SlideShare a Scribd company logo
1 of 41
Download to read offline
Video Inpainting detection using inconsistencies in
Optical Flow
Thesis Committee
Dr. A V Subramanyam (Advisor)
Dr. Pradeep Atrey(External Reviewer)
Dr. Sambuddho Chakravarty(Internal Reviewer)
Shobhita Saxena
M.Tech CSE (MT13015)
1
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
2
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
3
Aims at :
 restoring lost parts of videos and
reconstructing them based on the
background information and
spatial - temporal details.
 removal or replacement of
unwanted objects from frames
such that no distortion is observed
when video is played as a
sequence.
What is Video Inpainting?
4
Figure 1 : Removal of unwanted object from
a video frame
Video Inpainting as Video Forgery
 Video Inpainting can be used as a major forgery tool to perform malicious changes in
videos such as object removal .
5Figure 2 : Video Inpainting as forgery type (a) source video frames (b) Inpainted video frames
Research Motivation
 Video Inpainting forgery produces inpainted regions in video frames in a
visually plausible manner.
 Inpainting forgery is highly sophisticated and gets more difficult to detect
in comparison to other forgery types thus posing a challenging research
problem.
 Very few works have been proposed in the area of video inpainting
detection.
 Existing inpainting detection techniques fail to perform detection of latest
state-of-the-art inpainting techniques.
6
Research Aim
 To study and analyse the optical flow pattern in source and inpainted
videos .
 To present a robust technique for effective detection and localization of
inpainted regions in a given video sequence.
 To propose a single algorithm which detects multiple inpainting techniques.
7
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
8
Related Work
Hsu et al. [1] Proposed approach to locate forged regions in an inpainted video
using correlation of noise residue.
Zhang et al. [2] Performs inpainting forgery detection based on ghost shadow
artifacts.
Das et al.[3] Proposed a blind detection method based on zero-connectivity feature
and fuzzy membership function to detect video inpainting forgery.
Lin et al. [4] Proposed spatio-temporal coherance based approach for video
inpainting detection and localization.
9
Research Contribution
 Propose an approach which investigates video inpainting forgery which has not
been studied much in previous works
 Propose a novel approach to detect and temporally localize inpainted regions in a
given video sequence.
 Propose algorithm performs well in detection and localization of popular and
effective state-of-the-art inpainting techniques on which other inpainting detection
algorithms fail to perform .
10
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
11
Problem definition
 Given an input video sequence VN having N frames, determine if its an authentic
or an inpainted video .
 For a video that gets classified as inpainted, perform temporal localization of the
inpainted regions.
12
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
13
Targeted Inpainting Techniques
14
 This algorithm performs on two variants of Temporal Copy Paste (TCP) inpainting.
They are as follows :
 Conventional TCP – one of the first and most popular inpainting techniques
proposed by Patwardhan et al [5] in 2007. Handles relatively simple motion
types in videos for inpainting.
 Complex TCP – one of the state-of-the-art inpainting techniques proposed by
Alasdair et al [6] in 2014. Handles relatively complex motions in videos to
performing inpainting.
Algorithm Design
15
Optical Flow
16
 Optical Flow (Of) characterizes
the motion of every pixel in one
image to its corresponding
location in next image[7].
 Performs motion estimation in
between video frames .
 It is best applied to video frames
as these are sequence of time
ordered images.
Figure 3 : (a,b) mouth regions of two consecutive
images of a person speaking . (c) Flow field
estimated using optical flow.
17* Picture from Khurram Hassan-Shafique CAP5415 Computer Vision 2003
Figure 4 : Two frames of a video sequence
18
Figure 6 : Colour scheme used to
represent the orientation and
magnitude of optical flow
Figure 5 : Optical Flow computation in between two
images
Optical Flow Computation - Procedure
19
V video under consideration having N
frames
m number of optical flow matrices
computed for each frame
N-m number of frames chosen for optical
flow computation
Of Optical flow matrix computed in
between frames as Of(n,n+1), Of(n,n+2),
Of(n,n+3)…. Of(n,n+m) , where n is a
particular frame
(N-m)*m Number of optical flow matrices
generated for each frame in a video
sequence
Optical Flow – Results
20
a) Source video frames
b) Optical Flow of source framesFigure 7:
21
a) Inpainted video frames
b) Optical Flow of inpainted video framesFigure 8:
Chi-Square Distance computation - Procedure
22
H Histogram vector
computed for each
optical flow matrix..
chisq Chi – square distance
computed for
comparing histograms
(N-m)*(m-1) Number of chi –
square values
produced
Guassian Mixture curve fitting
 Applied to normalized chi – square values
 Measures goodness-of-fit for authentic and inpainted videos by giving
Root Mean Square Error(RMSE) values
23
GM Distribution Fit to chi-square values
24
Figure 9 : Source and Inpainted GM distributions
Markov Chain – feature extraction
 Each video VN divided into VN / k frames set
 Optical Flow Of of each frame set is modelled as firsst order spatial
Markov Chain
 Values in Of are rounded of to nearest integer values to get integer
value states and then truncated in between –Tr to +Tr before
extracting the transition probabilities .
25
 Number of states to model a markov chain = (2Tr+1)
 For each matrix, number of Transition Probabilities = (2Tr+1) * (2Tr+1)
 TPM is constructed as :
where, u,v ϵ [-Tr , Tr] , and u,v ϵ Z.
Similarly, probabilities can be estimated for other directions.
 Perform SVM classification on above obtained TPMs.
26
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
27
Dataset
 Experiments have been conducted on test videos of two inpainting
techniques - complex TCP and convenional TCP .
28
Table 1 : Conventional TCP inpainting dataset
29
Table 2 : Complex TCP Inpainting Dataset
 RMS value threshold τ is empericaly set to 3.5.
30
Figure 10 : RMS value based classification for complex TCP inpainting
31
Figure 11 : RMS value based classification for conventional TCP inpainting
Performance Evaluation
 Performance has been measured by Precision, Recall and Accuracy .
 Precision(P) = TP/(TP+FP)
 Recall (R) = TP/(TP+FN)
 Accuracy(A) = (TP+TN)/(TP+TN+FP+FN)
32
TP True Positive
TN True Negative
FN False Negative
FP False Positive
Results - Video Inpainting Detection
33
Table 3:Classification Results for Complex TCP Table 4 : Classification Results for Conventional TCP
Table 5 : Video Inpainting Detection Results
Results - Video Inpainting Localization
34
Table 6 :Classification Results for Complex TCP Table 7 : Classification Results for Conventional TCP
Table 8 : Video Inpainting Localization Results
Comparison
 Proposed approach is compared with spatio-temporal coherence
based technique proposed by Lin et al [4]for inpainting detection and
localization .
 Spatio- Temporal coherence based approach fails to perform on
complex TCP inpainting dataset.
35
36
Figure 12: Spatio_Temporal Approach Result on conventional TCP dataset
37
Figure 13 : Spatio_Temporal Approach Result on complex TCP dataset
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
38
Limitations
 Considers only static camera videos with no camera motion.
 Multiple objects removal case not considered in complex inpainting dataset .
 Spatial Localization is not performed of inpainted regions is not performed.
 Dataset is small .
39
References
40
1) Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin, and Chiou-Ting Hsu. Video forgery detection
using correlation of noise residue. In Multimedia Signal Processing, 2008 IEEE 10th
Workshop on, pages 170– 174. IEEE, 2008.
2) Jing Zhang, Yuting Su, and Mingyu Zhang. Exposing digital video forgery by ghost
shadow artifact. In Proceedings of the First ACM workshop on Multimedia in
forensics, pages 49–54. ACM, 2009
3) Sreelekshmi Das Gopu Darsan and Shreyas L Divya Devan. Blind detection method
for video inpainting forgery
4) Cheng-Shian Lin and Jyh-Jong Tsay. A passive approach for effective detection and
localization of region-level video forgery with spatio-temporal coherence analysis.
Digital Investigation, 11(2):120– 140, 2014
References
41
5) Kedar Patwardhan, Guillermo Sapiro, Marcelo Bertalimo, et al. Video inpainting
under constrained camera motion. Image Processing, IEEE Transactions on, 16(2):545–
553, 2007.
6) Alasdair Newson, Andres Almansa, Matthieu Fradet, Yann ´ Gousseau, and Patrick
Perez ´ . Video inpainting of complex scenes. 2015
7) Thomas Brox, Andres Bruhn, Nils Papenberg, and Joachim We- ´ ickert. High
accuracy optical flow estimation based on a theory for warping. In Computer Vision-
ECCV 2004, pages 25–36. Springer, 2004

