簡易檢索 / 詳目顯示

研究生: 蘇亭霖
Ting-Lin Su
論文名稱: 基於視頻內部影像關係係數與分類迴歸樹之影像/影片竄改偵測與定位技術
Tampering Detection and Localization Techniques for Images/Videos Based on Inter-frame Correlation and Classification and Regression Tree
指導教授: 范欽雄
Chin-Shyurng Fahn
口試委員: 王聖智
Sheng-Jyh Wang
王榮華
Jung-Hua Wang
古鴻炎
Hung-Yan Gu
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 73
中文關鍵詞: 竄改影片偵測竄改影片定位竄改影像偵測竄改影像定位數位影片驗證分類迴歸樹影片內部影像關係係數
外文關鍵詞: Tampered video detection, tampered video localization, video forgery detection, video forgery localization, duplicate video localization, inter-frame correlation, classification and regression tree.
相關次數: 點閱:247下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著高畫質數位攝影相機普及與快速發展的網際網路,人們正生活在充滿數位影像及影片的世代。我們每天都會在智慧型手機、網站、社群媒體上看到各式影片,然而越來越多強大的數位影像/影片編輯軟體推陳出新,例如:Adobe Photoshop, Video Studio, Power Director ……等等,這些軟體使竄改影片更加容易且不會留下明顯的痕跡,這讓我們無法藉由人眼去辨識影片的真偽,因此竄改影像/影片偵測已成為確保數位數據真實性的關鍵要求。
    在本篇論文中提出了兩種影片竄改辨識與定位技術,分別是基於視頻內部影像關西係數的video-based影片竄改偵測與基於分類回歸樹的image-based影片竄改偵測。video-based影片竄改偵測可判別影片是否遭到Temporal-domain的竄改並定位出相互複製的影片片段。image-based影片竄改偵測則可以分辨影片是否遭受到Spatial-domain的竄改並且定位出影格中的竄改區域。
    實驗測試中,我們使用Surrey University Library for Forensic Analysis (SULFA)偽造影片序列的實驗資料庫來檢測本論文提出方法的性能,在SULFA偽造影片序列的實驗資料庫中包含10部原始影片與10部竄改影片,解析度為320×240畫面更新率為40FPS,檔案格式為AVI,其中竄改影片又分成兩種類型的竄改,分別是4部Temporal-domain 竄改影片以及6部Spatial-domain竄改影片。最後我們列出近期的論文方法的實驗結果與我們進行比較,結果顯示本論文所提出的兩種方法,在限制相對狹小的情況下,皆具有很高的分類準確度,並且可定位出影片中的竄改區域。


    With the advent of high-quality digital video cameras and the rapid development of the internet, people are living in a full digital image/video generation. We may watch a lot of digital video on smart phone, website and community media every day. However, many and many powerful digital editing software was increasingly developed (e.g. Adobe Photoshop, Video Studio, Power Director…), tampering digital image /video is much easier and without leaving any traces. As a result the truth of image/video content can no longer be taken by human eyes. In this case, detection of tampered video has become a critical requirement to ensure the truth of digital video data, therefore, how to develop a video authentication system is a very important research.
    In this thesis, we propose two tampered video detection and localization techniques. One is video-based tampered video detection and localization based on Inter-frame Correlation and the other is image-based tampered video detection and localization based on Classification and Regression Tree. The video-based tampered video detection and localization can detect temporal-domain forgery and locate the duplicate frames. Then the image-based tampered video detection and localization can detect spatial-domain forgery and locate the tampered region of the tampered frame.
    In our experiments, we apply Surrey University Library for Forensic Analysis (SULFA) database of realistic forged sequences to evaluate our video authentication techniques. In SULFA database has 10 original videos and 10 tampered videos which are all 40FPS AVI format and the frame size is primarily 320×240. These tampered videos were divided into 4 temporal-domain forgery videos and 6 spatial-domain forgery videos. Finally, we list the recent method of paper to compared with our experimental results. The results show that the two methods presented in this paper are all with high classification accuracy in the case of relatively narrow limits, and also has the ability to locate the video tampering area.

    Chapter 1 Introduction 1 1.1 Overview 1 1.2 Motivation 3 1.3 System Description 4 1.4 Thesis organization 6 Chapter 2 Related Works 7 2.1 Active Techniques 7 2.2 Passive Techniques 9 Chapter 3 Video-based Tampered Video Detection and Localization 14 3.1 Sub-sequences Duplication Detection 14 3.1.1 Denote overlapping sub-sequences 14 3.1.2 Construct temporal correlation matrix 15 3.1.3 Duplicate segment detection 16 3.2 Exact Frames Duplication Detection and Localization 18 3.2.1 Spatial correlation matrix 18 3.2.2 Start of duplicate frames 19 3.2.3 End of duplicate frames 21 Chapter 4 Image-based Tampered Video Detection and Localization 22 4.1 Tampered Frames Detection 22 4.1.1 Video frame preprocessing 22 4.1.2 Two-scale uniform local binary pattern 24 4.1.3 Feature extraction 27 4.1.4 Classification and regression tree 31 4.2 Tampered Region Localization 35 4.2.1 Dividing a tampered frame into fit blocks 35 4.2.2 Tampered block detection 36 Chapter 5 Experimental Evaluation and Discussions 37 5.1 Experimental Setup 37 5.2 Evaluation of Video-based Tampered Video Detection and Localization 39 5.3 Evaluation of Image-based Tampered Video Detection and Localization 47 Chapter 6 Conclusions and Future Works 54 6.1 Conclusions 54 6.2 Future Works 56 References 57

