An efficient Video Forgery Detection using Two-Layer Hybridized Deep CNN classifier
DOI:
https://doi.org/10.4108/eetsis.5969Keywords:
ResNet, Statistical feature concatenation, Two layer hybridized deep CNN, Video forgery detection, YCrCb conversionAbstract
Video forgery detection is crucial to combat misleading content, ensuring trust and credibility. Existing methods encounter challenges such as diverse manipulation techniques, dataset variation, real-time processing demands, and maintaining a balance between false positives and negatives. The research focuses on leveraging a Two-Layer Hybridized Deep CNN classifier for the detection of video forgery. The primary objective is to enhance accuracy and efficiency in identifying manipulated content. The process commences with the collection of input data from a video database, followed by diligent data pre-processing to mitigate noise and inconsistencies. To streamline computational complexity, the research employs key frame extraction to select pivotal frames from the video. Subsequently, these key frames undergo YCrCb conversion to establish feature maps, a step that optimizes subsequent analysis. These feature maps then serve as the basis for extracting significant features, incorporating Haralick features, Local Ternary Pattern, Scale-Invariant Feature Transform (SIFT), and light coefficient features. This multifaceted approach empowers robust forgery detection. The detection is done using the proposed Two-Layer Hybridized Deep CNN classifier that identifies the forged image. The outputs are measured using accuracy, sensitivity, specificity and the proposed Two-Layer Hybridized Deep CNN achieved 96.76%, 96.67%, 96.21% for dataset 1, 96.56%, 96.79%, 96.61% for dataset 2, 95.25%, 95.76%, 95.58% for dataset 3, which is more efficient than other techniques.
References
[1] Walia, Savita, Krishan Kumar, Munish Kumar, and Xiao-Zhi Gao. "Fusion of handcrafted and deep features for forgery detection in digital images." IEEE Access 9 (2021), pp. 99742-99755.
[2] Hashmi, Ammarah, Sahibzada Adil Shahzad, Wasim Ahmad, Chia Wen Lin, Yu Tsao, and Hsin-Min Wang. "Multimodal Forgery Detection Using Ensemble Learning." In 2022 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), (2022) pp. 1524-1532.
[3] Mazzetto, Muriel, Marcelo Teixeira, Érick Oliveira Rodrigues, and Dalcimar Casanova. "Deep learning models for visual inspection on automotive assembling line." arXiv preprint arXiv:2007.01857 (2020).
[4] Karnati, Mohan, Ayan Seal, Anis Yazidi, and Ondrej Krejcar. "LieNet: A deep convolution neural network framework for detecting deception." IEEE Transactions on Cognitive and Developmental Systems 14, no. 3 (2021), pp. 971-984.
[5] Singhal, Sakshi, and Virender Ranga. "Passive authentication image forgery detection using multilayer cnn." In Mobile Radio Communications and 5G Networks: Proceedings of MRCN 2020, Springer Singapore, (2021), pp. 237-249.
[6] Saber, Akram Hatem, Mohd Ayyub Khan, and Basim Galeb Mejbel. "A survey on image forgery detection using different forensic approaches." Advances in Science, Technology and Engineering Systems Journal 5, no. 3 (2020), pp. 361-370.
[7] Sabah, Hanady. "A Detection of Deep Fake in Face Images Using Deep Learning." Wasit Journal of Computer and Mathematics Science 1, no. 4 (2022), pp. 94-111.
[8] Zhu, Hao, Chaoyou Fu, Qianyi Wu, Wayne Wu, Chen Qian, and Ran He. "Aot: Appearance optimal transport-based identity swapping for forgery detection." Advances in Neural Information Processing Systems 33 (2020): 21699-21712.
[9] Tyagi, Shobhit, and Divakar Yadav. "A detailed analysis of image and video forgery detection techniques." The Visual Computer 39, no. 3 (2023), pp. 813-833.
[10] Aloraini, Mohammed, Mehdi Sharifzadeh, and Dan Schonfeld. "Sequential and patch analyses for object removal video forgery detection and localization." IEEE Transactions on Circuits and Systems for Video Technology 31, no. 3 (2020), pp. 917-930.
[11] Raskar, Punam Sunil, and Sanjeevani Kiran Shah. "Real time object-based video forgery detection using YOLO (V2)." Forensic Science International 327 (2021): 110979.
[12] Saddique, Mubbashar, Khurshid Asghar, Usama Ijaz Bajwa, Muhammad Hussain, and Zulfiqar Habib. "Spatial Video Forgery Detection and Localization using Texture Analysis of Consecutive Frames." Advances in Electrical & Computer Engineering 19, no. 3 (2019).
[13] Zhou, Yangming, Qichao Ying, Yifei Wang, Xiangyu Zhang, Zhenxing Qian, and Xinpeng Zhang. "Robust watermarking for video forgery detection with improved imperceptibility and robustness." In 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), (2022), pp. 1-6.
[14] Haliassos, Alexandros, Rodrigo Mira, Stavros Petridis, and Maja Pantic. "Leveraging real talking faces via self-supervision for robust forgery detection." In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, (2022), pp. 14950-14962.
[15] Qian, Yuyang, Guojun Yin, Lu Sheng, Zixuan Chen, and Jing Shao. "Thinking in frequency: Face forgery detection by mining frequency-aware clues." In European conference on computer vision, Cham: Springer International Publishing, (2020), pp. 86-103.
[16] Rodriguez-Ortega, Yohanna, Dora M. Ballesteros, and Diego Renza. "Copy-move forgery detection (CMFD) using deep learning for image and video forensics." Journal of imaging 7, no. 3 (2021): 59.
[17] Aloraini, Mohammed, Mehdi Sharifzadeh, Chirag Agarwal, and Dan Schonfeld. "Statistical sequential analysis for object-based video forgery detection." In IS and T International Symposium on Electronic Imaging Science and Technology, (2019), vol. 2019, no. 5, p. 543.
[18] El-Shafai, Walid, Mona A. Fouda, El-Sayed M. El-Rabaie, and Nariman Abd El-Salam. "A comprehensive taxonomy on multimedia video forgery detection techniques: challenges and novel trends." Multimedia Tools and Applications (2023), pp. 1-67.
[19] Wang, Yukai, Chunlei Peng, Decheng Liu, Nannan Wang, and Xinbo Gao. "Spatial-Temporal Frequency Forgery Clue for Video Forgery Detection in VIS and NIR Scenario." IEEE Transactions on Circuits and Systems for Video Technology (2023).
[20] Huang, Chee Cheun, Chien Eao Lee, and Vrizlynn LL Thing. "A novel video forgery detection model based on triangular polarity feature classification." International Journal of Digital Crime and Forensics (IJDCF) 12, no. 1 (2020), pp. 14-34.
[21] Selvaraj, Priyadharsini, and Muneeswaran Karuppiah. "Inter‐frame forgery detection and localisation in videos using earth mover's distance metric." IET Image Processing 14, no. 16 (2020), pp. 4168-4177.
[22] Das, Sayantan, Mojtaba Kolahdouzi, Levent Özparlak, Will Hickie, and Ali Etemad. "Unmasking Deepfakes: Masked Autoencoding Spatiotemporal Transformers for Enhanced Video Forgery Detection." arXiv preprint arXiv:2306.06881 (2023).
[23] Zhao, Chenhui, Xiang Li, and Rabih Younes. "Self-supervised Multi-Modal Video Forgery Attack Detection." In 2023 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, (2023), pp. 1-6.
[24] Oraibi, Mohammed R., and Abdulkareem M. Radhi. "Enhancement Digital Forensic Approach for Inter-Frame Video Forgery Detection Using a Deep Learning Technique." Iraqi Journal of Science (2022), pp. 2686-2701.
[25] Alkawaz, Mohammed Hazim, Maran al Tamil Veeran, Asif Iqbal Hajamydeen, and Omar Ismael Al-Sanjary. "An overview of advanced optical flow techniques for copy move video forgery detection." In 2021 IEEE 11th IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), IEEE, (2021), pp. 319-324.
[26] Tang, Linlin, Huifen Lu, Zhen Pang, Zhangyan Li, and Jingyong Su. "A distance weighted linear regression classifier based on optimized distance calculating approach for face recognition." Multimedia Tools and Applications 78 (2019): 32485-32501.
[27] Fadl, Sondos, Qi Han, and Qiong Li. "CNN spatiotemporal features and fusion for surveillance video forgery detection." Signal Processing: Image Communication 90 (2021): 116066.
[28] Chittapur, Govindraj, S. Murali, and Basavaraj S. Anami. "Copy create video forgery detection techniques using frame correlation difference by referring SVM classifier." International Journal of Computer Engineering in Research Trends (IJCERT) (2019).
[29] Kuznetsov, Andrey. "Digital video forgery detection based on statistical features calculation." In Twelfth International Conference on Machine Vision (2020), vol. 11433, pp. 723-728.
[30] Sadddique, Mubbashar, Khurshid Asghar, Tariq Mehmood, Muhammad Hussain, and Zulfiqar Habib. "Robust video content authentication using video binary pattern and extreme learning machine." International Journal of Advanced Computer Science and Applications vol. 10, no. 8 (2019).
[31] Ugale, Meena, and J. Midhunchakkaravarthy, "Image Splicing Forgery Detection Model Using Hybrid Boosting Machine." IAENG International Journal of Computer Science 51.7 (2024).
[32] DSO-1 and DSI-1 Datasets, https://recodbr.wordpress.com/code-n-data/#dso1_dsi1, Accessed on May 2023.
[33] Face Forensics Database is taken from https://paperswithcode.com/dataset/faceforensics-1
[34] Singh, Ravinder, Sudha Subramani, Jiahua Du, Yanchun Zhang, Hua Wang, Yuan Miao, and Khandakar Ahmed. "Antisocial Behavior Identification from Twitter Feeds Using Traditional Machine Learning Algorithms and Deep Learning." EAI Endorsed Transactions on Scalable Information Systems 10, no. 4 (2023).
[35] Yin, Jiao, MingJian Tang, Jinli Cao, Mingshan You, Hua Wang, and Mamoun Alazab. "Knowledge-driven cybersecurity intelligence: Software vulnerability coexploitation behavior discovery." IEEE transactions on industrial informatics 19, no. 4 (2022): 5593-5601.
[36] Raj, Shritik, Bernard Ngangbam, Sanket Mishra, Vivek Gopalasetti, Ayushi Bajpai, and Ch Venkata Rami Reddy. "Knox: Lightweight Machine Learning Approaches for Automated Detection of Botnet Attacks." EAI Endorsed Transactions on Scalable Information Systems 11, no. 1 (2024).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Meena Ugale, J. Midhunchakkaravarthy
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.