Journal of Guangdong University of Technology ›› 2019, Vol. 36 ›› Issue (06): 16-23.doi: 10.12052/gdutxb.190046

• Comprehensive Studies • Previous Articles     Next Articles

A Two-stage Algorithm for Video Forgery Detection Based on Inception-V3 Network

Weng Shao-wei1,2, Peng Yi-hang1,2, Wei Bo1, Yi Lin1, Ye Wu-jian1   

  1. 1. School of Information Engineering, Guangdong University of Technology, Guangzhou 510006, China;
    2. Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen 518060, China
  • Received:2019-03-25 Online:2019-11-28 Published:2019-11-01

Abstract: In order to overcome the shortcomings (e.g. low recognition accuracy and poor localization ability) of existing video forensics techniques, a two-stage algorithm is proposed based on Inception-V3 network, whose advantage lies in the fact that it can accurately identify a forged video and locate its forged frames. After an extensive research, it is found that the average value of all the pixels in a pristine video sequence is always larger than its forged one after the video sequence is processed via several operations such as high-pass filtering and convolution. To this end, in the first stage, a simple algorithm is proposed in which a predefined threshold is employed to distinguish a forged video and a pristine video. Considering the fact that features of each frame need to be extracted manually in existing algorithms, the dense convolution kernel structure of Inception-V3 network is adopted in the second stage to automatically extract high dimensional and multi-scale features of each forged frame. Inception-V3 network can accurately locate forged frames in a forged video since dimensional and multi-scale features can more adequately express the input information. The experiments show that the proposed method performs very well both in forged video identification and forged frame localization.

Key words: digital video forensics, video forgery detection, Inception-V3 network, forged frame localization

CLC Number: 

