摘要
鉴定视频的真实性和完整性是信息安全领域的重要内容之一,针对视频帧间篡改操作,提出一种基于非负张量分解的视频篡改检测方法。首先,对视频帧进行快速特征提取,利用主要压缩特征创建三维张量描述视频;然后,使用Tucker分解方法对张量进行非负分解,提取时间维因子矩阵进行相关性计算;最后,利用切比雪夫不等式自适应地定位篡改位置。实验证明,该方法能快速顽健地检测出视频帧间篡改操作。
The authenticity and integrity of video authentication is one of the important contents in information security field. A video tampering detection method based on non-negative tensor decomposition was proposed for video inter-frame tampering. First of all, spectral feature of video frame was extracted quickly. The video was described by a three-dimensional tensor which created by the main compression feature. The tensor was factorized by Tucker non-negative decomposition method and then the time dimension matrix was extracted to calculate correlation. Finally, the tampering position was determined by using the Chebyshev's inequality. Experiments show that this method can detect the video inter-frame tampering quickly and robustly.
引文
[1]胡永健,刘琲贝,贺前华.数字多媒体取证技术综述[J].计算机应用,2010,30(3):657-662.HU Y J,LIU B B,HE Q H.Review of digital multimedia forensics[J].Journal of Computer Applications,2010,30(3):657-662.
[2]王俊文,刘光杰,张湛,等.基于模式噪声的数字视频篡改取证[J].东南大学学报(自然科学版),2008(S2):13-17.WANG J W,LIU G J,ZHANG Z,et al.Digital video tampering with evidence based on modal noise[J].Journal of Southeast University(Natural Science),2008(S2):13-17.
[3]袁秀娟,黄添强,陈智文,等.基于纹理特征的数字视频篡改检测[J].计算机系统应用,2012,21(6):91-95.YUAN X J,HUANG T Q,CHEN Z W,et al.Digital video tamper detection based on texture feature[J].Computer Systems&Applications,2012,21(6):91-95.
[4]黄添强,陈智文,苏立超,等.利用内容连续性的数字视频篡改检测[J].南京大学学报(自然科学),2011,47(5):493-503.HUANG T Q,ZHEN Z W,SULC,et al.Digital video tamper detection with Content continuity[J].Journal of Nanjing University(Natural Science),2011,47(5):493-503.
[5]YIN L,BAI Z,YANG R.Video forgery detection based on nonnegative tensor factorization[C]//The 4th IEEE International Conference on Information Science and Technology(ICIST).2014:148-151.
[6]KOLDA T G,BADER B W.Tensor decompositions and applications[J].SIAM Review,2009,51(3):455-500.
[7]TUCKER L R.Some mathematical notes on three-mode factor analysis[J].Psychometrika,2006,31(3):279-311.
[8]LATHAUWER L D,MOOR B D,VANDEWALLE J.A multilinear singular value decomposition[J].Siam Journal on Matrix Analysis&Applications,2000,21(4):1253-1278.
[9]BADER B W,KOLDA T G.Algorithm 862:Matlab tensor classes for fast algorithm prototyping[J].ACM Transactions on Mathematical Software,2006,32(4):635-653.
[10]林晶,黄添强,赖玥聪,等.采用量化离散余弦变换系数检测视频单帧连续多次复制-粘贴篡改[J].计算机应用,2016,36(5):1356-1361.LIN J,HUANG T Q,LAI Y C,et al.Detect a siagle frame video’s continuous copy and paste by using Quantitative discrete cosine transform coefficients[J].Compute Application,2016,36(5):1356-1361.
[11]贺忠.基于Lip-切比雪夫方法的数据流异常检测分析[J].计算机系统应用,2009,18(10):61-64.HE Z.The data flow anomaly detection analysis based on LipChebyshev method[J].Computer System Application,2009,18(10):61-64.
[12]QADIR G,YAHAYA S,HO A T S.Surrey university library for forensic analysis(SULFA)of video content[C]//The 2012 IET Conference on Image Processing.2012:1-6.