期刊文献+

基于Inception-V3网络的双阶段数字视频篡改检测算法 被引量:2

A Two-stage Algorithm for Video Forgery Detection Based on Inception-V3 Network
下载PDF
导出
摘要 为了克服现有数字视频取证算法识别准确率低、定位能力差等缺点,提出一种具有高识别率且定位准确的基于Inception-V3网络的二级分类取证算法.在第一级分类器中提出简单的阈值判断方法来区分原始和篡改视频,第二级分类器将采用Inception-V3网络的稠密卷积核结构来自动提取篡改视频帧的高维多尺度特征.高维多尺度特征有助于提升篡改视频帧的识别率.实验结果表明,本文提出的算法不仅能准确地检测出篡改视频,还能从篡改视频中精确定位出篡改帧. In order to overcome the shortcomings(e.g. low recognition accuracy and poor localization ability) of existing video forensics techniques, a two-stage algorithm is proposed based on Inception-V3 network, whose advantage lies in the fact that it can accurately identify a forged video and locate its forged frames. After an extensive research, it is found that the average value of all the pixels in a pristine video sequence is always larger than its forged one after the video sequence is processed via several operations such as high-pass filtering and convolution. To this end, in the first stage, a simple algorithm is proposed in which a predefined threshold is employed to distinguish a forged video and a pristine video. Considering the fact that features of each frame need to be extracted manually in existing algorithms, the dense convolution kernel structure of Inception-V3 network is adopted in the second stage to automatically extract high dimensional and multi-scale features of each forged frame.Inception-V3 network can accurately locate forged frames in a forged video since dimensional and multi-scale features can more adequately express the input information. The experiments show that the proposed method performs very well both in forged video identification and forged frame localization.
作者 翁韶伟 彭一航 危博 易林 叶武剑 Weng Shao-wei;Peng Yi-hang;Wei Bo;Yi Lin;Ye Wu-jian(School of Information Engineering,Guangdong University of Technology,Guangzhou 510006,China;Guangdong Key Laboratory of Intelligent Information Processing,Shenzhen 518060,China)
出处 《广东工业大学学报》 CAS 2019年第6期16-23,共8页 Journal of Guangdong University of Technology
基金 国家自然科学基金资助项目(61872095,61872128,61571139,61201393) 广东省智能信息处理重点实验室、深圳市媒体信息内容安全重点实验室2018年开放基金课题(ML-2018-03) 广东省信息安全技术重点实验室开放课题基金资助(2017B030314131) 广州市珠江科技新星专题(2014J2200085)
关键词 数字视频取证 视频篡改识别 Inception-V3网络 篡改帧定位 digital video forensics video forgery detection Inception-V3 network forged frame localization
  • 相关文献

参考文献2

二级参考文献16

  • 1DOERR G, DUGELAY J. Collusion issue in video watermarking[A]. Security Steganography and Watermarking of Multimedia Contents Ⅶ[C]. San Jose, California, USA, 2005. 685-696.
  • 2BONEH D, SHAW J. Collusion-secure fingerprinting for digital data[J]. IEEE Trans Inform Theory, 1998, 44(5): 1897-1905.
  • 3STEINEBACH M, ZMUDZINSKI S. Countermeasure for collusion attacks against digital watermarking[A]. Security Steganography and Watermarking of Multimedia Contents Ⅷ[C]. San Jose, California, USA, 2006. 60720D- 1-60720D-9.
  • 4SWAMINATHAN A, HE S, WU M. Exploring QIM based anti- collusion fingerprinting for multimedia[A]. Security Steganography and Watermarking of Multimedia Contents Ⅷ[C]. San Jose, California, USA, 2006. 60721T-1-60721T-12.
  • 5COTRINA-NAVAU J, FERNANDEZ M, SORIANO M. A family of collusion 2-secure codes[A]. The 7th International Workshop on Information Hiding (IH2005)[C]. Barcelona, 2005.387-397.
  • 6VINOD P, BORA P K. Motion-compensated inter-flame collusion attack on video watermarking and a countermeasure[J]./LEE Proceedings-Information Security, 2006, 153(2): 61-73.
  • 7ERGUN F, KILIAN J, KUMAR R. A note on the limits of collusion resistant watermarks[A]. Advances in Cryptology-Eurocrypt 1999[C]. Prague, Czech Republic.1999. 140-149.
  • 8DOERR G, DUGELAY J. Countermeasures for collusion attacks exploiting host signal redundancy[A]. Int Workshop on Digital Watermarking(IWDW 2005)[C]. Siena, Italy, 2005.216-230.
  • 9SU K, KUNDUR D, HATZINAKOS D. A content- dependent spatially localized video watermarked for resistance to collusion and interpolation attacks[A]. Proc IEEE Int Conf on Image Processing(IClP2001)[C]. Thessaloniki, Greece, 2001. 818-821.
  • 10SU K. Digital Video Watermarking Principles for Robustness to Collusion and Interpolation Attacks[D]. University of Toronto, 2001.

共引文献9

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部