    [1] P. Yin and Y. Hong, “Classification of video tampering methods and countermeasures using digital watermarking,” in Proceedings of the SPIE International Society on Optics and Photonics, Denver, Colorado, pp. 239-246, 2001.
    [2] J. Zhang, Y. Su, and M. Zhang, “Exposing digital video forgery by ghost shadow artifact,” in Proceedings of the First ACM workshop on Multimedia in forensics, Roma, Italy, pp. 49-54, 2009.
    [3] R. D. Patil, and S. Metkar, “Fragile video watermarking for tampering detection and localization,” in Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics, Kochi, India, pp. 1661-1666, 2015.
    [4] Al. Sanjary, Omar Ismael, and Ghazali Sulong, “Detection of video forgery: a review of literature,” Journal of Theoretical & Applied Information Technology, vol. 74, no. 2, 2015.
    [5] Q. Wang, Z. Li, Z. Zhang, and Q. Ma, “Video inter-frame forgery identification based on consistency of correlation coefficients of gray values,” Journal of Computer and Communications, vol. 2, pp. 51-57, 2014.
    [6] P. Bestagini, S. Milani, M. Tagliasacchi, and S. Tubaro, “Local tampering detection in video sequences,” in Proceedings of the IEEE International Workshop on Multimedia Signal Processing, Pula, Croatia, pp. 488-493, 2013.
    [7] M. Mathai, D. Rajan, and S. Emmanuel, “Video forgery detection and localization using normalized cross-correlation of moment features,” in Proceedings of the IEEE Southwest Symposium on Image Analysis and Interpretation, Santa Fe, Cuba, pp. 149-152, 2016.
    [8] Y. F. Chen, “Tampered Image detection and location techniques based on Artificial Neural Network and Compression Ghost Approaches,” Master's Thesis, Department of Computer Science and Information Engineering National Taiwan University of Science and Technology, Taipei, Taiwan, 2015.
    [9] H. W. Schreier, J. R. Braasch, and M. A. Sutton, “Systematic errors in digital image correlation caused by intensity interpolation,” in Proceedings of the SPIE International Society on Optical Engineering, Columbia, South Carolina, vol. 39, no. 11, pp. 2915-2921, 2000.
    [10] A. A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad, and G. Bebis, “Splicing image forgery detection based on DCT and Local Binary Pattern,” in Proceedings of the IEEE Global Conference on Signal and Information Processing, Austin, Texas, pp. 253-256, 2013.
    [11] W. Wang, J. Dong, and T. Tan, “Image tampering detection based on stationary distribution of Markov chain,” in Proceedings of the IEEE International Conference on Image Processing, Hong Kong, pp. 2101-2104, 2010.
    [12] G. Muhammad, M. H. Al-Hammadi, M. Hussain, A. M. Mirza, and G. Bebis, “Copy move image forgery detection method using steerable pyramid transform and texture descriptor,” in Proceedings of the IEEE EUROCON Conference, Zagreb, Croatia, pp. 1586-1592, 2013.
    [13] W. Wei, D. Jing, and T. Tieniu, "Effective image splicing detection based on image chroma," in Proceedings of the IEEE International Conference, Cairo, Egypt, pp. 1257-1260, 2009.
    [14] T. Ojala, M. Pietikäinen, and D. Harwood, "Performance evaluation of texture measures with classification based on Kullback discrimination of distributions," in proceedings of the 12th IAPR International Conference on Pattern Recognition, Jerusalem, Israel, vol. 1, pp. 582-585, 1994.
    [15] T. Ojala, M. Pietikäinen, and D. Harwood, "A comparative study of texture measures with classification based on feature distributions", Journal of the Pattern Recognition Society, Oulu, Finland, vol. 29, pp. 51-59, 1996.
    [16] T. Ojala, M. Pietikainen, and T. Maenpaa, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,” in Proceedings of the IEEE Transactions on Pattern Analysis and Machine Intelligence, Los Alamitos, California, vol. 24, no. 7, pp. 971-987, 2002.
    [17] Y. Zhang, C. Zhao, Y. Pi, and S. Li, "Revealing image splicing forgery using local binary patterns of DCT coefficients," in Proceedings of the International Conference on Communications, Signal Processing, and Systems, Springer, New York, pp. 181-189, 2012.
    [18] L. Breiman, J. Friedman, C. J. Stone, and R. A. Olshen, Classification and Regression Trees, Wadsworth International Group, Belmont, California, 1984.
    [19] X. Wu, V. Kumar, J. R. Quinlan, J. Ghosh, Q. Yang, H. Motoda, et al., “Top 10 algorithms in data mining,” International Journal of Knowledge and Information Systems, vol. 14, no.1, pp. 1-37, 2008.
    [20] R. J. Lewis, “An introduction to classification and regression tree (CART) analysis,” Annual meeting of the society for academic emergency medicine , San Francisco, California, pp. 1-14, 2000.
    [21] G. Qadir, S. Yahaya, and A. T. Ho, “Surrey university library for forensic analysis (SULFA) of video content,” in Proceedings of the IET Conference on Image Processing, London, England, pp. 1-6, 2012.
    [22] “Weka Data Mining Software”, [Online] Available http://www.cs.waikato.ac.nz/ml/weka/ (accessed on June 26, 2015)

    無法下載圖示 全文公開日期 2021/08/10 (校內網路)
    全文公開日期 2026/08/10 (校外網路)
    全文公開日期 2026/08/10 (國家圖書館:臺灣博碩士論文系統)
    QR CODE