首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Integrity verification of the ordered data structures in manipulated video content
Institution:1. Korea University, South Korea;2. Dongduk Women''s University, South Korea;1. Key Laboratory of Intelligent Computing and Signal Processing, Ministry of Education, PR China;2. School of Computer Science and Technology, Anhui University, Hefei, Anhui Province 230601, PR China;1. College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, Zhejiang 310023, China;2. Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science Technology, Nanjing 210044, China;3. School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China;1. College of Information, Mechanical and Electrical Engineering, Shanghai Normal University, Shanghai 200234, China;2. School of Computer Science, Liaocheng University, Liaocheng 252400, China;3. Department of Automation, Shanghai Jiao Tong University, Shanghai 200240, China;1. Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore 637371, Singapore;2. Department of Statistics, Virginia Tech, Blacksburg, VA 24060, USA;3. Division of Preventive Medicine, Walter Reed Army Institute of Research, USA;4. Department of Statistics, George Washington University, Washington, DC 20052, USA
Abstract:Video content stored in Video Event Data Recorders (VEDRs) are used as important evidence when certain events such as vehicle collisions occur. However, with sophisticated video editing software, assailants can easily manipulate video records to their advantage without leaving visible clues. Therefore, the integrity of video content recorded through VEDRs cannot be guaranteed, and the number of related forensic issues increases. Existing video integrity detection methods use the statistical properties of the pixels within each frame of the video. However, these methods require ample time, because they check frames individually. Moreover, the frame can easily be replaced and forged using the appropriate public software. To solve this problem, we propose an integrity checking mechanism using the structure of ordered fields in a video file, because existing video editing software does not allow users to access or modify field structures. In addition, because our proposed method involves checking the header information of video content only once, much less detection time is required compared with existing methods that examine the entire frames. We store an ordered file structure of video content as a signature in the database using a customized automated tool. The signature appears according to the video editing software. Then, the suspected video content is compared to a set of signatures. If the file structure matches with a signature, we recognize a manipulated video file by its corresponding editing software. We tested five types of video editing software that cover 99% of the video editing software market share. Furthermore, we arranged 305,981 saving options for all five video editing suites. As a result, we obtained 100% detection accuracy using stored signatures, without false positives, in a collection of 305,981 video files. The principle of this method can be applied to other video formats.
Keywords:Digital forensics  Data structure  Video forgery  Integrity verification
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号