Skip to main content
×
Home
    • Aa
    • Aa

An overview on video forensics

  • Simone Milani (a1), Marco Fontani (a2) (a3), Paolo Bestagini (a1), Mauro Barni (a2) (a3), Alessandro Piva (a4) (a3), Marco Tagliasacchi (a1) and Stefano Tubaro (a1)...
Abstract

The broad availability of tools for the acquisition and processing of multimedia signals has recently led to the concern that images and videos cannot be considered a trustworthy evidence, since they can be altered rather easily. This possibility raises the need to verify whether a multimedia content, which can be downloaded from the internet, acquired by a video surveillance system, or received by a digital TV broadcaster, is original or not. To cope with these issues, signal processing experts have been investigating effective video forensic strategies aimed at reconstructing the processing history of the video data under investigation and validating their origins. The key assumption of these techniques is that most alterations are not reversible and leave in the reconstructed signal some “footprints”, which can be analyzed in order to identify the previous processing steps. This paper presents an overview of the video forensic techniques that have been proposed in the literature, focusing on the acquisition, compression, and editing operations, trying to highlight strengths and weaknesses of each solution. It also provides a review of simple processing chains that combine different operations. Anti-forensic techniques are also considered to outline the current limitations and highlight the open research issues.

  • View HTML
    • Send article to Kindle

      To send this article to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle.

      Note you can select to send to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

      Find out more about the Kindle Personal Document Service.

      An overview on video forensics
      Available formats
      ×
      Send article to Dropbox

      To send this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your Dropbox account. Find out more about sending content to Dropbox.

      An overview on video forensics
      Available formats
      ×
      Send article to Google Drive

      To send this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your Google Drive account. Find out more about sending content to Google Drive.

      An overview on video forensics
      Available formats
      ×
Copyright
Corresponding author
Corresponding author: S. Milani E-mail: milani@elet.polimi.it
Linked references
Hide All

This list contains references from the content that can be linked to their source. For a full set of references and notes please see the PDF or HTML where available.

[3] W. Wang ; H. Farid : Detecting re-projected video, in Information Hiding, Lecture Notes in Computer Science, K. Solanki , K. Sullivan , and U. Madhow , eds., vol. 5284, Springer, Berlin2008, 7286.

[4] W. Wang ; H. Farid : Exposing digital forgeries in video by detecting double MPEG compression, in MM&Sec, S. Voloshynovskiy , J. Dittmann , and J. J. Fridrich , eds., ACM, 2006, 3747.

[11] M. Tagliasacchi ; G. Valenzise ; S. Tubaro : Hash-based identification of sparse image tampering. IEEE Trans. Image Process., 18(11) (2009), 24912504.

[15] J. Lukas ; J. Fridrich ; M. Goljan : Digital camera identification from sensor pattern noise. IEEE Trans. Info. Forensics and Secur., 1(2) (2006), 205214.

[16] M. Chen ; J. J. Fridrich ; M. Goljan ; J. Lukás : Determining image origin and integrity using sensor noise, IEEE Trans. on Info. Forensics Secur., 3(1) (2008), 7490.

[17] A. Popescu ; H. Farid : Exposing digital forgeries in color filter array interpolated images, IEEE Trans. Signal Process., 53(10) (2005) 39483959.

[18] M. K. Johnson ; H. Farid : Exposing digital forgeries through chromatic aberration, in MM&Sec, S. Voloshynovskiy , J. Dittmann , and J. J. Fridrich , eds., ACM, 2006, 4855.

[19] I. Yerushalmy ; H. Hel-Or : Digital image forgery detection based on lens and sensor aberration, Int. J. Comput. Vis., 92(1) (2011), 7191.

[23] W. S. Lin ; S. K. Tjoa ; H. V. Zhao ; K. J. R. Liu : Digital image source coder forensics via intrinsic fingerprints, IEEE Trans. Info. Forensics Secur., 4(3) (2009), 460475.

[27] Z. C. Lin ; J. F. He ; X. Tang ; C. K. Tang : Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis, Pattern Recognit., 42(11) (2009) 24922501.

[30] T. Bianchi ; A. Piva : Detection of nonaligned double jpeg compression based on integer periodicity maps, IEEE Trans. Info. Forensics Secur., 7(2) (2012), 842848.

[31] M. K. Johnson ; H. Farid : Exposing digital forgeries in complex lighting environments, IEEE Trans. Info. Forensics Secur., 2(3–1) (2007), 450461.

[42] W. van Houten ; Z. J. M. H. Geradts : Source video camera identification for multiply compressed videos originating from youtube. Digital Investigation, 6(1–2) (2009), 4860.

[44] M.-J. Lee ; K.-S. Kim ; H.-K. Lee : Digital cinema watermarking for estimating the position of the pirate. IEEE Trans. Multimed., 12(7) (2010), 605621.

[47] G. Wallace : The jpeg still picture compression standard. IEEE Trans. Consum. Electron., 38(1) (1992), xviiixxxiv.

[59] A. R. Reibman ; V. A. Vaishampayan ; Y. Sermadevi : Quality monitoring of video over a packet network. IEEE Trans. Multimed., 6(2) (2004), 327334.

[60] M. Naccari ; M. Tagliasacchi ; S. Tubaro : No-reference video quality monitoring for H.264/AVC coded video. IEEE Trans. Multimed., 11(5) (2009), 932946.

[70] M. Kobayashi ; T. Okabe ; Y. Sato : Detecting forgery from static-scene video based on inconsistency in noise level functions. IEEE Trans. Info. Forensics Secur., 5(4) (2010), 883892.

[72] W. Wang ; H. Farid : Exposing digital forgeries in interlaced and deinterlaced video. IEEE Trans. Info. Forensics Secur., 2(3–1) (2007), 438449.

[75] L.-W. Kang ; C.-Y. Hsu ; H.-W. Chen ; C.-S. Lu ; C.-Y. Lin ; S.-C. Pei : Feature-based sparse representation for image similarity assessment, IEEE Trans. Multimed., 13(5) (2011), 10191030.

Recommend this journal

Email your librarian or administrator to recommend adding this journal to your organisation's collection.

APSIPA Transactions on Signal and Information Processing
  • ISSN: 2048-7703
  • EISSN: 2048-7703
  • URL: /core/journals/apsipa-transactions-on-signal-and-information-processing
Please enter your name
Please enter a valid email address
Who would you like to send this to? *
×

Keywords:

Metrics

Full text views

Total number of HTML views: 77
Total number of PDF views: 611 *
Loading metrics...

Abstract views

Total abstract views: 475 *
Loading metrics...

* Views captured on Cambridge Core between September 2016 - 24th June 2017. This data will be updated every 24 hours.