SlideShare a Scribd company logo
Abstract:
With the incresed adoption of social media platforms there has been a rapid growth in the transfer of
data between the people, be it in the form of videos, images, text and audio. Based on the
information being received conclusions are made accordingly and hence we need to ensure that
correct data is received before taking a decision and therfore video verification is important and is
attracting a lot of attention. But there is not much effor being put forward in this regard and hence
motivated to deep dive in to this area of study. In this work we present an approach for automatic
video manipulation detection.Video filters are used for verification and here we have used two such
forensic filters one based on Discrete Cosine Transform(DCT) coefficients and second based on
video requantization errors and combining them with CNN. We compare the performance of the
proposed approach. Finally we discussed about the proposed work lmitations and proposed paths
for future work in this area.
Introduction:
The amount of video content produced by non-professionals has increased rapidly and several
agencies depends on User Generated Content(UGC) for news reporting. But the videos shared may
not be authentic and generally people may manipulate them for various reasons be it for comedy
purpose, be it intentionally etc. This information which is tampered may hurt the sentiments of
people. This makes the demand to create new tools which will detect the quality of video.
Multimedia forensics aims to address this by providing various algorithms and tools that points the
traces of tampering. Filters are being used in order to spot inconsistencies and in our work e have
used two filters and these outputs are used to train a number of deep learning visual classifiers, in
order to learn to discriminate between original and tampered videos.
Methodology:
The proposed approach is a two stepprocess:
1. Forensic based feature extraction
2. Classification
The feature extraction is basically based on two novel filters and the classification step is based on
CNN.
Forensic based filters:
Here we have used Q4 and cobalt filters in which Q4 is used to analyze the decomposition of the
image through DCT and it is applied on each individual video frames. Each frame is split in to N *
N blocks and 2-D DCT is applied. Coefficients are identified based in their frequency. The first
coefficient (0, 0) represents low frequency information, while higher coefficients represent higher
frequencies. The typical block size for DCT is 8 × 8. However, analysis in 8 × 8 blocks yields too
small coefficient arrays. Instead, 2 × 2 blocks are used so that the resulting output frame is only half
the original size. A selection of coefficients (0, 1), (1, 0) and (1, 1) generates the final output video
map of the Q4 filter. The second filter we use is the Cobalt filter. This compares the original video
with a modified version of it, re-quantized using MPEG-4 at a different quality level. Here we
requantize the video and calculate the per-pixel values, creating an Error Video, i.e. a video
depicting the differences. n designing Cobalt, a “compare-to-worst” strategy has been investigated,
i.e. if a constant quality encoding is done, the comparison will be performed with the worst possible
quality, and conversely, if a constant bit rate encoding is done, the comparison is performed with the
worst possible bit rate.
Classification:
The filters used generates outputs in the form of RGB images. With the idea that the filter maps
were originally intended to be visually evaluated by a human expert, decided to treat this as a
classification problem. This
allows us to combine the maps with Convolutional Neural Networks pre-trained for image
classification. Specifically, we take an instance of GoogLeNet and an instance of ResNet , both pre-
trained on the ImageNet classification task, and adapt them to the needs of our task. As the resulting
networks are designed for image classification, we feed the filter outputs to each network one frame
at a time, during both training and classification.
Experimental Study:
The data sets used are named as Dev1 and Dev2 provided by NIST. The first one consisted of 30
video pairs(tampered and untampered) and the second one of 86 video pairs containing
approximately 44K and 134K frames. These two datasets, Dev1 and Dev2, are treated as
independent sets, but since they originate from the same source, they likely exhibit similar features.
The second source of videos was the InVID Fake Video Corpus developed over the course of the
InVID project. The Fake Video Corpus (FVC) contains 110 real and 117 fake newsworthy videos
from social media sources, which include not only videos that have been tampered but also videos
that are contextually false (e.g. whose description on YouTube contains misinformation about what
is shown). Out of that dataset, we selected 35 real videos that comprise single-shot, unedited videos,
and 33 fake videos that include tampered UGC. For this experiments, we treated all frames
originating from untampered videos as untampered, and all frames originating from tampered
videos as tampered.

