Abstract

Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee. Ascertaining the authenticity of surveillance video is an urgent problem. Inter-frame forgery is one of the most common ways for video tampering. The forgery will reduce the correlation between adjacent frames at tampering position. Therefore, the correlation can be used to detect tamper operation. The algorithm is composed of feature extraction and abnormal point localization. During feature extraction, we extract the 2-D phase congruency of each frame, since it is a good image characteristic. Then calculate the correlation between the adjacent frames. In the second phase, the abnormal points were detected by using k-means clustering algorithm. The normal and abnormal points were clustered into two categories. Experimental results demonstrate that the scheme has high detection and localization accuracy.

Highlights

  • Video sequences are often believed to provide stronger forensic evidence than still images.surveillance video, as important evidence, is often used in the case investigation

  • We focus on detecting inter-frame forgery for surveillance video, which is one of the most common ways for video tampering

  • We propose a novel scheme for inter-frame forgery detection based on 2D phase congruency and k-means clustering

Read more

Summary

Introduction

Video sequences are often believed to provide stronger forensic evidence than still images. Surveillance video, as important evidence, is often used in the case investigation. The digitization feature makes surveillance video easy to be manipulated. Tampering with a digital video without leaving visible clues is accomplished by using a video editing software, such as. Digital video forensics, which is designed to verify the trustworthiness of digital video, has become an important and exciting field for recent research. Katsaounidou et al [1]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call