Skip to main content
Log in

Video tamper detection based on multi-scale mutual information

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Video frame manipulation has become commonplace with the growing easy access to powerful computing abilities. One of the most common types of video frame tampers is the copy-paste tamper, wherein a region from a video frame is replaced with another region from the same frame. In order to improve the robustness of passive video tampering detection, we propose a content-based video similarity tamper passive blind detection algorithm based on multi-scale normalized mutual information which can implement video frame copy, frame insertion and frame deletion tamper detection. The detail implementation of the proposed algorithm consists of multi-scale content analysis, single-scale content similarity measure, multi-scale content similarity measure, and tampering positioning. Firstly, we get the scales of the visual content of the video frame using Gaussian pyramid transform; Secondly, to measure the similarity of single-scale visual content, we define adjacent normalized mutual information of two frames according to information theory; Thirdly, we construct the multi-scale normalized mutual information descriptors to achieve the multi-scale visual content similarity measure of adjacent two frames using a linear combination. Finally, we use the local outlier isolated factor detection algorithm to detect the position of the video tampering. Experimental results show that the proposed approach can not only detect the video frame tampering position of delete, copy, and insert effectively, but also can detect the tampering of different and homology video encoding formats. We obtain a feature detecting accuracy in excess of 93% and detection rate of 96% across post processing operations, and are able to detect the delete, copy, and insert regions with a high true positive rate and lower false positive rate than the existing time field tamper detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ardizzone E, Mazzola G (2009) Detection of duplicated regions in tampered digital images by bit-plane analysis. In: International conference on image analysis and processing. Springer, Berlin Heidelberg

  2. Breunig MM et al (2000) LOF: identifying density-based local outliers. ACM Sigmod Rec 29(2). ACM

  3. Chen Y, Hao C, Wu W, Wu E (2016) Robust dense reconstruction by range merging based on confidence estimation. SCIENCE CHINA Inf Sci 59(9):1C11. https://doi.org/10.1007/s11432-015-0957-4

    Google Scholar 

  4. Conotter V, O’Brien JF, Farid H (2012) Exposing digital forgeries in ballistic motion. IEEE Trans Inf Forens Secur 7.1:283–296

    Article  Google Scholar 

  5. Coskun B, Sankur B, Memon N (2006) SpatioCtemporal transform based video hashing. IEEE Trans Multimed 8.6:1190–1208

    Article  Google Scholar 

  6. Dong Q, Yang G, Zhu N (2012) A MCEA based passive forensics scheme for detecting frame-based video tampering. Dig Investig 9.2:151–159

    Article  Google Scholar 

  7. Farid H (2009) Image forgery detection–A survey

  8. Goutte C, Gaussier E (2005) A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. In: European conference on information retrieval. Springer, Berlin Heidelberg

  9. Gu B, Sun X, Sheng VS (2016) Structural minimax probability machine. IEEE Trans Neural Netw Learn Syst. https://doi.org/10.1109/TNNLS.2016.2544779

  10. Huang TQ, Chen ZW (2011) Digital video forgeries detection based on bidirectional motion vectors. Shandong Daxue Xuebao(GongxueBan) 41.4:13–19

    Google Scholar 

  11. Hsu C-C et al (2008) Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th workshop on IEEE multimedia signal processing

  12. Hyun D-K et al (2013) Detection of upscale-crop and partial manipulation in surveillance video based on sensor pattern noise. Sensors 13.9:12605–12631

    Article  Google Scholar 

  13. Jinshi C, Ye L, Xu Y, Huijing Z (2013) Tracking generic human motion via fusion of low- and high-dimensional approaches. IEEE Trans Syst Man Cybernet: Syst 43(4):996–1002

    Article  Google Scholar 

  14. Kakar P, Natarajan S, Ser Wee (2010) Detecting digital image forgeries through inconsistent motion blur. In: 2010 IEEE international conference on IEEE multimedia and expo (ICME)

  15. Kobayashi M, Okabe T, Sato Y (2009) Detecting video forgeries based on noise characteristics. In: Pacific-rim symposium on image and video technology. Springer, Berlin Heidelberg

  16. Koenderink JJ (1984) The structure of images. Biol Cybern 50.5:363–370

    Article  MathSciNet  MATH  Google Scholar 

  17. Lin G-S, Chang J-F (2012) Detection of frame duplication forgery in videos based on spatial and temporal analysis. Int J Pattern Recogn Artif Intell 26.07:1250017

    Article  MathSciNet  Google Scholar 

  18. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forens Secur 10(3):507–518. https://doi.org/10.1109/TIFS.2014.2381872

    Article  Google Scholar 

  19. Luming Z, Mingli S, Zicheng L, Xiao L, Bu J, Chun C (2013) Probabilistic graphlet cut: Exploiting spatial structure cue for weakly supervised image segmentation. In: 2013 IEEE conference on computer vision and pattern recognition (CVPR). USA, pp 1908–1915

  20. Luming Z, Mingli S, Zicheng L et al (2013) Probabilistic graphlet cut: exploring spatial structure cue for weakly supervised image segmentation. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 1820–1826

  21. Math S, Tripathi RC (2011) Image quality feature based detection algorithm for forgery in images. Int J Comput Graph Animat 1.1:13