More Related Content

What's hot

Region filling and object removal by exemplar based image inpainting
Region filling and object removal by exemplar based image inpaintingRegion filling and object removal by exemplar based image inpainting
Region filling and object removal by exemplar based image inpaintingWoonghee Lee
 
Image Inpainting Using Deep Learning
Image Inpainting Using Deep Learning Image Inpainting Using Deep Learning
Image Inpainting Using Deep Learning MohammadPooya Malek
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014SondosFadl
 
Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentationHaitham Ahmed
 
Dissertation synopsis for imagedenoising(noise reduction )using non local me...
Dissertation synopsis for  imagedenoising(noise reduction )using non local me...Dissertation synopsis for  imagedenoising(noise reduction )using non local me...
Dissertation synopsis for imagedenoising(noise reduction )using non local me...Arti Singh
 
Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...arorasurbhi
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewsipij
 
various methods for image segmentation
various methods for image segmentationvarious methods for image segmentation
various methods for image segmentationRaveesh Methi
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologiesijsrd.com
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 
A study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithmsA study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithmsManje Gowda
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Image enhancement lecture
Image enhancement lectureImage enhancement lecture
Image enhancement lectureISRAR HUSSAIN
 
Image parts and segmentation
Image parts and segmentation Image parts and segmentation
Image parts and segmentation Rappy Saha
 

What's hot (20)

Region filling and object removal by exemplar based image inpainting
Region filling and object removal by exemplar based image inpaintingRegion filling and object removal by exemplar based image inpainting
Region filling and object removal by exemplar based image inpainting
 
Image Inpainting Using Deep Learning
Image Inpainting Using Deep Learning Image Inpainting Using Deep Learning
Image Inpainting Using Deep Learning
 
Image segmentation
Image segmentation Image segmentation
Image segmentation
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
 
Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentation
 
IMAGE SEGMENTATION.
IMAGE SEGMENTATION.IMAGE SEGMENTATION.
IMAGE SEGMENTATION.
 
Dissertation synopsis for imagedenoising(noise reduction )using non local me...
Dissertation synopsis for  imagedenoising(noise reduction )using non local me...Dissertation synopsis for  imagedenoising(noise reduction )using non local me...
Dissertation synopsis for imagedenoising(noise reduction )using non local me...
 
Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of view
 
various methods for image segmentation
various methods for image segmentationvarious methods for image segmentation
various methods for image segmentation
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
A study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithmsA study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithms
 
Ijnsa050207
Ijnsa050207Ijnsa050207
Ijnsa050207
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
DIP - Image Restoration
DIP - Image RestorationDIP - Image Restoration
DIP - Image Restoration
 
Image enhancement lecture
Image enhancement lectureImage enhancement lecture
Image enhancement lecture
 
Image parts and segmentation
Image parts and segmentation Image parts and segmentation
Image parts and segmentation
 

Viewers also liked

Introduction to Optial Flow
Introduction to Optial FlowIntroduction to Optial Flow
Introduction to Optial FlowSylvain_Lobry
 
Lecture30
Lecture30Lecture30
Lecture30zukun
 
Ensemble of Exemplar-SVM for Object Detection and Beyond
Ensemble of Exemplar-SVM for Object Detection and BeyondEnsemble of Exemplar-SVM for Object Detection and Beyond
Ensemble of Exemplar-SVM for Object Detection and Beyondzukun
 
People or human tracking system
People or human tracking systemPeople or human tracking system
People or human tracking systemVenkatesan S
 
Multi-Camera Multi-Human Tracking System (oral presentation)
Multi-Camera Multi-Human Tracking System (oral presentation)Multi-Camera Multi-Human Tracking System (oral presentation)
Multi-Camera Multi-Human Tracking System (oral presentation)Yu-Sheng (Yosen) Chen
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelEditor IJMTER
 
Seminar On Kalman Filter And Its Applications
Seminar On  Kalman  Filter And Its ApplicationsSeminar On  Kalman  Filter And Its Applications
Seminar On Kalman Filter And Its ApplicationsBarnali Dey
 