  • TP391
[1] NA S, OH W, JEONG D. A frame-based video signature method for very quick video identification and location[J]. ETRI Journal, 2013, 35(2):281-291
[2] LEE S, YOO C D. Robust video fingerprinting for content-based video identification[J]. IEEE Trans on Circuits and Systems for Video Technology, 2008, 18(7):983-988
[3] CHETTY G, BISWAS M, SIGNH R. Digital video tamper detection based on multimodal fusion of residue features[C]//Fourth International Conference on Network & System Security. IEEE Computer Society. Melbourne:IEEE, 2010:606-613.
[4] GOODWIN J, CHETTY G. Blind video tamper detection based on fusion of source features[C]//International Conference on Digital Image Computing:Techniques & Applications. Noosa:IEEE, 2011:608-613.
[5] BESTAGINI P, MILANI S, TAGLIASACCHI M, et al. Local tampering detection in video sequences[C]//Proceedings of the IEEE 15th International Workshop on Multimedia Signal Processing. Pula:IEEE, 2013:488-493.
[6] LI L, WANG X, ZHANG W, et al. Detecting removed object from video with stationary background[C]//International Conference on Digital Forensics & Watermarking. Shanghai:Springer, 2012:242-252.
[7] BIDOKHTI A, CHAEMMAGHAMI S. Detection of region copy move forgery in MPEG videos using optical flow[C]//International Symposium on Artificial Intelligence and Signal Processing. Mashhad:IEEE, 2015:13-17.
[8] PANDEY R C, SINGH S K, SHUKLA K K. Passive copy-move forgery detection in videos[C]//Proceedings of the International Conference on Computer and Communication Technology. Allahabad:Springer, 2014:301-306.
[9] 叶武剑, 高海健, 翁韶伟, 等. 基于CGAN网络的二阶段式艺术字体渲染方法[J]. 广东工业大学学报, 2019, 36(3):48-54 YE W J, GAO H J, WENG S W, et al. A Two-stage effect rendering method for art font based on CGAN network[J]. Journal of Guangdong University of Technology, 2019, 36(3):48-54
[10] CHEN S, TAN S, LI B, et al. Automatic detection of object-based forgery in advanced video[J]. IEEE Trans on Circuits and Systems for Video Technology, 2016, 26(11):2318-2350
[11] YAO Y, SHI Y, WENG S, et al. Deep learning for detection of object-based forgery in advanced video[J]. Symmetry, 2017, 10(3):1-10
[12] 刘绍辉, 韩露, 姚鸿勋. 抗共谋攻击的视频水印算法[J]. 通信学报, 2010, 31(1):14-19 LIU S H, HAN L, YAO H X. Video watermarking algorithm for resisting collusion attacks[J]. Journal on Communications, 2010, 31(1):14-19
[13] CHRISTIAN S, VICENT V, LOFFE S, et al. Rethinking the inception architecture for computer vision[C]//IEEE Conference on Computer Vision and Pattern Recognition. Las Vegas:IEEE, 2016:2818-2826.
[1] Xie Guo-bo, Lin Li, Lin Zhi-yi, He Di-xuan, Wen Gang. An Insulator Burst Defect Detection Method Based on YOLOv4-MP [J]. Journal of Guangdong University of Technology, 2023, 40(02): 15-21.
[2] Chen Jing-yu, Lyu Yi. Frost Detection Method of Cold Chain Refrigerating Machine Based on Spiking Neural Network [J]. Journal of Guangdong University of Technology, 2023, 40(01): 29-38.
[3] Ye Wen-quan, Li Si, Ling Jie. Sparse-view SPECT Image Reconstruction Based on Multilevel-residual U-Net [J]. Journal of Guangdong University of Technology, 2023, 40(01): 61-67.
[4] Zou Heng, Gao Jun-li, Zhang Shu-wen, Song Hai-tao. Design and Implementation of a Dropping Guidance Device for Go Robot [J]. Journal of Guangdong University of Technology, 2023, 40(01): 77-82,91.
[5] Xie Guang-qiang, Xu Hao-ran, Li Yang, Chen Guang-fu. Consensus Opinion Enhancement in Social Network with Multi-agent Reinforcement Learning [J]. Journal of Guangdong University of Technology, 2022, 39(06): 36-43.
[6] Liu Xin-hong, Su Cheng-yue, Chen Jing, Xu Sheng, Luo Wen-jun, Li Yi-hong, Liu Ba. Real Time Detection of High Resolution Bridge Crack Image [J]. Journal of Guangdong University of Technology, 2022, 39(06): 73-79.
[7] Xiong Wu, Liu Yi. Application of Particle Filter Algorithm in Static Deformation Monitoring of BDS High-Speed Rail [J]. Journal of Guangdong University of Technology, 2022, 39(04): 66-72.
[8] Yi Min-qi, Liu Hong-wei, Gao Hong-ming. Research on the Factors Influencing the Co-purchase Network of Products on E-commerce Platforms [J]. Journal of Guangdong University of Technology, 2022, 39(03): 16-24.
[9] Qiu Zhan-chun, Fei Lun-ke, Teng Shao-hua, Zhang Wei. Palmprint Recognition Based on Cosine Similarity [J]. Journal of Guangdong University of Technology, 2022, 39(03): 55-62.
[10] Zheng Jia-bi, Yang Zhen-guo, Liu Wen-yin. Marketing-Effect Estimation Based on Fine-grained Confounder Balancing [J]. Journal of Guangdong University of Technology, 2022, 39(02): 55-61.
[11] Gary Yen, Li Bo, Xie Sheng-li. An Evolutionary Optimization of LSTM for Model Recovery of Geophysical Fluid Dynamics [J]. Journal of Guangdong University of Technology, 2021, 38(06): 1-8.
[12] Li Guang-cheng, Zhao Qing-lin, Xie Kan. A Design of Decentralized Data Processing Scheme [J]. Journal of Guangdong University of Technology, 2021, 38(06): 77-83.
[13] Xie Guang-qiang, Zhao Jun-wei, Li Yang, Xu Hao-ran. Cooperative Lane-changing Based on Multi-cluster System [J]. Journal of Guangdong University of Technology, 2021, 38(05): 1-9.
[14] Zhang Wei, Zhang Zhen-bin. Joint Graph Embedding and Feature Weighting for Unsupervised Feature Selection [J]. Journal of Guangdong University of Technology, 2021, 38(05): 16-23.
[15] Deng Jie-hang, Yuan Zhong-ming, Lin Hao-run, Gu Guo-sheng. Superpixel and Visual Saliency Synergetic Image Quality Assessment [J]. Journal of Guangdong University of Technology, 2021, 38(05): 33-39.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!