    Google Scholar 

  22. Murali S, Chittapur GB, Anami BS (2013) Comparision and analysis of photo image forgery detection techniques. arXiv preprint arXiv:http://arXiv.org/abs/1302.3119

  23. Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broadcast 61 (2):166–176. https://doi.org/10.1109/TBC.2015.2419824

    Article  Google Scholar 

  24. Pan Z, Jin P, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast reference frame selection based on content similarity for low complexity HEVC encoder. J Vis Commun Image Represent, Part B 40:516–524. https://doi.org/10.1016/j.jvcir.2016.07.018

    Article  Google Scholar 

  25. Pan Z, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast motion estimation based on content property for low-complexity H.265/HEVC encoder. IEEE Trans Broadcast 62(3):675–684. https://doi.org/10.1109/TBC.2016.2580920

    Article  Google Scholar 

  26. Qazi T et al (2013) Survey on blind image forgery detection. IET Image Processing 7.7:660–670

    Article  Google Scholar 

  27. Qin Y, Sun G, Zhang X (2009) Exposing digital forgeries in video via motion vectors. Journal of computer research and development:227–233

  28. Qiu G, Morris J, Fan X (2007) Visual guided navigation for image retrieval. Pattern Recogn 40.6:1711–1721

    Article  MATH  Google Scholar 

  29. Su Y et al (2010) Exposing digital video logo-removal forgery by inconsistency of blur. Int J Pattern Recogn Artif Intell 24.07:1027–104

    Article  Google Scholar 

  30. Tong M, Zhang W, Zhang J, Chen T (2012) A video watermarking framework resistant to super strong cropping attacks based on nmf with sparseness constraints on parts of the basis matrix. J Electron Inf Technol 34.8:1819–1826

    Google Scholar 

  31. Wang W, Farid H (2000) Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th workshop on multimedia & security. ACM

  32. Wang W, Farid H (2006) Exposing digital forgeries in video by detecting double MPEG compression. In: Proceedings of the 8th workshop on multimedia and security. ACM

  33. Wei W, Qi Y (2011) Information potential fields navigation in wireless Ad-Hoc sensor networks[J]. Sensors 11(5):4794–4807

    Article  Google Scholar 

  34. Wei W, Yang XL, Zhou B et al (2012) Combined energy minimization for image reconstruction from few views[J]. Math Probl Eng 16(7):2213–2223

    MathSciNet  Google Scholar 

  35. Wei W, Fan X, Song H, Fan X, Yang J (2016) Imperfect information dynamic stackelberg game based resource allocation using hidden Markov for cloud computing. IEEE Trans Services Comput PP(99):1. https://doi.org/10.1109/TSC.2016.2528246

    Google Scholar 

  36. Wu J, Guo S, Li J, Zeng D (2016) Big data meet green challenges: big data toward green applications. IEEE Syst J 10(3):888–900

    Article  Google Scholar 

  37. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75 (4):1947–1962. https://doi.org/10.1007/s11042-014-2381-8

    Article  Google Scholar 

  38. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608. https://doi.org/10.1109/TIFS.2016.2590944

    Article  Google Scholar 

  39. Xing L, Ma Q, Zhu M (2013) Double semantic watermark algorithm for digital audio based on neural network. J Univ Electron Sci Technol China 42.2:260–265

    Google Scholar 

  40. Xu J-Y, Yu-ting S (2013) Smoothing filtering detection for digital image forensics. J Electron Inf Technol 10:001

    Google Scholar 

  41. Ye L, Jinshi C, Huijing Z, Zha H (2012) Fusion of low-and high-dimensional approaches by trackers sampling for generic human motion tracking. In: International conference on pattern recognition, pp 898–901

  42. Yuan X, Huang T, Chen Z et al (2012) Digital video forgeries detection based on textural features[J]. Comput Syst Appl 21.06:91–95

    Google Scholar 

  43. Zhan W, Liu J, Zhang G, Zhiquan W, Yuewei D (2008) Detection of forgery in digital video based on pattern noise. Journal of Southeast University (Natural Science Edition) 38(S2): 13–17

  44. Zhou Z, Yang C-N, Chen B, Sun X, Liu Q, Wu QMJ (2016) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans Inf systems E99-D(6):1531–1540. https://doi.org/10.1587/transinf.2015EDP7341

    Article  Google Scholar 

  45. Zhou Z, Wang Y, Wu QMJ, Yang C-N, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48–63. https://doi.org/10.1109/TIFS.2016.2601065

    Article  Google Scholar 

Download references

Acknowledgements

This job is supported by Scientific Research Program Funded by Shaanxi Provincial Education Department (Program No.2013JK1139) and Supported by China Postdoctoral Science Foundation (No.2013M542370) and the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20136118120010). And this project is also supported by NSFC Grant (Program No. 11301414 and No.61472318 and No.11226173) and by the Open Program of Xiamen Key Laboratory of Computer Vision and Pattern Recognition, Huaqiao University(600005-Z17X0001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xunli Fan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wei, W., Fan, X., Song, H. et al. Video tamper detection based on multi-scale mutual information. Multimed Tools Appl 78, 27109–27126 (2019). https://doi.org/10.1007/s11042-017-5083-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5083-1

Keywords

Navigation