Human Action Recognition Using 3D Joint Information and HOOFD Features
Human Action Recognition Using 3D Joint Information and HOOFD FeaturesHuman Action Recognition Using 3D Joint Information and HOOFD Features
Human Action Recognition Using 3D Joint Information and HOOFD FeaturesBarış Üstündağ
 
EEG based Motor Imagery Classification using SVM and MLP
EEG based Motor Imagery Classification using SVM and MLPEEG based Motor Imagery Classification using SVM and MLP
EEG based Motor Imagery Classification using SVM and MLPDr. Rajdeep Chatterjee
 
Kalman filter for object tracking
Kalman filter for object trackingKalman filter for object tracking
Kalman filter for object trackingMohit Yadav
 
Kalman filter - Applications in Image processing
Kalman filter - Applications in Image processingKalman filter - Applications in Image processing
Kalman filter - Applications in Image processingRavi Teja
 
Image segmentation
Image segmentationImage segmentation
Image segmentationRania H
 

Viewers also liked (20)

Optical Flow на GPU
Optical Flow на GPUOptical Flow на GPU
Optical Flow на GPU
 
Introduction to Optial Flow
Introduction to Optial FlowIntroduction to Optial Flow
Introduction to Optial Flow
 
Svm
SvmSvm
Svm
 
Lecture30
Lecture30Lecture30
Lecture30
 
Ensemble of Exemplar-SVM for Object Detection and Beyond
Ensemble of Exemplar-SVM for Object Detection and BeyondEnsemble of Exemplar-SVM for Object Detection and Beyond
Ensemble of Exemplar-SVM for Object Detection and Beyond
 
People or human tracking system
People or human tracking systemPeople or human tracking system
People or human tracking system
 
Multi-Camera Multi-Human Tracking System (oral presentation)
Multi-Camera Multi-Human Tracking System (oral presentation)Multi-Camera Multi-Human Tracking System (oral presentation)
Multi-Camera Multi-Human Tracking System (oral presentation)
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection Model
 
Seminar On Kalman Filter And Its Applications
Seminar On  Kalman  Filter And Its ApplicationsSeminar On  Kalman  Filter And Its Applications
Seminar On Kalman Filter And Its Applications
 
Kalman filters
Kalman filtersKalman filters
Kalman filters
 
Text categorization
Text categorizationText categorization
Text categorization
 
Human Action Recognition Using 3D Joint Information and HOOFD Features
Human Action Recognition Using 3D Joint Information and HOOFD FeaturesHuman Action Recognition Using 3D Joint Information and HOOFD Features
Human Action Recognition Using 3D Joint Information and HOOFD Features
 
EEG based Motor Imagery Classification using SVM and MLP
EEG based Motor Imagery Classification using SVM and MLPEEG based Motor Imagery Classification using SVM and MLP
EEG based Motor Imagery Classification using SVM and MLP
 
Kalman filter
Kalman filterKalman filter
Kalman filter
 
Kalman filter for object tracking
Kalman filter for object trackingKalman filter for object tracking
Kalman filter for object tracking
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Kalman filter - Applications in Image processing
Kalman filter - Applications in Image processingKalman filter - Applications in Image processing
Kalman filter - Applications in Image processing
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
Background subtraction
Background subtractionBackground subtraction
Background subtraction
 

Similar to Video Inpainting detection using inconsistencies in optical Flow

An unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentationAn unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentationcsandit
 
An unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentationAn unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentationcsandit
 
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...theijes
 
Moving object detection in video surveillance
Moving object detection in video surveillanceMoving object detection in video surveillance
Moving object detection in video surveillanceAshfaqul Haque John
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONsipij
 
Different Approach of VIDEO Compression Technique: A Study
Different Approach of VIDEO Compression Technique: A StudyDifferent Approach of VIDEO Compression Technique: A Study
Different Approach of VIDEO Compression Technique: A StudyEditor IJCATR
 
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURES
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURESA FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURES
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATUREScscpconf
 
A fast search algorithm for large
A fast search algorithm for largeA fast search algorithm for large
A fast search algorithm for largecsandit
 
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURES
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURESA FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURES
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATUREScscpconf
 
Shot Boundary Detection In Videos Sequences Using Motion Activities
Shot Boundary Detection In Videos Sequences Using Motion ActivitiesShot Boundary Detection In Videos Sequences Using Motion Activities
Shot Boundary Detection In Videos Sequences Using Motion ActivitiesCSCJournals
 