More Related Content

Similar to gist.doc

Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
Tharindu Rusira
 
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
ijma
 
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
ijma
 
Comparison of Cinepak, Intel, Microsoft Video and Indeo Codec for Video Compr...
Comparison of Cinepak, Intel, Microsoft Video and Indeo Codec for Video Compr...Comparison of Cinepak, Intel, Microsoft Video and Indeo Codec for Video Compr...
Comparison of Cinepak, Intel, Microsoft Video and Indeo Codec for Video Compr...
ijma
 
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
ijma
 
76201950
7620195076201950
76201950
IJRAT
 
MPEG Compression Standards
MPEG Compression StandardsMPEG Compression Standards
MPEG Compression Standards
Ajay
 
Target Detection and Classification Performance Enhancement using Super-Resol...
Target Detection and Classification Performance Enhancement using Super-Resol...Target Detection and Classification Performance Enhancement using Super-Resol...
Target Detection and Classification Performance Enhancement using Super-Resol...
sipij
 
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
sipij
 
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
sipij
 
Full reference video quality assessment
Full reference video quality assessmentFull reference video quality assessment
Full reference video quality assessment
Hoàng Sơn
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
swathiravishankar3
 
Design and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding SystemDesign and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding System
ijtsrd
 
A fully integrated violence detection system using CNN and LSTM
A fully integrated violence detection system using CNN and LSTM A fully integrated violence detection system using CNN and LSTM
A fully integrated violence detection system using CNN and LSTM
IJECEIAES
 
PERCEPTUALLY LOSSLESS COMPRESSION WITH ERROR CONCEALMENT FOR PERISCOPE AND SO...
PERCEPTUALLY LOSSLESS COMPRESSION WITH ERROR CONCEALMENT FOR PERISCOPE AND SO...PERCEPTUALLY LOSSLESS COMPRESSION WITH ERROR CONCEALMENT FOR PERISCOPE AND SO...
PERCEPTUALLY LOSSLESS COMPRESSION WITH ERROR CONCEALMENT FOR PERISCOPE AND SO...
sipij
 
E0704019023
E0704019023E0704019023
E0704019023
IJERD Editor
 
Perceptually Lossless Compression with Error Concealment for Periscope and So...
Perceptually Lossless Compression with Error Concealment for Periscope and So...Perceptually Lossless Compression with Error Concealment for Periscope and So...
Perceptually Lossless Compression with Error Concealment for Periscope and So...
sipij
 
report
reportreport
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
survey on Scene Detection Techniques on video
survey on Scene Detection Techniques on videosurvey on Scene Detection Techniques on video
survey on Scene Detection Techniques on video
Chandra Shekhar Mithlesh
 

Similar to gist.doc (20)

Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
 
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
 
Comparison of Cinepak, Intel, Microsoft Video and Indeo Codec for Video Compr...
Comparison of Cinepak, Intel, Microsoft Video and Indeo Codec for Video Compr...Comparison of Cinepak, Intel, Microsoft Video and Indeo Codec for Video Compr...
Comparison of Cinepak, Intel, Microsoft Video and Indeo Codec for Video Compr...
 
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...
 
76201950
7620195076201950
76201950
 
MPEG Compression Standards
MPEG Compression StandardsMPEG Compression Standards
MPEG Compression Standards
 
Target Detection and Classification Performance Enhancement using Super-Resol...
Target Detection and Classification Performance Enhancement using Super-Resol...Target Detection and Classification Performance Enhancement using Super-Resol...
Target Detection and Classification Performance Enhancement using Super-Resol...
 
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
 
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
 
Full reference video quality assessment
Full reference video quality assessmentFull reference video quality assessment
Full reference video quality assessment
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
 
Design and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding SystemDesign and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding System
 
A fully integrated violence detection system using CNN and LSTM
A fully integrated violence detection system using CNN and LSTM A fully integrated violence detection system using CNN and LSTM
A fully integrated violence detection system using CNN and LSTM
 
PERCEPTUALLY LOSSLESS COMPRESSION WITH ERROR CONCEALMENT FOR PERISCOPE AND SO...
PERCEPTUALLY LOSSLESS COMPRESSION WITH ERROR CONCEALMENT FOR PERISCOPE AND SO...PERCEPTUALLY LOSSLESS COMPRESSION WITH ERROR CONCEALMENT FOR PERISCOPE AND SO...
PERCEPTUALLY LOSSLESS COMPRESSION WITH ERROR CONCEALMENT FOR PERISCOPE AND SO...
 
