Video Tampering Detection Algorithm Based on Spatial Constraints and Stable Feature

被引:2
|
作者
Pu, Han [1 ,2 ,3 ]
Huang, Tianqiang [1 ,2 ,3 ]
Guo, Gongde [1 ,2 ]
Weng, Bin [1 ,2 ,3 ]
You, Lijun [4 ]
机构
[1] Fujian Normal Univ, Math & Informat, Fuzhou 350007, Peoples R China
[2] Fujian Prov Engn Res Ctr Big Data Anal & Applicat, Fuzhou 350007, Peoples R China
[3] Digital Fujian Big Data Secur Technol Inst, Fuzhou 350007, Peoples R China
[4] Fujian Inst Meteorol Sci, Fuzhou 350001, Peoples R China
关键词
Spatial constraints; The quantitative correlation rich regions; Stable feature; Videos with severe motion; FORGERY DETECTION;
D O I
10.1007/978-3-030-29933-0_45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most traditional video passive forensics methods only utilize the similarity between adjacent frames. They usually suffer from high false detection rate for the videos with severe motion. To overcome this issue, a novel coarse-to-fine video tampering detection method that combines spatial constraints with stable feature is proposed. In the coarse detection phase, both the low-motion region and the high-texture region are extracted by using spatial constraint criteria. The above two regions are merged to obtain the regions with rich quantitative correlation, which are then used for extracting video optimal similarity features. The luminance gradient component of the optical flow is computed and considered as relatively stable feature. Then, the suspected tampered points are found by combining the above two features. In the fine detection phase, the precise tampering points are located. The similarity of the gradient structure based on the characteristics of the human visual system is utilized to further reduce the false detections. This method is tested on three public video data sets. The experimental results show that compared with the existing works, this method not only has lower false detection rate and higher accuracy for the videos with severe motion, but also has high robustness to regular attacks, such as additive noise, blur and filtering.
引用
收藏
页码:541 / 553
页数:13
相关论文
共 50 条
  • [31] Video Flame Detection Algorithm Based on Improved GMM and Multi-Feature Fusion
    Zhang Chi
    Meng Qinghao
    Jing Tao
    LASER & OPTOELECTRONICS PROGRESS, 2021, 58 (04)
  • [32] Research on Multi-Feature Front Vehicle Detection Algorithm based on Video Image
    Qu Shiru
    Li Xu
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 3831 - 3835
  • [33] Skin detection using the EM algorithm with spatial constraints
    Diplaros, A
    Gevers, T
    Vlassis, N
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 3071 - 3075
  • [34] Tampering Detection in Oral History Video Using Watermarking
    Lu, Jianfeng
    Gao, Peng
    Zhang, Shanqing
    Li, Li
    Yuan, Wenqiang
    Zhou, Qili
    CLOUD COMPUTING AND SECURITY, PT I, 2017, 10602
  • [35] Near-duplicate Video Detection Algorithm Based on Global GSP Feature and Local ScSIFT Feature Fusion
    Luan, Xidao
    Xie, Yuxiang
    He, Jingmeng
    Zhang, Lili
    Li, Chen
    Zhang, Xin
    2017 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, IMAGE AND SIGNAL PROCESSING (CCISP 2017), 2018, 960
  • [36] Emergence of deepfakes and video tampering detection approaches: A survey
    Kingra, Staffy
    Aggarwal, Naveen
    Kaur, Nirmal
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (07) : 10165 - 10209
  • [37] Digital video tampering detection: An overview of passive techniques
    Sitara, K.
    Mehtre, B. M.
    DIGITAL INVESTIGATION, 2016, 18 : 8 - 22
  • [38] Emergence of deepfakes and video tampering detection approaches: A survey
    Staffy Kingra
    Naveen Aggarwal
    Nirmal Kaur
    Multimedia Tools and Applications, 2023, 82 : 10165 - 10209
  • [39] Authentication and Digital Video Tampering Detection Using Watermarking
    Thenmozhi, R.
    Balachandar, K.
    Cathrine, Shobana
    Swathikha, S.
    Devi, G. Ranjana
    Saravanan, R.
    ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [40] A Comparative study of various Video Tampering detection methods
    Kaur, Sandeep
    Kushwaha, Alok Kumar Singh
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 418 - 423