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...IRJET Journal
 
A novel sketch based face recognition in unconstrained video for criminal inv...
A novel sketch based face recognition in unconstrained video for criminal inv...A novel sketch based face recognition in unconstrained video for criminal inv...
A novel sketch based face recognition in unconstrained video for criminal inv...IJECEIAES
 
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVC
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVCSVM Based Saliency Map Technique for Reducing Time Complexity in HEVC
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVCIRJET Journal
 
Dynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and RetrievalDynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and RetrievalCSCJournals
 
Recognition and tracking moving objects using moving camera in complex scenes
Recognition and tracking moving objects using moving camera in complex scenesRecognition and tracking moving objects using moving camera in complex scenes
Recognition and tracking moving objects using moving camera in complex scenesIJCSEA Journal
 
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...IRJET Journal
 
TAAI 2016 Keynote Talk: It is all about AI
TAAI 2016 Keynote Talk: It is all about AITAAI 2016 Keynote Talk: It is all about AI
TAAI 2016 Keynote Talk: It is all about AIYi-Shin Chen
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
 

Similar to Video Inpainting detection using inconsistencies in optical Flow (20)

An unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentationAn unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentation
 
An unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentationAn unsupervised method for real time video shot segmentation
An unsupervised method for real time video shot segmentation
 
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
 
Moving object detection in video surveillance
Moving object detection in video surveillanceMoving object detection in video surveillance
Moving object detection in video surveillance
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
Different Approach of VIDEO Compression Technique: A Study
Different Approach of VIDEO Compression Technique: A StudyDifferent Approach of VIDEO Compression Technique: A Study
Different Approach of VIDEO Compression Technique: A Study
 
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURES
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURESA FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURES
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURES
 
A fast search algorithm for large
A fast search algorithm for largeA fast search algorithm for large
A fast search algorithm for large
 
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURES
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURESA FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURES
A FAST SEARCH ALGORITHM FOR LARGE VIDEO DATABASE USING HOG BASED FEATURES
 
538 207-219
538 207-219538 207-219
538 207-219
 
Shot Boundary Detection In Videos Sequences Using Motion Activities
Shot Boundary Detection In Videos Sequences Using Motion ActivitiesShot Boundary Detection In Videos Sequences Using Motion Activities
Shot Boundary Detection In Videos Sequences Using Motion Activities
 
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
 
A novel sketch based face recognition in unconstrained video for criminal inv...
A novel sketch based face recognition in unconstrained video for criminal inv...A novel sketch based face recognition in unconstrained video for criminal inv...
A novel sketch based face recognition in unconstrained video for criminal inv...
 
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVC
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVCSVM Based Saliency Map Technique for Reducing Time Complexity in HEVC
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVC
 
Dynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and RetrievalDynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and Retrieval
 
A0540106
A0540106A0540106
A0540106
 
Recognition and tracking moving objects using moving camera in complex scenes
Recognition and tracking moving objects using moving camera in complex scenesRecognition and tracking moving objects using moving camera in complex scenes
Recognition and tracking moving objects using moving camera in complex scenes
 
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...
 
TAAI 2016 Keynote Talk: It is all about AI
TAAI 2016 Keynote Talk: It is all about AITAAI 2016 Keynote Talk: It is all about AI
TAAI 2016 Keynote Talk: It is all about AI
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 

More from Cybersecurity Education and Research Centre

Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Cybersecurity Education and Research Centre
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Cybersecurity Education and Research Centre
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Cybersecurity Education and Research Centre
 

More from Cybersecurity Education and Research Centre (17)

Automated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social NetworksAutomated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social Networks
 
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
 
TASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet InfrastructureTASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet Infrastructure
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Identification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A SurveyIdentification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A Survey
 
Clotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and IncorrectClotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and Incorrect
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling�Clotho: Saving Programs from Malformed Strings and Incorrect String-handling�
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
 
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing PageEmerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on TwitterBroker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasuresExploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasures
 
The future of interaction & its security challenges
The future of interaction & its security challengesThe future of interaction & its security challenges
The future of interaction & its security challenges
 

