DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES

Similar documents
Introduction to Video Forgery Detection: Part I

Format Based Photo Forgery Image Detection S. Murali

Literature Survey on Image Manipulation Detection

Multimedia Forensics

Image Forgery Detection Using Svm Classifier

Impeding Forgers at Photo Inception

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Exposing Digital Forgeries from JPEG Ghosts

Compression and Image Formats

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

Tampering and Copy-Move Forgery Detection Using Sift Feature

Digital Image Processing Introduction

Image Forgery Identification Using JPEG Intrinsic Fingerprints

Neuro-Fuzzy based First Responder for Image forgery Identification

Exposing Photo Manipulation with Geometric Inconsistencies

Automation of JPEG Ghost Detection using Graph Based Segmentation

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

Tampering Detection Algorithms: A Comparative Study

Content Based Image Retrieval Using Color Histogram

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES

Practical Content-Adaptive Subsampling for Image and Video Compression

Countering Anti-Forensics of Lateral Chromatic Aberration

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

Wavelet-based Image Splicing Forgery Detection

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

Forensic Hash for Multimedia Information

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Quality Measure of Multicamera Image for Geometric Distortion

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

IMAGE COMPOSITE DETECTION USING CUSTOMIZED

Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images

Survey On Passive-Blind Image Forensics

Zero-Based Code Modulation Technique for Digital Video Fingerprinting

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

An Efficient Method for Vehicle License Plate Detection in Complex Scenes

S SNR 10log. peak peak MSE. 1 MSE I i j

Fragile Sensor Fingerprint Camera Identification

Camera identification from sensor fingerprints: why noise matters

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION

Digital Image Forgery Detection using Wavelet Decomposition and Edge Detection

SURVEILLANCE SYSTEMS WITH AUTOMATIC RESTORATION OF LINEAR MOTION AND OUT-OF-FOCUS BLURRED IMAGES. Received August 2008; accepted October 2008

IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Information Forensics: An Overview of the First Decade

An Enhanced Least Significant Bit Steganography Technique

Local prediction based reversible watermarking framework for digital videos

Forgery Detection using Noise Inconsistency: A Review

Copy-Move Image Forgery Detection using SVD

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

An Efficient Method for Contrast Enhancement in Still Images using Histogram Modification Framework

IMAGE SPLICING FORGERY DETECTION

Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan 2 Prof. Ramayan Pratap Singh 3

Global Contrast Enhancement Detection via Deep Multi-Path Network

Color Image Segmentation in RGB Color Space Based on Color Saliency

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

Journal of mathematics and computer science 11 (2014),

Images and Graphics. 4. Images and Graphics - Copyright Denis Hamelin - Ryerson University

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING

Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network

University of Bristol - Explore Bristol Research. Peer reviewed version Link to published version (if available): /ISCAS.1999.

Bandit Detection using Color Detection Method

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

An Improved Bernsen Algorithm Approaches For License Plate Recognition

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

How Many Pixels Do We Need to See Things?

Subjective evaluation of image color damage based on JPEG compression

The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.

Method for Real Time Text Extraction of Digital Manga Comic

Effective Contrast Enhancement using Adaptive Gamma Correction and Weighting Distribution Function

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter

A Mathematical model for the determination of distance of an object in a 2D image

Adaptive Gamma Correction With Weighted Distribution And Recursively Separated And Weighted Histogram Equalization: A Comparative Study

RESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT DETECTION IN VIDEO IMAGES USING CONNECTED COMPONENT ANALYSIS

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.

Auditory modelling for speech processing in the perceptual domain

Applications & Theory

Matlab Based Vehicle Number Plate Recognition

Analysis of Various Methodology of Hand Gesture Recognition System using MATLAB

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

EFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY

License Plate Localisation based on Morphological Operations

On the efficiency of luminance-based palette reordering of color-quantized images

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Comparative Analysis of Lossless Image Compression techniques SPHIT, JPEG-LS and Data Folding

Independent Component Analysis- Based Background Subtraction for Indoor Surveillance

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK

Transcription:

International Journal of Advanced Technology & Engineering Research (IJATER) 3 rd International e-conference on Emerging Trends in Technology DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES Govindraj Chittapur, Basaveshwar Engineering College, Bagalkot; S. Murali, Maharaja College Of Engineering Mysore; Abstract We are proposing forensic techniques that are capable of detecting traces of tampering in digital Video without specialized hardware. These techniques operate under The assumption that video contain naturally occurring properties which are disturbed by Tampering, and which can be quantifed, measured, and used to expose video fakes. In this context we are proposing techniques used in copy-paste and copy move interlaced video frames using statistical mean comparision.these techniques provide a valuable forensic techniques for authenticating digital video. Introduction Image and video forgery Nowadays, we come across doctored images and videos frequently and unknowingly. While these images might tarnish the public opinion of a celebrity, cases involving manipulated images with more serious implications have arisen in science and law. The art of making an image/video forgery is as old as photography itself. In its early years, photography became the chosen method for making portraits, and portrait photographers learned that they could improve sales by retouching their photographs to please the purchaser [1]. Photo and video manipulation has become more common in the age of digital cameras and image editing software. In recent years, an exhaustive inventory of every photo manipulation in video would be nearly impossible, so we focus here on the instances that have been most controversial or notorious, or ones that raise the most interesting ethical questions [2]. The photographers have also experimented with video composing, i.e., combining multiple images into one and creating doctored videos. Digital images/video offer many attributes for tamper detection algorithms to take advantage of, specifically the color and brightness of individual pixels as well as the resolution and format. These properties provide scope for the analysis and comparison between the fundamentals of digital forgeries in an effort to develop a better algorithm for detecting tampering in a video. Two types of video forensics schemes are widely used for image/video forgery detection: Active schemes and Passive schemes. In the active schemes, a watermark is used to detect tampering. However, this scheme needs a facility to embed the watermark [3]. On contrary, the Passive schemes extract some intrinsic characteristics of image/video to detect the tampered regions. In this paper we propose a passive forgery detection method based on the statistical mean comparison. Temporal difference of each frame in the input video is analyzed. This process has successfully detected tampered regions. Related Work on Video Forgery Currently, most acquisition and manipulation tools use the JPEG and MPEG standard for image and video compression. As a result, one of the standard approaches is to use the blocking fingerprints introduced by MPEG compression, as reliable indicators of possible image tampering. Not only do these inconsistencies help determine possible forgery, they can also be used to detect the abnormalities due to addition or removal of frames in the video sequence, modified regions or masked regions in the frames. Many passive schemes have been developed for tampered region detection of in-painting JPEG images [4], Histogram equalization based contrast enhancement techniques [5], Blue screen special effects in videos [6], Markov model on motion residue video [7], Ballistics motion [8], Non-sampled contourlet Transformation and Gradients information [9], Advanced statistical and adaptive threshold [10], Correlation noise residue [11], Double MPEG compression [12], Detection duplication [13], Detecting double quantization [14], Photo image forgery techniques [15,17] Luminance Level Techniques [16], and, Anti-forensic techniques for frame add/delete in mpeg video[18]. Though these algorithms show good results they are complicated and take more time to compute. There is need to overcome these two drawbacks. ISSN No: 2250-3536 E-ICETT 2014 13

