Abstract
Abstract
In recent years, the rapid technological development and the emergence of mobile devices, cameras, etc., in addition to the availability of video production, editing, and formatting programs, made it easy to edit, manipulate, and fake or tamper video. As they know that pictures or videos give more information than texts; Video is a very important medium for transferring information from one place to another. One of the important types of evidence in road accidents and theft crimes. Moreover, when forensic analysis is essential for any video, the availability of origin video may be rare therefore the forensic experts must establish decisions based on the present video (under surveillance) and decide if this video is fake (tampered) or not fake. There are multiple methods to tamper video, including active and blind passive methods. In this research, we tried to combine the behavior of active methods in the process of embedding the halftone current frame of video in the DCT Coefficients of next frame of the same video with the behavior of passive methods by comparing the information embedded after extracting with the information of the current frame to determine whether there is a fake in the video or not & which frame contains tamper. The experimental results of the submitted method showed a huge level of success in locating frames in which falsification or tampering occurred through copying, deletion or insertion, or even if copy-move regions. Also, in proposed method we attempted to post-processing the fake frames using the information included in the subsequent frame, if it is not faked. Finally, the original video, the embedded halftone video, and the tamper (fake) video after post processing were compared using PSNR and SSIM similarity scales. At last, the accuracy & precision scores of tampered & non tampered frames are computed.
Publisher
Research Square Platform LLC
Reference21 articles.
1. K. Sitara and B. M. Mehtre, “Digital video tampering detection: An overview of passive techniques,” Digital Investigation, vol. 18. Elsevier Ltd, pp. 8–22, Sep. 01, 2016. doi: 10.1016/j.diin.2016.06.003.
2. A video watermarking framework resistant to super strong cropping attacks based on NMF with sparseness constraints on parts of the basis matrix;Tong M;çµåä¸ä¿æ¯å¦æ¥,2012
3. Smoothing filtering detection for digital image forensics;Jun-Yu X;çµåä¸ä¿æ¯å¦æ¥,2013
4. H. Chen, Z. Chen, X. Zeng, W. Fan, and Z. Xiong, “A novel reversible semi-fragile watermarking algorithm of MPEG-4 video for content authentication,” in 2008 Second international symposium on intelligent information technology application, IEEE, 2008, pp. 37–41.
5. Fragile watermarking tamper detection with images compressed by fuzzy transform;Martino F;Inf. Sci. (Ny).,2012