Recently uploaded

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

Video Inpainting detection using inconsistencies in optical Flow

  • 1. Video Inpainting detection using inconsistencies in Optical Flow Thesis Committee Dr. A V Subramanyam (Advisor) Dr. Pradeep Atrey(External Reviewer) Dr. Sambuddho Chakravarty(Internal Reviewer) Shobhita Saxena M.Tech CSE (MT13015) 1
  • 2. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 2
  • 3. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 3
  • 4. Aims at :  restoring lost parts of videos and reconstructing them based on the background information and spatial - temporal details.  removal or replacement of unwanted objects from frames such that no distortion is observed when video is played as a sequence. What is Video Inpainting? 4 Figure 1 : Removal of unwanted object from a video frame
  • 5. Video Inpainting as Video Forgery  Video Inpainting can be used as a major forgery tool to perform malicious changes in videos such as object removal . 5Figure 2 : Video Inpainting as forgery type (a) source video frames (b) Inpainted video frames
  • 6. Research Motivation  Video Inpainting forgery produces inpainted regions in video frames in a visually plausible manner.  Inpainting forgery is highly sophisticated and gets more difficult to detect in comparison to other forgery types thus posing a challenging research problem.  Very few works have been proposed in the area of video inpainting detection.  Existing inpainting detection techniques fail to perform detection of latest state-of-the-art inpainting techniques. 6
  • 7. Research Aim  To study and analyse the optical flow pattern in source and inpainted videos .  To present a robust technique for effective detection and localization of inpainted regions in a given video sequence.  To propose a single algorithm which detects multiple inpainting techniques. 7
  • 8. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 8
  • 9. Related Work Hsu et al. [1] Proposed approach to locate forged regions in an inpainted video using correlation of noise residue. Zhang et al. [2] Performs inpainting forgery detection based on ghost shadow artifacts. Das et al.[3] Proposed a blind detection method based on zero-connectivity feature and fuzzy membership function to detect video inpainting forgery. Lin et al. [4] Proposed spatio-temporal coherance based approach for video inpainting detection and localization. 9
  • 10. Research Contribution  Propose an approach which investigates video inpainting forgery which has not been studied much in previous works  Propose a novel approach to detect and temporally localize inpainted regions in a given video sequence.  Propose algorithm performs well in detection and localization of popular and effective state-of-the-art inpainting techniques on which other inpainting detection algorithms fail to perform . 10
  • 11. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 11
  • 12. Problem definition  Given an input video sequence VN having N frames, determine if its an authentic or an inpainted video .  For a video that gets classified as inpainted, perform temporal localization of the inpainted regions. 12
  • 13. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 13
  • 14. Targeted Inpainting Techniques 14  This algorithm performs on two variants of Temporal Copy Paste (TCP) inpainting. They are as follows :  Conventional TCP – one of the first and most popular inpainting techniques proposed by Patwardhan et al [5] in 2007. Handles relatively simple motion types in videos for inpainting.  Complex TCP – one of the state-of-the-art inpainting techniques proposed by Alasdair et al [6] in 2014. Handles relatively complex motions in videos to performing inpainting.
  • 16. Optical Flow 16  Optical Flow (Of) characterizes the motion of every pixel in one image to its corresponding location in next image[7].  Performs motion estimation in between video frames .  It is best applied to video frames as these are sequence of time ordered images. Figure 3 : (a,b) mouth regions of two consecutive images of a person speaking . (c) Flow field estimated using optical flow.
  • 17. 17* Picture from Khurram Hassan-Shafique CAP5415 Computer Vision 2003 Figure 4 : Two frames of a video sequence
  • 18. 18 Figure 6 : Colour scheme used to represent the orientation and magnitude of optical flow Figure 5 : Optical Flow computation in between two images
  • 19. Optical Flow Computation - Procedure 19 V video under consideration having N frames m number of optical flow matrices computed for each frame N-m number of frames chosen for optical flow computation Of Optical flow matrix computed in between frames as Of(n,n+1), Of(n,n+2), Of(n,n+3)…. Of(n,n+m) , where n is a particular frame (N-m)*m Number of optical flow matrices generated for each frame in a video sequence
