Abstract

Illegally filmed images, the sharing of non-consensually filmed images over social media, and the secret recording and distribution of celebrity images are increasing. To catch distributors of illegally filmed images, many investigation techniques based on an analysis of the file attribute information of the original images have been introduced. As forensic science advances, various types of anti-forensic technologies are being produced, requiring investigators to open and analyze all videos from the suspect’s storage devices, raising the question of the invasion of privacy during the investigation. The suspect can even file a lawsuit, which makes issuing a warrant and conducting an investigation difficult. Thus, it is necessary to detect the original and manipulated images without needing to directly go through multiple videos. We propose an optimization analysis and detection method for extracting original and manipulated images from seized devices of suspects. In addition, to increase the detection rate of both original and manipulated images, we suggest a precise measurement approach for comparative thresholds. Thus, the proposed method is a new digital forensic methodology for comparing and identifying original and manipulated images accurately without the need for opening videos individually in a suspect’s mobile device.

Highlights

  • The illegal filming of videos is increasing [1,2,3]

  • When images filmed illegally through smartphones are distributed over social media, victims experience a violation of their human rights and find it tough to live a normal life

  • The original and manipulated images are cropped in a frame unit, and the similarity between the original and manipulated images is analyzed using a histogram

Read more

Summary

Introduction

The illegal filming of videos is increasing [1,2,3]. This means that “digital sex crimes”. We compare the similarity of histogram information among comparison images without checking the video files identified individually during device scanning. By hashing the individually sampled main drive-in sector boundaries first and comparing them with an already established database, it is possible to process raw media with no reference to a basic file system This method has the limitation of selecting a proper file block size that needs to balance the file identification function. The present study, if the distributed video is an edited video rather than an original video, it is difficult to find all related crime videos through hash-based research. The method proposed in this paper is a study comparing histogram similarity between videos, rather than using hash value that completely changes even if only one bit is different. It differs from previous papers in that it is able to identify the original video and manipulated video

Similar Video Sile Comparison
Proposed Method for Comparing between Original and Manipulated Videos
Interpretation of results
Image Histogram
Optimized Comparison Search Technique for Original and Manipulated Videos
Similarity Comparison Algorithm
H1 H2 N2
Threshold Estimation and Scenario-Based Experimental Results
Threshold Estimation
Scenario 1
Findings
Scenario 2
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call