E0704019023
E0704019023E0704019023
E0704019023
 
Perceptually Lossless Compression with Error Concealment for Periscope and So...
Perceptually Lossless Compression with Error Concealment for Periscope and So...Perceptually Lossless Compression with Error Concealment for Periscope and So...
Perceptually Lossless Compression with Error Concealment for Periscope and So...
 
report
reportreport
report
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
survey on Scene Detection Techniques on video
survey on Scene Detection Techniques on videosurvey on Scene Detection Techniques on video
survey on Scene Detection Techniques on video
 

Recently uploaded

The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
74nqk8xf
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 

Recently uploaded (20)

The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 

gist.doc

  • 1. Abstract: With the incresed adoption of social media platforms there has been a rapid growth in the transfer of data between the people, be it in the form of videos, images, text and audio. Based on the information being received conclusions are made accordingly and hence we need to ensure that correct data is received before taking a decision and therfore video verification is important and is attracting a lot of attention. But there is not much effor being put forward in this regard and hence motivated to deep dive in to this area of study. In this work we present an approach for automatic video manipulation detection.Video filters are used for verification and here we have used two such forensic filters one based on Discrete Cosine Transform(DCT) coefficients and second based on video requantization errors and combining them with CNN. We compare the performance of the proposed approach. Finally we discussed about the proposed work lmitations and proposed paths for future work in this area. Introduction: The amount of video content produced by non-professionals has increased rapidly and several agencies depends on User Generated Content(UGC) for news reporting. But the videos shared may not be authentic and generally people may manipulate them for various reasons be it for comedy purpose, be it intentionally etc. This information which is tampered may hurt the sentiments of people. This makes the demand to create new tools which will detect the quality of video. Multimedia forensics aims to address this by providing various algorithms and tools that points the traces of tampering. Filters are being used in order to spot inconsistencies and in our work e have used two filters and these outputs are used to train a number of deep learning visual classifiers, in order to learn to discriminate between original and tampered videos. Methodology: The proposed approach is a two stepprocess: 1. Forensic based feature extraction 2. Classification The feature extraction is basically based on two novel filters and the classification step is based on CNN. Forensic based filters: Here we have used Q4 and cobalt filters in which Q4 is used to analyze the decomposition of the image through DCT and it is applied on each individual video frames. Each frame is split in to N * N blocks and 2-D DCT is applied. Coefficients are identified based in their frequency. The first coefficient (0, 0) represents low frequency information, while higher coefficients represent higher frequencies. The typical block size for DCT is 8 × 8. However, analysis in 8 × 8 blocks yields too small coefficient arrays. Instead, 2 × 2 blocks are used so that the resulting output frame is only half the original size. A selection of coefficients (0, 1), (1, 0) and (1, 1) generates the final output video map of the Q4 filter. The second filter we use is the Cobalt filter. This compares the original video with a modified version of it, re-quantized using MPEG-4 at a different quality level. Here we requantize the video and calculate the per-pixel values, creating an Error Video, i.e. a video depicting the differences. n designing Cobalt, a “compare-to-worst” strategy has been investigated, i.e. if a constant quality encoding is done, the comparison will be performed with the worst possible quality, and conversely, if a constant bit rate encoding is done, the comparison is performed with the worst possible bit rate. Classification: The filters used generates outputs in the form of RGB images. With the idea that the filter maps were originally intended to be visually evaluated by a human expert, decided to treat this as a classification problem. This
  • 2. allows us to combine the maps with Convolutional Neural Networks pre-trained for image classification. Specifically, we take an instance of GoogLeNet and an instance of ResNet , both pre- trained on the ImageNet classification task, and adapt them to the needs of our task. As the resulting networks are designed for image classification, we feed the filter outputs to each network one frame at a time, during both training and classification. Experimental Study: The data sets used are named as Dev1 and Dev2 provided by NIST. The first one consisted of 30 video pairs(tampered and untampered) and the second one of 86 video pairs containing approximately 44K and 134K frames. These two datasets, Dev1 and Dev2, are treated as independent sets, but since they originate from the same source, they likely exhibit similar features. The second source of videos was the InVID Fake Video Corpus developed over the course of the InVID project. The Fake Video Corpus (FVC) contains 110 real and 117 fake newsworthy videos from social media sources, which include not only videos that have been tampered but also videos that are contextually false (e.g. whose description on YouTube contains misinformation about what is shown). Out of that dataset, we selected 35 real videos that comprise single-shot, unedited videos, and 33 fake videos that include tampered UGC. For this experiments, we treated all frames originating from untampered videos as untampered, and all frames originating from tampered videos as tampered.