Video matting tampering detection based on time and space domain traces
DOI: 10.23977/acss.2024.080305 | Downloads: 3 | Views: 77
Author(s)
Wenyi Zhu 1, Yulin Zhao 1, Yingqian Deng 1
Affiliation(s)
1 School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China
Corresponding Author
Wenyi ZhuABSTRACT
Deep learning-based videos usually leave imperceptible traces when tampered with. Tampered videos may be used for malicious video manipulation, which raises privacy and security concerns. Therefore the detection and localisation of tampered video traces is necessary. In this paper, we locate the tampering region by using the traces left behind by time and space domain information, and use VOS as a refinement network to improve the model performance. Firstly, the base network enhances the tampering traces by intra- and inter-frame residuals, and a dual-stream network is designed as an encoder to extract the special diagnosis from the frame residuals. Afterwards, a bidirectional convolutional LSTM and transposed convolution are embedded in the decoder to generate a prediction mask. Afterwards, a VOS network is used to obtain more accurate object boundaries. Extensive experimental results on public and synthetic manipulated datasets show that the proposed method can accurately locate tampered regions and outperforms and is robust to state-of-the-art methods.
KEYWORDS
Video forensics, tamper region localisation, optical flow, frame residualsCITE THIS PAPER
Wenyi Zhu, Yulin Zhao, Yingqian Deng, Video matting tampering detection based on time and space domain traces. Advances in Computer, Signals and Systems (2024) Vol. 8: 33-40. DOI: http://dx.doi.org/10.23977/acss.2024.080305.
REFERENCES
[1] Stamm, M.C.; Wu, M.; Liu, K.R. Information forensics: An overview of the first decade. IEEE Access 2013,1, 167-200.
[2] J. Redi, W. Taktak, Digital image forensics: a booklet for beginners, MultimediaTools and Applications 51 (2) (2011) 133–162.
[3] B. Mahdian, R. Nedbal, S. Saic, Blind verification of digital image originality: astatistical approach, IEEE Transactions on Information Forensics and Security 8 (9) (2013) 1531–1539.
[4] Asghar, K., Habib, Z., & Hussain, M. (2017). Copy-move and splicing image forgery detection and localization techniques: a review. Australian Journal of Forensic Sciences, 49(3), 281-307.
[5] Sowmya, K., & Chennamma, H. (2015). A survey on video forgery detection. International Journal of Computer Engineering and Applications,9(2), 17-27.
[6] Birajdar, G. K., & Mankar, V. H. (2013). Digital image forgery detection using passive techniques: A survey. Digital investigation, 10(3), 226-245.
[7] Peng Zhou, Ning Yu, Zuxuan Wu, Larry S Davis, Abhinav Shrivastava,and Ser-Nam Lim, "Deep video inpainting detection," arXiv preprintarXiv:2101.11080, 2021.
[8] Xiangling Ding, Yifeng Pan, Kui Luo, Yanming Huang, Junlin Ouyang,and Gaobo Yang, "Localization of deep video inpainting basedon spatiotemporal convolution and refinement network," in IEEEInternational Symposium on Circuits and Systems, 2021, pp. 1–5.
[9] Haodong Li and Jiwu Huang, "Localization of deep inpaintingusing high-pass fully convolutional network," in IEEE InternationalConference on Computer Vision, 2019, pp. 8301–8310.
Downloads: | 15903 |
---|---|
Visits: | 270760 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks