Video tampering detection method based on compressed sensing semi fragile watermark

A compressed sensing and tamper detection technology, applied in the field of communications, which can solve the problems of inability to accurately locate added or deleted frames, low positioning accuracy, and inability to handle inter-frame tampering.

Inactive Publication Date: 2012-04-11
RES INST OF SUN YAT SEN UNIV & SHENZHEN
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, a reversible semi-fragile watermarking algorithm for distinguishing between MPEG-2 compression and malicious tampering is proposed. It embeds the watermark into the coefficients after the video frame is divided into 8×8 blocks and transformed by DCT. Preliminary positioning of internal tampering, but the positioning accuracy is not high and cannot handle inter-frame tampering
At present, a semi-fragile reversible video watermarking algorithm using hash function for MPEG-4 content authentication is also proposed. It embeds two watermarks in the I frame of MPEG-4 encoding of YUV video. This algorithm can verify the video content. And achieve tampering positioning, but for inter-frame tampering, the algorithm cannot accurately locate the added or deleted frames

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video tampering detection method based on compressed sensing semi fragile watermark
  • Video tampering detection method based on compressed sensing semi fragile watermark
  • Video tampering detection method based on compressed sensing semi fragile watermark

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] The present invention proposes a method for video tampering detection based on compressed sensing semi-fragile watermarks, said method comprising: extracting MPEG-2 compressed video, based on the encoding method of I-frame images and the characteristics of DCT coefficients, through compressed sensing technology Extract the image features of the I frame, generate and embed two watermarks, the content authentication watermark and the integrity watermark; perfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a video tampering detection method based on a compressed sensing semi fragile watermark, which comprises the steps of: extracting an MPEG-2 (Moving Picture Experts Group) compressed video, extracting image characteristics of a frame I through a compressed sensing technology on the basis of a coding mode of a frame I image and a characteristics of a DCT (Discrete Cosine Transformation) coefficient, generating and embedding two watermarks of a content authorization watermark and an integrity watermark; carrying out initial check on video integrity, inter-frame taper detection on the video and intra-content authorization on the video, and finally outputting a detection result and carrying out MPEG-2 decompression on the video. By implementing the invention, the image characteristics of the frame I are extracted by using the compressed sensing technology on the basis of the coding mode of the frame I image and the characteristic of the DCT coefficient, a semi-fragile content authorization watermark is generated, and then embedded in medium-high frequency coefficients of each macro block of the frame I image; and based on a motion vector characteristic of a frame P, Hash operation is carried out a sequence number of the frame P, the obtained key value is used as the integrity watermark to be embedded in a motion vector of the frame P, thus intra-frame taper detection is realized in the frame I, and inter-frame taper detection is realized in the frame P.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a video tampering detection method based on compressed sensing semi-fragile watermarks. Background technique [0002] With the emergence of powerful multimedia editing software, the modification of multimedia information such as audio and video has become simple and easy. Once falsified and falsified multimedia information is widely used in official media, scientific discoveries, insurance and court evidence, it will bring serious consequences. Tamper detection is mainly to solve the problem of integrity and originality identification of digital multimedia data. The tampering detection methods for digital images are relatively mature, but the tampering detection methods for digital videos are relatively few. [0003] Aiming at the characteristics of malicious tampering of video and utilizing the continuity of content between frames, this paper proposes to detect whether ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/26H04N7/50H04N21/8358H04N19/467
Inventor 刘海亮罗笑南杨艾琳陈湘萍苏航
Owner RES INST OF SUN YAT SEN UNIV & SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products