期刊文献+

根据GOP异常进行视频序列剪辑篡改的盲检测 被引量:10

Blind Detection of Video Sequence Montage Based on GOP Abnormality
下载PDF
导出
摘要 本文根据对数字视频的剪辑篡改引起MPEG-2编码中GOP异常的现象提出一种盲检测方法.视频序列以一定的GOP结构进行压缩,其运动误差序列在Fourier变换域中存在特定的尖峰,解码后再以不同的GOP结构进行二次压缩,尖峰的分布会发生变化.经不同GOP结构进行多次压缩后,历次处理的痕迹被保留在视频信号中.因此,在视频内容无剧烈变化的情况下,根据尖峰的不一致性可准确定位被替换拼接的视频内容片段.该方法也可根据尖峰所在位置判断视频是否经过二次压缩,并推算第一次压缩的GOP结构,为检测可疑视频内容提供有用信息.实验表明这种基于GOP异常的检测方法能有效检测对视频序列的剪辑篡改. This paper proposes a blind detection technique to reveal malicious attacks on video contents by video sequence montage.The method is based on an analysis of Fourier transform of the series of motion errors.For an MPEG-2 video sequence with a particular structure of the group of pictures(GOP),spikes exist in the Fourier transform magnitude of the error series.Multiple MPEG compression with different GOP structures results in variation of spikes in the Fourier domain,leaving clear signatures of the coding history in the video sequence.These spike artifacts are used to detect video splicing,i.e.,replacing certain sections of the video with fake contents taken from other sequences with different GOP structures.This method can also be used to detect suspicious multiple compressions and find the initial GOP structure,providing useful clues to the authentication of video contents.Experiments show effectiveness of the proposed method.
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第7期1597-1602,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.60872116 No.60832010 No.60773079) 国家863高技术发展计划(No.2007AA01Z477)
关键词 视频剪辑 视频拼接 运动误差 GOP效应 二次压缩 video montage video splicing motion error group of pictures(GOP) artifacts double compression
  • 相关文献

参考文献16

  • 1S Thiemert,H Liu,M Steinebach,L Croce-Ferri.Joint forensics and watermarking approach for video authentication[A].Proceedings of Conference on Security,Steganography,and Watermarking of Multimedia Contents IX[C].San Jose,USA:SPIE,2007,65050Q.
  • 2C Baris,S Bulent,N Memon.Spatio-temporal transform based video hashing[J].IEEE Transactions on Multimedia,2006,8(6):1190-1208.
  • 3M K Mihcak,I Kozintsev,K Ramchandran.Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising[A].Proceedings of IEEE International Conference on Acoustics,Speech and Signal Processing[C].Phoenix,USA:IEEE Signal Processing Society,1999.3253 -3256.
  • 4N Mondaini,R Caldelli,A Piva,M Bami,V Cappellini.Detection of malevolent changes in digital video for forensic applications[A].Security,Steganography,and Watermarking of Multimedia Contents IX[C].San Jose,USA:SPIE,2007,65050T.
  • 5K Kenji,K Kenro,S Naoki.CCD Fingerprint method-identification of a video camera from videotaped images[A].Proceedings of IEEE International Conference on Image Processing[C].Kobe,Jpn:IEEE Signal Processing Society,1999.537 -540.
  • 6C C Hsu,T Y Hung,C W Lin,C T Hsu.Video forgery detection using correlation of noise residue[A].Proceedings of the 10th Workshop on Multimedia Signal Processing[C].Cairns,Australia:IEEE Computer Society,2008.170-174.
  • 7王俊文,刘光杰,张湛,王执铨,戴跃伟.基于模式噪声的数字视频篡改取证[J].东南大学学报(自然科学版),2008,38(A02):13-17. 被引量:20
  • 8W Wang,H Farid.Exposing digital forgeries in video by detecting duplication[A].Proceedings of the 9th Multimedia and Security Workshop[C].Dallas,USA:ACM Special Interest Group on Multimedia,2007.35-42.
  • 9M Johnson,H Farid.Exposing digital forgeries by detecting inconsistencies in lighting[A].Proceedings of the 7th Multimediaand Security Workshop[C].New York,USA:ACM SIGMM,2006.1-9.
  • 10W Wang,H Farid.Exposing digital forgeries in interlaced and de-interlaced video[J].IEEE Transactions on Information Forensics and Security,2007,2(3):438-449.

二级参考文献7

  • 1Luo W, Qu Z, Pan F, et al. A survey of passive technology for digital image forensics [ J ]. Front Comupt Sci China, 2007, 1(2): 166-179.
  • 2Wang W, Farid H. Exposing digital forgeries in video by detecting double MPEG compression[ C]//ACM Multimedia and Security Workshop. Geneva, Switzerland, 2006: 37- 47.
  • 3Wang W, Farid H. Exposing digital forgeries in video by detecting duplication[C]//ACM Multimedia and Security Workshop. Dallas, Texas, 2007:35-42.
  • 4Kharrazi M, Sencur H T. Blind source camera identification[C]//International Conference on Image Processing(ICIP). Singapore, 2004:709-712.
  • 5Lukas J, Fridrich J, Goljan M. Determining digital image origin using sensor imperfections [ C ]//Proc of Conference on Image and Video Communications and Processing. Bellingham, 2005:249- 260.
  • 6Mihcak M K, Kozintsev I, Ramchandran K. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising [C ]//Proc of IEEE Int Conf Acoustics, Speech, and Signal Processing. Phoenix, Arizona, 1999 : 3253 - 3256.
  • 7崔夏荣,苏光大.基于模式噪声的数字图像来源鉴别[J].光电子.激光,2007,18(10):1239-1243. 被引量:7

共引文献26

同被引文献107

  • 1张桂东,茅耀斌,王执铨.一种基于运动矢量的视频水印方案[J].中山大学学报(自然科学版),2004,43(A02):117-119. 被引量:9
  • 2陈娟,夏军,尹涵春.压缩视频码流中运动矢量的提取[J].电子器件,2006,29(4):1342-1345. 被引量:4
  • 3秦运龙 孙广玲 张新鹏.利用运动矢量进行视频篡改检测.计算机研究与发展,2009,46:227-233.
  • 4FARID H.Seeing is not believing[J].IEEE Spectrum,2009,46(8):44-51.
  • 5FRIDRICH J,SOUKAL D,LUKAS J.Detection of copy move forgery in digital images[C]//Proc of Digital Forensic Research Workshop 2003,Cleveland,OH,USA,August 5-8 2003.
  • 6POPESCU A C,FARID H.Exposing digital forgeries by detecting duplicated image regions[R].Technical Report,Dartmouth College,TR2004-515,2004.
  • 7MAHDIAN B,SAIC S.Detection of copy-move forgery using a method based on blur moment invariants[J].Forensic Science International,2007,171(13):180-189.
  • 8WU Q,WANG S,ZHANG X.Detection of image region-duplication with rotation and scaling tolerance[C]//To be presented at The 2nd International Conference on ComputationalCollective Intelligence,Kaohsiung,Taiwan,2010.
  • 9NG T T,CHANG S F.A model for image splicing[C]//Proc IEEE International Conference on Image Processing,Singapore,2004,2(1):1169-1172.
  • 10LUKAS J,FRIDRICH J,GOLJAN M.Detecting digital image forgeries using sensor pattern noise[C]//Proc SPIE,2006:362-372.

引证文献10

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部