Abstract

Recently, the rapid development of video editing software has made video forgery applicable. Researchers have proposed methods to detect forged video frames. These methods utilize codec properties, motion artifacts, noise effect and frame similarity to detect forgery. Execution time and low detection accuracy are the two main drawbacks of forgery detection methods reported in the literature. In this study, a new frame duplication detection method using Local Difference Binary (LDB) is proposed to extract features from the frames. Distance between similar frames that have similar feature vectors are is used by the method to estimate Distance of Forgery and to determine the exact location of duplicated frames. PSNR between similar frames are is then used to group them into three classes, and rule-based mechanism reports forged frames according to the membership to classes. Experimental results indicate that the proposed method has lower execution time with higher accuracy than similar works.

Highlights

  • IntroductionAnti-forensic researches on multimedia files (such as image, video, etc.) gains popularity in literature

  • In recent years, anti-forensic researches on multimedia files gains popularity in literature

  • Execution time and low detection accuracy are the two main drawbacks of forgery detection methods reported in the literature

Read more

Summary

Introduction

Anti-forensic researches on multimedia files (such as image, video, etc.) gains popularity in literature. Two factors are effective on increasing attention: Widespread usage of multimedia files in daily life and development of usable multimedia editing tools. A new problem was raised with an increase in widespread usage of multimedia acquisition tools and development of usable multimedia editing tools: Authenticity of the multimedia files. Two approaches are used in the literature for ensuring the authenticity of the multimedia files: Active and Passive methods. The former method constructs the specially created information called watermark and embeds it into the multimedia files using special techniques. Active methods necessitate usage of specially written software to embed the watermark information into the image, or specially equipped hardware must be used during the capturing of multimedia files. We are especially interested of video authentication problem because less effort has been made in that field compared to image authentication area

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call