame forgery identification based on consistency of correlation coefficients of gray values. J Comput Commun 2(04):51

    Google Scholar 

  17. Ulutas G, Ustubioglu B, Ulutas M, Nabiyev VV (2018) Frame duplication detection based on BoW model. Multimedia Syst. 24(5):549–567

    Google Scholar 

  18. Zhao DN, Wang RK, Lu ZM (2018) Inter-frame passive-blind forgery detection for video shot based on similarity analysis. Multimedia Tools Appl 77(19), 25389–25408

    Google Scholar 

  19. Zhang Z, Hou J, Ma Q, Li Z (2015) Efficient video frame insertion and deletion detection based on the inconsistency of correlations between local binary pattern coded frames. Secur Commun Netw 8:311–320

    Google Scholar 

  20. Ulutas G, Ustubioglu B, Ulutas M, Nabiyev V (2017) Frame duplication/mirroring detection method with binary features. IET Image Process 11(5), 333–342

    Google Scholar 

  21. Micheloni C, Canazza S, Foresti GL (2009) Audio-video biometric recognition for non-collaborative access granting. J Vis Lang Comput 20(6):353–367

    Google Scholar 

  22. Jia S, Xu Z, Wang H, Feng C, Wang T (2018) Coarse-to-fine copy-move forgery detection for video forensics. IEEE Access 6:25323–25335

    Google Scholar 

  23. Chao J, Jiang X, Sun T ( 2018) A novel video inter-frame forgery model detection, pp 267–281. Springer, Heidelberg

    Google Scholar 

  24. Kingra S, Aggarwal N, Singh RD (2017) Video inter-frame forgery detection approach for surveillance and mobile recorded videos. Int J Electr Comput Eng 7(2):831–841

    Google Scholar 

  25. Singh RD, Aggarwal N (2017) Optical flow and prediction residual based hybrid forensic system for inter-frame tampering detection. J Circuits Syst Comput 26(7)

    Google Scholar 

  26. Stamm MC et al (2009) Temporal forensics and anti-forensics for motion compensated video. IEEE Trans Inf Forensics Secur 228:84–96

    Google Scholar 

  27. Yao H, Ni R, Zhao Y (2019) An approach to detect video frame deletion under anti-forensics. J Real-Time Image Process 16(3):751–764

    Google Scholar 

  28. Wang W, Farid H (2007) Exposing digital forgeries in interlaced and deinterlaced video. In: MM and Sec’07 - proceedings of the multimedia and security workshop 2007, vol 2, no 3, pp 35–42

    Google Scholar 

  29. He P, Jiang X Sun T, Wang S (2016) Double compression detection based on local motion vector field analysis in static-background videos. J Vis Commun Image Represent 35: 55–66

    Google Scholar 

  30. Vázquez-Padín D, Fontani M, Bianchi T, Comesaña P, Piva A, Barni M (2012) Detection of video double encoding with GOP size estimation. In: WIFS 2012 - proceedings of the 2012 IEEE international workshop on information forensics and security, pp 151–156

    Google Scholar 

  31. Stamm MC, Lin WS, Liu KJR (2012) Temporal forensics and anti-forensics for motion-compensated video. IEEE Trans Inf Forensics Secur 7(4):1315–1329

    Google Scholar 

  32. Jiang X, Xu Q, Sun T, Li B, He P (2019) Detection of HEVC double compression with the same coding parameters based on analysis of intra coding quality degradation process. IEEE Trans Inf Forensics Secur 15:250–263

    Google Scholar 

  33. Bakas J, Naskar R, Bakshi S (2021) Detection and localization of inter-frame forgeries in videos based on macroblock variation and motion vector analysis. Comput Electr Eng 89:106929

    Google Scholar 

  34. Singh G, Singh K (2019) Video frame and region duplication forgery detection based on correlation coefficient and coefficient of variation. Multimedia Tools Appl 78(9), 11527–1156

    Google Scholar 

  35. Huang T, Zhang X, Huang W, Lin L, Su W (2018) A multi-channel approach through the fusion of audio for detecting video inter-frame forgery. Comput Secur 77:412–426

    Google Scholar 

  36. Abbasi Aghamaleki, J, Behrad A (2017) Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects. Multimedia Tools Appl 76(20):20691–20717

    Google Scholar 

  37. Abbasi Aghamaleki J, Behrad A (2016) Inter-frame video forgery detection and localization using intrinsic effects of double compression on quantization errors of video coding. Signal Process Image Commun 47:289–302

    Google Scholar 

  38. Jiang X, Wang W, Sun T, Shi YQ, Wang S (2013) Detection of double compression in MPEG-4 videos based on Markov statistics. IEEE Signal Process Lett 20(5):447–450

    Google Scholar 

  39. Raimi RA (1976) The first digit problem. Am Math Mon 83(7):521–538

    Google Scholar 

  40. Mohamed A, Khellfi F, Weng Y, Jiang J, Ipson S (2009) An efficient image retrieval through DCT histogram quantization. In: International conference on CyberWorlds, pp 237–240

    Google Scholar 

  41. Ojala T, Pietikäinen M, Mäenpää T (2000) Gray scale and rotation invariant texture classification with local binary patterns. In: BT - Computer vision - ECCV 2000, pp 404–420

    Google Scholar 

  42. Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR 2005), vol 1, pp 886–893

    Google Scholar 

  43. Bakas J, Naskar R, Dixit R (2019) Detection and localization of inter-frame video forgeries based on inconsistency in correlation distribution between Haralick coded frames. Multimedia Tools Appl 78(4):4905–4935

    Google Scholar 

  44. Li Q, Wang R, Xu D (2018) An inter-frame forgery detection algorithm for surveillance video. Information 9(12)

    Google Scholar 

  45. Qadir G, Yahaya S, Ho ATS (2012) Surrey university library for forensic analysis (SULFA) of video content. In: IET Conference Publications, vol 2012, no. 600 CP

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shehnaz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shehnaz, Kaur, M. (2022). Texture Feature Analysis for Inter-Frame Video Tampering Detection. In: Uddin, M.S., Jamwal, P.K., Bansal, J.C. (eds) Proceedings of International Joint Conference on Advances in Computational Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-0332-8_22

Download citation

Publish with us

Policies and ethics