Methodology and Implementation When a video sequence is captured, there is typically a great deal of redundancy between the successive frames of video. The MPEG video compression technique exploits this redundancy by predicting certain frames in the video sequence from others, then by encoding the residual difference between the predicted frame and the actual frame. Because the predicted difference can be compressed at a higher rate than a frame in its entirety, this leads to a more efficient compression scheme. Performing compression in this manner has its drawbacks, however, because error introduced from one frame will propagate to all frames predicted from it. To prevent error propagation, the video sequence is divided into segments, where each segment is referred to as a group of pictures (gp). Frame prediction is performed within each segment, but never across segments, thus preventing decoding errors in one frame from spreading throughout video sequence. Within each group of pictures, frames are divided into three types: intraframes (I-frames), predicted-frames (P-frames), and bidirectional-frames (B-frames). Each gp begins with an I- frame, followed by a number of P-frames and B-frames. No prediction is performed when encoding I-frames; therefore each I-frame is encoded and decoded independently. During encoding, each I-frame is compressed through a loss process similar to JPEG compression. P-frames are predicatively encoded through a process known as motion estimation. A predicted version of the current P-frame is obtained by first segmenting the frame into 16X16 pixel blocks known as macro blocks, then searching the previous P or I-frame, known as the anchor frame, for the macro block that best matches each macro block in the current P-frame. The locations of these macro blocks in the anchor frame are stored, along with how far each macro block must be displaced to create the predicted frame. These displacements are referred to as motion vectors. The residual error between the predicted frame and the current frame, known as the prediction error, is then compressed using the same JPEG like process that I-frames undergo. Mean Frame Comparison Technique In the given input video, read the content of pictures in terms of input video frames as well as read the content of source of original video frames where in Mean compare operation is performed on every frame of the video.the Mean comparison is performed in frame-by-frame fashion i.e. each and every pixel undergoes Comparison with pixel-by-pixel comparison and extracting the mean of each frame in frame set. On comparison of frames, if the mean value of frames in frame set value is equal then that area is masked in black. If there is any difference in the frame value between these groups of pictures then that area/region can be identified to be tampered. The result viewed will show a black masked area where there is no difference between these group of picture frames i.e. no difference between the pixel value of original and forged frames in videos. And the area where there is pixel frame difference will be highlighted which was a tampered area is been suspected; mathematical model for Mean Comparison is given as: Let f (x) is the original group of picture frame set and let f (y) is the forged group of picture frame set by extracting the features of each frames in forged video set On using Mean Comparisons we obtained as f (z) = f (x) ~ f(y) -------- (1) Where f(z) is the suspected and identified forged region of picture frames in digital videos where f(x) and f(y) are original and forged feature set videos. Audio Forgery Detection Video is made of Moving frames, each attached with an audio. So if changes in audio are made, it is also called forgery. We have implemented a methodology which detects audio forgery in a video. The methodology works as follows. Firstly, the video which is to checked whether it is forged or not is loaded. Then, audio is extracted from the video using some software s and later it converted into wav file. Now the audio is segmented. These segments Ea features are extracted and written in a text file. Now these features are compared with the original segments. And forged segments are found out and classified. Now join only the forged segments and play it. Finally, only the forged audio is found. Mathematically represented as, Assume F(x 1 ) as original and F(x 2 ) as Forged. F(x 1 ) = ( F(a 1 ) + F(a 2 ) + + F(a n ) ) ---------(2) F(x 2 ) = ( F(a 1 ) + F(a 2 ) + + F(a n ) ) ---------(3) Compare the segments and extract only the forged parts and join them. F(y) = (F(a i ) + F(a i+1 ) +.. + F(a n ) ) -------(4) Here the Equation (4) shows the region of forged audio part of tested video i.e. F(y) is the forged part. Results and Discussion Videos have been captured from Sony digital camera, and algorithm implementation has been done in Mat Lab. Also, 100 different videos from various galleries including categories of indoor and outdoor scenes were used for testing. Forgery detection was quite successful in all categories of videos. ISSN No: 2250-3536 E-ICETT 2014 14

(ii) Forgery Set identified in video Frame Gallery Fig1. Explains Original Video frames from Original Video (iii) Forged Audio Part Detected Fig2. Explains Forged Video frames from Forgery Video 100 80 60 40 20 0 1 forged original Fig 3. Resultant of Forgery Region Detection of Mean Frame algorithm. Fig4. Result of Mean Frame Comparison Graph of (I) Original Frame Set Gallery From the Figure (1), (2) and (3) explains about an example of Original Frames from tested video later on which is being forged with the help of video editing software with changing Contrast and some part of the frames are changed the content of frame information by applying skillful set where normal person won't be identified with his eyes as forgery one. We testes those videos with perception based and succeeded. With references of Figure (3) it explains the mean compression algorithm result and identified the forgery region in given forged input video as test image. Figure (4) explains the result of average mean of tested original frames (i) and same result can be extracted for forgery frames (ii), we succeed by considering mean comparison between tested original and forged videos.(iii) Explains audio forged region detection with the help of statistical mean frame with extracted feature detection method. Even though we computed for success Rate and Precision Rate for tested video Gallery. The precision and recall rates (Equations (2) and (3)), have been computed based on the number of correctly detected tampered parts in forged videos, in an order to further evaluated the efficiency and robustness. The precision rate is defined as the ration of correctly detected parts to the sum of correctly detected parts plus false positive. False positive are those regions in the image, which are actually not tampered parts, but have detected by the algorithm as tampered parts. ISSN No: 2250-3536 E-ICETT 2014 15

Correctly detected parts Precision Rate = ----------------------------------------- * 100 ------(2) Correctly detected parts + False Positives The Recall rate is defined as the ratio of correctly detected parts to the sum of correctly detected parts plus false negatives. False negatives are those regions in the image, which are actually tampered parts, but have been not detected by the algorithm. Correctly detected parts Recall Rate = ------- ----------------------------- * 100% ------------- (3) Correctly detected parts + False Negatives With the help of equation (2) and (3) we succeeded to compute precision rate and recall rate of Mean comparison Algorithm. Table 1 explains the predicating success rate and precision rate of forgery frames applicable in video forgery set. TOOLS USED FOR FRAME SET FORGERY NO OF FRAMES IN FORGERY TESTED VIDEO PRECISSION RATE USING PAINT 50 92.2 92.6 USING PHOTO SHOP HETROGINIOUS TOOLS 50 45.4 37.7 50 68.8 65.2 RECALL RATE We are getting good result in frames forgery done with paint and heterogeneous image frame editing software s by applying various frame enhancement and modification techniques and lesser in advance frame editing techniques supported by photo shop tool. Conclusion This Paper outlined the methodology used in detecting digital video tampering from images with known and unknown origin. While it is difficult to predict exactly how a malicious person will forge an video, a wide range of techniques have been presented to account for tamper methods. The detection system proposed mean frame comparison technique includes methods based on Mean and pixel comparison of each frames in video data frame set used with unknown image source. An experiment testing this method has been set-up that will help in determining the accuracy and correctness of the proposed tamper detection techniques, as well as when each fails. It has been conjectured that these methods will help in detecting various types of image forgeries, but one has to acknowledge that no silver-bullet exists to account for every type of forgery imaginable. To wrap up testing, an independent experiment is presented to help analyze the correctness of this system of techniques at accurately identifying blind frame set in videos as authentic or forged. Precision rate and recall rate are based on subjective to the forger skills set; it is completely dependent on how forger can viewed and modifies frames in videos. Predication of such skill is challenging for every digital forensic investigator and technocrats. Reference [1] Baxes, G. A., Digital Image Processing: Principles and Applications. New York: John Wiley & Sons, Inc, 1994. [2] www.fourandsix.com/photo-tamperinghistory/category/2012 [3] T.-T. Ng, S.-F. Chang, C.-Y. Lin, and Q. Sun, Passiveblind image forensics, In Multimedia Security Technologies for Digital Rights, W. Zeng, H. Yu, and C.- Y. Lin (eds.), Elsevier, 2006. Y.Q. Zhao, et al., Tampered region detection of inpainting JPEG images, Optik - Int. J. Light Electron Opt. (2012), http://dx.doi.org/10.1016/j.ijleo.2012.08.018 [4] Soong-Der Chen, et al., A new image quality measure for assessment of histogram equalization-based Contrast enhancement techniques, Int. J. Digital Signal Processing 22 (2012) 640 647, http://dx.doi.org/10.1016/j.dsp.2012.04.002 [5] Junyu Xu,, et al Detection of Blue Screen Special Effects in Videos Physics Procedia 33 ( 2012 ) 1316 1322 doi: 10.1016/j.phpro.2012.05.217 [6] kesev kancherla et al. Novel Blind Video Forgery Detection Using Markov Models on Motion Residue Intelligent Information and Database Systems Lecture Notes in Computer Science Volume 7198, 2012, pp 308-315 [7] Hany Farid et al. Exposing Digital Forgeries in Ballistic Motion, IEEE Transactions on information forensics and security VOL. 7, NO. 1, FEBRUARY 2012, doi: 0.1109/TIFS.2011.2165843 [8] Richao chen et al. video forgery detection based on Non-sub sampled contourlet Transformation and Gradient Information Informational Technology Journal, 2012 ISSN: 1812-5638 doi: 10.2923/itj.2012 [9] Lakis Christodoulou et al., Advanced statistical and Adaptive Threshold Techniques for moving object detection and segmentation 17th International ISSN No: 2250-3536 E-ICETT 2014 16

