Skip to main content
Log in

Multi-granularity geometrically robust video hashing for tampering detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The wide-spread video editing tools make it much easier to tamper a video, which raises a huge need for authentication techniques that can prove the originality of video content and locate the tampered regions on the video sequences. In this paper, a multi-granularity geometrically robust video hashing method is proposed for tampering detection and localization. In order to balance the robustness and sensitiveness, we describe a video from three levels of granularity: frame sequence level, block level and pixel level, and then hashes are generated at these three levels. Polar Complex Exponential Transform (PCET) moments are calculated on the low-pass sub-band of 3D Discrete Wavelet Transform (3D–DWT) on frame sequence to extract geometric invariant spatio-temporal hash, which is used for video authentication. Local PCET moments are calculated on annular and angular blocks, which are used for geometric correction and coarse tampering localization. Position information of salient objects is obtained from saliency map for fine tampering localization. Experimental results show that the proposed method is robust against temporal de-synchronization and geometrical transformation, and has high tampering localization accuracy even when the video is rotated. Compared with state-of-the-art methods, it is more robust against content-preserving operations and more sensitive to malicious manipulations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ceri S, Bozzon A, Brambilla M et al (2013) An introduction to information retrieval [M]//web information retrieval. Springer, Berlin Heidelberg, pp 3–11

    MATH  Google Scholar 

  2. Chen S, Tan S, Li B, et al. (2015) Automatic Detection of Object-based Forgery in Advanced Video [J]

  3. Coskun B, Sankur B, Memon N (2006) Spatio–temporal transform based video hashing [J]. ieee Trans on Multimed 8(6):1190–1208

    Article  Google Scholar 

  4. De Roover C, De Vleeschouwer C, Lefèbvre F et al (2005) Robust video hashing based on radial projections of key frames [J]. IEEE Trans Signal Process 53(10):4020–4037

    Article  MathSciNet  MATH  Google Scholar 

  5. Karthikeyan A, Saranya P, Jayashree N. (2013) An Efficient VLSI Architecture for 3D DWT Using Lifting Scheme [J]. International Journal of Engineering Science and Innovative Technology (IJESIT) Volume, 2

  6. Kumar C A, Madhavi B K, Lalkishore K. (2016) Pipeline and parallel processor architecture for fast computation of 3D–DWT using modified lifting scheme [C]//Wireless Communications, Signal Processing and Networking (WiSPNET), International Conference on. IEEE, 2123–2128

  7. Lee S, Yoo C D (2006) Video fingerprinting based on centroids of gradient orientations [C]// (2006) IEEE International Conference on Acoustics Speech and Signal Processing Proceedings. IEEE, 2: II-II

  8. Lee S, Yoo CD (2008a) Robust video fingerprinting for content-based video identification [J]. IEEE Trans on Circuits Syst for Video Technol 18(7):983–988

    Article  Google Scholar 

  9. Lee S, Yoo C D (2008b) Robust video fingerprinting based on affine covariant regions [C]// 2008 I.E. International Conference on Acoustics, Speech and Signal Processing. IEEE, 1237–1240

  10. Li M, Monga V. (2011) De-synchronization resilient video fingerprinting via randomized, low-rank tensor approximations [C]//Multimedia Signal Processing (MMSP), 2011 I.E. 13th International Workshop on. IEEE, 1–6

  11. Li M, Monga V (2012) Robust video hashing via multilinear subspace projections [J]. IEEE Trans Image Process 21(10):4397–4409

    Article  MathSciNet  MATH  Google Scholar 

  12. Lu W, Varna AL, Wu M (2014) Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization [J]. IEEE Access 2:125–141

    Article  Google Scholar 

  13. Malekesmaeili M, Fatourechi M, Ward R K. (2009) Video copy detection using temporally informative representative images [C]//Machine Learning and Applications, 2009. ICMLA'09. International Conference on. IEEE, 69–74

  14. NIE X, LIU J, SUN J et al (2011) Key-frame based robust video hashing using isometric feature mapping [J]. J Comput Inf Syst 7(6):2112–2119

    Google Scholar 

  15. Ouyang J, Liu Y, Shu H (2016) Robust hashing for image authentication using SIFT feature and quaternion Zernike moments [J]. Multimed Tools and Appl:1–18

  16. Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering [C]//2007 I.E. International Conference on Image Processing. IEEE, 6: VI-117-VI-120.

  17. Saikia N. (2015) Perceptual hashing in the 3D–DWT domain [C]//Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on. IEEE, 694–698.

  18. Saikia N, Bora P K (2011) Robust video hashing using the 3D–DWT [C]//Communications (NCC), 2011 National Conference on. IEEE, 1–5.

  19. Wang X, Pang K, Zhou X et al (2015) A visual model-based perceptual image hash for content authentication [J]. IEEE Trans on Inform Forensics and Sec 10(7):1336–1349

    Article  Google Scholar 

  20. Willems G, Tuytelaars T, Van Gool L. (2008) Spatio-temporal features for robust content-based video copy detection [C]//Proceedings of the 1st ACM international conference on Multimedia information retrieval. ACM, 283–290

  21. Wo Y, Chen X, Han G (2015) A saliency detection model using aggregation degree of color and texture [J]. Signal Process Image Commun 30:121–136

    Article  Google Scholar 

  22. Yan W, Jiao X (2012) Accurate and fast harmonic transform of polar coordinates [J]. J South China Univ Technol: Nat Sci Ed 40(4):23–29

    MathSciNet  Google Scholar 

  23. Yan CP, Pun CM, Yuan XC (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection [J]. Signal Process 121:1–16

    Article  Google Scholar 

  24. Yap PT, Jiang X, Kot AC (2010) Two-dimensional polar harmonic transforms for invariant image representation [J]. IEEE Trans Pattern Anal Mach Intell 32(7):1259–1270

    Article  Google Scholar 

  25. Zhao Y, Wang S, Feng G et al (2010) A robust image hashing method based on Zernike moments [J]. J Comput Inf Syst 6(3):717–725

    Google Scholar 

  26. Zhao Y, Wang S, Zhang X et al (2013) Robust hashing for image authentication using Zernike moments and local features [J]. IEEE Trans on Inform Forensics and Secur 8(1):55–63

    Article  Google Scholar 

Download references

Acknowledgements

This paper is supported by National Natural Science Foundation of Guangdong (No.2016A030313472); National Natural Science Foundation of China (Grant No. 61472145); Guangdong Province Special funds for University-Industry Cooperation (No. 2013B090500015); Science and Technology Planning Project of Guangdong Province, China (No. 2016B090918042).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Wo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, H., Wo, Y. & Han, G. Multi-granularity geometrically robust video hashing for tampering detection. Multimed Tools Appl 77, 5303–5321 (2018). https://doi.org/10.1007/s11042-017-4434-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4434-2

Keywords

Navigation