Education, Science, Technology, Innovation and Life
Open Access
Sign In

Video matting tampering detection based on time and space domain traces

Download as PDF

DOI: 10.23977/acss.2024.080305 | Downloads: 3 | Views: 77

Author(s)

Wenyi Zhu 1, Yulin Zhao 1, Yingqian Deng 1

Affiliation(s)

1 School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China

Corresponding Author

Wenyi Zhu

ABSTRACT

Deep learning-based videos usually leave imperceptible traces when tampered with. Tampered videos may be used for malicious video manipulation, which raises privacy and security concerns. Therefore the detection and localisation of tampered video traces is necessary. In this paper, we locate the tampering region by using the traces left behind by time and space domain information, and use VOS as a refinement network to improve the model performance. Firstly, the base network enhances the tampering traces by intra- and inter-frame residuals, and a dual-stream network is designed as an encoder to extract the special diagnosis from the frame residuals. Afterwards, a bidirectional convolutional LSTM and transposed convolution are embedded in the decoder to generate a prediction mask. Afterwards, a VOS network is used to obtain more accurate object boundaries. Extensive experimental results on public and synthetic manipulated datasets show that the proposed method can accurately locate tampered regions and outperforms and is robust to state-of-the-art methods.

KEYWORDS

Video forensics, tamper region localisation, optical flow, frame residuals

CITE THIS PAPER

Wenyi Zhu, Yulin Zhao, Yingqian Deng, Video matting tampering detection based on time and space domain traces. Advances in Computer, Signals and Systems (2024) Vol. 8: 33-40. DOI: http://dx.doi.org/10.23977/acss.2024.080305.

REFERENCES

[1] Stamm, M.C.; Wu, M.; Liu, K.R. Information forensics: An overview of the first decade. IEEE Access 2013,1, 167-200.
[2] J. Redi, W. Taktak, Digital image forensics: a booklet for beginners, MultimediaTools and Applications 51 (2) (2011) 133–162.
[3] B. Mahdian, R. Nedbal, S. Saic, Blind verification of digital image originality: astatistical approach, IEEE Transactions on Information Forensics and Security 8 (9) (2013) 1531–1539.
[4] Asghar, K., Habib, Z., & Hussain, M. (2017). Copy-move and splicing image forgery detection and localization techniques: a review. Australian Journal of Forensic Sciences, 49(3), 281-307.
[5] Sowmya, K., & Chennamma, H. (2015). A survey on video forgery detection. International Journal of Computer Engineering and Applications,9(2), 17-27.
[6] Birajdar, G. K., & Mankar, V. H. (2013). Digital image forgery detection using passive techniques: A survey. Digital investigation, 10(3), 226-245.
[7] Peng Zhou, Ning Yu, Zuxuan Wu, Larry S Davis, Abhinav Shrivastava,and Ser-Nam Lim, "Deep video inpainting detection," arXiv preprintarXiv:2101.11080, 2021.
[8] Xiangling Ding, Yifeng Pan, Kui Luo, Yanming Huang, Junlin Ouyang,and Gaobo Yang, "Localization of deep video inpainting basedon spatiotemporal convolution and refinement network," in IEEEInternational Symposium on Circuits and Systems, 2021, pp. 1–5.
[9] Haodong Li and Jiwu Huang, "Localization of deep inpaintingusing high-pass fully convolutional network," in IEEE InternationalConference on Computer Vision, 2019, pp. 8301–8310.

Downloads: 15903
Visits: 270760

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.