Conference on Digital signal processing doi: 10.1109/ICDSP.2011.6004875 [10] Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin and Chiou-Ting Hsu Video Forgery detection using correlation of noise residue Department of Electrical Engineering Tiwan. [11] wehiong wong and Hany Farid Exposing Digital Forgeries in video by detecting double MPEG compresson Proceeding of MM& SEC 2006, ACM Publications ACM 1595934936/06/0009 [12] wehiong wong and Hany Farid Exposing Digital Forgeries in video by detecting doublication Proceeding of MM& SEC 2007, ACM 9781595938572/07/0009 [13] wehiong wong and Hany Farid Exposing Digital Forgeries in video by detecting double quantization Proceeding of MM& SEC 2009, ACM 978-1-59593-857- 2/07/0009 [14] S. Murali,Govindraj B. Chittapur,Anami Basavaraj S. Detection Of Digital Photo Image Forgery 2012 IEEE International Confernce On Advanced Communication and Control Technology doi: 10.1109/ICACCCT.2012.6320754 [15] S. Murali, Anami B.S and Chittapur G.B Detection of Copy-Create Image Forgery Using Luminance Level Techniques 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, doi: 10.1109/NCVPRIPG.2011.53 [16] Murali S., Anami B. S and Chittapur G. B Detection of Photo- Forgery Detection Techniques International Journal Of Machine Intelligence Issn: 09752927 EIssn: 09759166: 2012 Volume: 4 Issue: 1 [17] Stamm, M.C and K.J. Ray Liu, Anti-forensics for frame deletion/addition in MPEG video 2011 IEEE International Conference on acoustics, speech and signal processing, doi: 10.1109/ICASSP.2011.5946872 [18] S. Murali,Basavaraj S. Anami,Govindraj B. Chittapur Detection Of Digital Photo Image Forgery Using JPEG and Direction Filters Proceedings Of International Conference On Current Trends in Engineering and Management,ICCTEM- 2012 ISBN 978-93-5051-905-9 pp::71. [19] S. Murali, Anami Basavaraj S, Chittapur Govindraj B., Detection Of Digital Photo Image Forgery Advanced communication, Control and Computing Technology 2012 IEEE International Conference Ramanathapuram, Print ISBN: 978-1-4673-2045-0, doi: 10.1109/ICACCCT.2012.6320754, PP:120-124. [20] S. Murali, Govindraj B. Chittapur, Prabhakara H.S Format Based Photo Image Forgery Detection CCSEIT -12, Proceedings of second International Conference On Computer Science, Engineering and Information Technology,ACM New York Ny, USA ISBN: 978-1- 4503-1310-0, doi:10.1145/2393216.2393292 PP: 452-457 [21] S. Murali,Govindraj B. Chittapur, Prabhakara H.S Detection Of Digital Photo Image Forgery Using Copy- Create Techniques Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012), Lecture Notes in Electrical Engineering 221, DOI: 10.1007/978-81-322-0997-3_26, _ Springer India 2013,pp:281-290. [22] Murali S, Anmi B. S, Chittapur G. B DIGITAL PHOTO IMAGE- FORGERY DETECTION TECHNIQUES International Journal Of Machine Intelligence ISSN0975-2927 Volume: 4; Issue: 1;2012 pp:405 [23] S. Murali, Govindraj B. Chittapur, Prabhakara H. S and Basavaraj S. Anami Comparison and Analysis Of Photo Image Forgery Detection Techniques International Journal Of Computer Science And Applications, Vol: 2No:6 December 2012. pp: 45-56. [24] S. Murali, Govindraj B. Chittapur and Basavaraj S. Anami Jpeg and Direction Filters:Photo Image forgery Detection Techniques International Journal Of Computer Science, systems and Information Technology, Serial Publications, vol 5,No2,2012 ISSN: 0974-5807 PP:259-273. ISSN No: 2250-3536 E-ICETT 2014 17