| 研究生: |
謝鎮光 Chen-Kuang Hsieh |
|---|---|
| 論文名稱: |
基於分析宏區塊編碼模式變化之H.264/AVC視訊畫面異常操作偵測 Detecting Shot Manipulation in H.264/AVC Videos by Analyzing the Changes of Macroblock Coding Modes |
| 指導教授: |
蘇柏齊
Po-Chyi Su |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 論文出版年: | 2018 |
| 畢業學年度: | 106 |
| 語文別: | 英文 |
| 論文頁數: | 56 |
| 中文關鍵詞: | H.264/AVC 、視訊編碼 、編碼模式分析 、去區塊濾波器 、畫面增刪操作 |
| 外文關鍵詞: | H.264/AVC, video coding, coding mode analyzing, de-blocking filter, frame/video shot insertion/deletion |
| 相關次數: | 點閱:21 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
此研究的目的為鑑定H.264/AVC視訊是否曾遭受畫面異常操作,包括畫面片段刪減、插入或抽換等,所提出的方法利用H.264/AVC去區塊濾波器(De-blocking filter)所產生的邊界強度(Boundary Strength, BS)資訊以分析宏區塊(Macroblock)編碼模式。首先,我們以BS資訊產生兩種特徵圖,分別為PRG (Prediction Residual Graph)與IPG (Inter-Prediction Graph),再依此兩種特徵圖,分別提出VRF (Variation of Residual Footprint)與DOF (Degree of Fragments)兩種特徵,以因應不同的編碼情形與反偵測方法。我們藉由VRF與DOF所產生的數據進行峰值偵測,統計各峰值間的距離後取得此視訊遭受編輯前的原始GOP(Group of Pictures)大小,再分析所產生的峰值圖與原始GOP大小來追蹤峰值的異常週期,並進一步找出待測視訊的畫面操作位置。此外,本論文也針對一個基於改動編碼量化係數及編碼模式,且讓眾多偵測方法失效的新穎反偵測方法進行驗證。實驗結果顯示,不論在二次編碼時採用固定量化係數(Quantization Parameter)或是固定位元率(Constant Bitrate)編碼,在施予若干反偵測與否的情形下都能有穩定且強健的偵測效果。
The purpose of this research is to determine if an investigated H.264/AVC video stream has suffered such manipulations as shot deletion, insertion or replacement. The scheme is designed based on the information of H.264/AVC de-blocking filter, in which the boundary strength (BS) is utilized for analyzing the coding modes of macroblocks. We first employ the BS values to form two feature maps, PRG (Prediction Residual Graph) and IPG (Inter-Prediction Graph). We then further extract two features based on the two feature maps, including VRF (Variation of Residual Footprint) and DOF (Degree of Fragments) to deal with different anti-detection methods or varying coding scenarios. The distances between the detected peaks from VRF and DOF are used to acquire the original GOP (Group of Pictures) size. Finally, with the detected original GOP size and the identified peaks, we can observe the abnormal periodic phenomenon and locate the exact positions of shot manipulation. Several tests and a state-of-the-art anti-detection method that modifies quantized coefficients and coding modes are applied in the experiments to verify the robustness of the proposed scheme.
K. Sitara, B.M. Mehtre, “Digital video tampering detection: An overview of passive techniques.” Digital Investigation, vol.18, pp. 8-22, 2016.
[2] T. Wiegand, G.J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC video coding standard,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, Issue. 7, pp. 560–576, 2003.
[3] W. Wang and H. Farid, “Exposing digital forgeries in video by detecting double quantization,” Proceedings of the 11th ACM workshop on multimedia and security, pp. 39–48, 2009.
[4] A. Gironi, M. Fontani, T. Bianchi, A. Piva, M. Barni,” A video forensic technique for detecting frame deletion and insertion,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6226–6230, 2014.
[5] Y. Su, J. Xu, “Detection of double-compression in MPEG-2 videos,” Intelligent systems and applications (ISA), 2010 2nd International workshop on , pp. 1–4, 2010.
[6] P.-C. Su, P.-L. Suei, M.-K. Chang, J. Lain, “Forensic and anti-forensic techniques for video shot editing in h. 264/AVC,” Journal of Visual Communication and Image Representation,vol.29, pp. 103–113, 2015.
[7] J. Xu, Y. Su, X. You, “Detection of video transcoding for digital forensics,” IEEE International Conference on Audio, language and image processing (ICALIP), pp. 160–164, 2012.
[8] T. Sun, W. Wang, X. Jiang, “Exposing video forgeries by detecting MPEG double compression,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1389–1392, 2012.
[9] X. Jiang, W. Wang, T. Sun, Y.Q. Shi, S. Wang, “Detection of double compression in MPEG-4 videos based on markov statistics,” Signal Process Letter IEEE , vol.20, no.05, pp. 447–450, 2013.
[10] P. Bestagini, A. Allam, S. Milani, M. Tagliasacchi, S. Tubaro, “Video codec identification,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2257–2260, 2012.
[11] G. Yammine, E. Wige, A. Kaup, “Blind GOP structure analysis of MPEG-2 and H.264/AVC decoded video,” Picture coding symposium (PCS), pp. 258–261, 2010.
[12] L. Zheng, T. Sun, Y.-Q. Shi, “Inter-frame video forgery detection based on block-wise brightness variance descriptor,” Revised Selected Papers Digital-forensics and watermarking: 13th International Workshop , pp.18-30, 2015.
[13] J. Chao, X. Jiang, T. Sun, “A novel video inter-frame forgery model detection scheme based on optical flow consistency,” Revised Selected Papers Digital forensics and watermarking: 11th International workshop, pp. 267–281, 2013.
[14] W. Wang, X. Jiang, S. Wang, M. Wan, T. Sun, “Identifying Video Forgery Process Using Optical Flow,” Revised Selected Papers Digital-forensics and watermarking: 12th International workshop, pp. 244–257, 2014.
[15] Q. Wang, Z. Li, Z. Zhang, Q. Ma, “Video inter-frame forgery identification based on consistency of correlation coefficients of gray values,” Journal of Computer and Communications, vol.02, no.04, pp. 51-57, 2014.
[16] Y. Su, J. Zhang, J. Liu, “Exposing digital video forgery by detecting motion-compensated edge artifact,” Computational intelligence and software engineering, 2009(CiSE ), pp. 1–4, 2009.
[17] M.C. Stamm, W.S. Lin, K. Liu, “Temporal forensics and anti-forensics for motion compensated video,” IEEE Transactions on Information Forensics and Security, vol.07, no.04, pp. 1315–1329, 2012.
[18] H. Liu, S. Li, S. Bian, “Detecting frame deletion in H.264 video,” Information Security Practice and Experience Conference, pp.267-270, 2014.
[19] D. Vazquez-Padin, M. Fontani, T. Bianchi, P. Comesaña, A. Piva, M. Barni, “Detection of video double encoding with GOP size estimation,” IEEE International Workshop on Information Forensics and Security (WIFS), pp.151-156, 2012.
[20]JM.18 Reference Software. [Online]. Available: http://iphome.hhi.de/suehring/tml/download/.