  • 20. Optical Flow – Results 20 a) Source video frames b) Optical Flow of source framesFigure 7:
  • 21. 21 a) Inpainted video frames b) Optical Flow of inpainted video framesFigure 8:
  • 22. Chi-Square Distance computation - Procedure 22 H Histogram vector computed for each optical flow matrix.. chisq Chi – square distance computed for comparing histograms (N-m)*(m-1) Number of chi – square values produced
  • 23. Guassian Mixture curve fitting  Applied to normalized chi – square values  Measures goodness-of-fit for authentic and inpainted videos by giving Root Mean Square Error(RMSE) values 23
  • 24. GM Distribution Fit to chi-square values 24 Figure 9 : Source and Inpainted GM distributions
  • 25. Markov Chain – feature extraction  Each video VN divided into VN / k frames set  Optical Flow Of of each frame set is modelled as firsst order spatial Markov Chain  Values in Of are rounded of to nearest integer values to get integer value states and then truncated in between –Tr to +Tr before extracting the transition probabilities . 25
  • 26.  Number of states to model a markov chain = (2Tr+1)  For each matrix, number of Transition Probabilities = (2Tr+1) * (2Tr+1)  TPM is constructed as : where, u,v ϵ [-Tr , Tr] , and u,v ϵ Z. Similarly, probabilities can be estimated for other directions.  Perform SVM classification on above obtained TPMs. 26
  • 27. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 27
  • 28. Dataset  Experiments have been conducted on test videos of two inpainting techniques - complex TCP and convenional TCP . 28 Table 1 : Conventional TCP inpainting dataset
  • 29. 29 Table 2 : Complex TCP Inpainting Dataset
  • 30.  RMS value threshold τ is empericaly set to 3.5. 30 Figure 10 : RMS value based classification for complex TCP inpainting
  • 31. 31 Figure 11 : RMS value based classification for conventional TCP inpainting
  • 32. Performance Evaluation  Performance has been measured by Precision, Recall and Accuracy .  Precision(P) = TP/(TP+FP)  Recall (R) = TP/(TP+FN)  Accuracy(A) = (TP+TN)/(TP+TN+FP+FN) 32 TP True Positive TN True Negative FN False Negative FP False Positive
  • 33. Results - Video Inpainting Detection 33 Table 3:Classification Results for Complex TCP Table 4 : Classification Results for Conventional TCP Table 5 : Video Inpainting Detection Results
  • 34. Results - Video Inpainting Localization 34 Table 6 :Classification Results for Complex TCP Table 7 : Classification Results for Conventional TCP Table 8 : Video Inpainting Localization Results
  • 35. Comparison  Proposed approach is compared with spatio-temporal coherence based technique proposed by Lin et al [4]for inpainting detection and localization .  Spatio- Temporal coherence based approach fails to perform on complex TCP inpainting dataset. 35
  • 36. 36 Figure 12: Spatio_Temporal Approach Result on conventional TCP dataset
  • 37. 37 Figure 13 : Spatio_Temporal Approach Result on complex TCP dataset
  • 38. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 38
  • 39. Limitations  Considers only static camera videos with no camera motion.  Multiple objects removal case not considered in complex inpainting dataset .  Spatial Localization is not performed of inpainted regions is not performed.  Dataset is small . 39
  • 40. References 40 1) Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin, and Chiou-Ting Hsu. Video forgery detection using correlation of noise residue. In Multimedia Signal Processing, 2008 IEEE 10th Workshop on, pages 170– 174. IEEE, 2008. 2) Jing Zhang, Yuting Su, and Mingyu Zhang. Exposing digital video forgery by ghost shadow artifact. In Proceedings of the First ACM workshop on Multimedia in forensics, pages 49–54. ACM, 2009 3) Sreelekshmi Das Gopu Darsan and Shreyas L Divya Devan. Blind detection method for video inpainting forgery 4) Cheng-Shian Lin and Jyh-Jong Tsay. A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digital Investigation, 11(2):120– 140, 2014
  • 41. References 41 5) Kedar Patwardhan, Guillermo Sapiro, Marcelo Bertalimo, et al. Video inpainting under constrained camera motion. Image Processing, IEEE Transactions on, 16(2):545– 553, 2007. 6) Alasdair Newson, Andres Almansa, Matthieu Fradet, Yann ´ Gousseau, and Patrick Perez ´ . Video inpainting of complex scenes. 2015 7) Thomas Brox, Andres Bruhn, Nils Papenberg, and Joachim We- ´ ickert. High accuracy optical flow estimation based on a theory for warping. In Computer Vision- ECCV 2004, pages 25–36. Springer, 2004