%0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2020 %T Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint %A David Vázquez-Padín %A Marco Fontani %A Dasara Shullani %A Fernando Pérez-González %A Alessandro Piva %A Mauro Barni %K B-frames %K double compression detection %K GOP size estimation %K rate distortion optimization %K video forensics %X

The Variation of Prediction Footprint (VPF), formerly used in video forensics for double compression detection and GOP size estimation, is comprehensively investigated to improve its acquisition capabilities and extend its use to video sequences that contain bi-directional frames (B-frames). By relying on a universal rate-distortion analysis applied to a generic double compression scheme, we first explain the rationale behind the presence of the VPF in double compressed videos and then justify the need of exploiting a new source of information such as the motion vectors, to enhance the VPF acquisition process. Finally, we describe the shifted VPF induced by the presence of B-frames and detail how to compensate the shift to avoid misguided GOP size estimations. The experimental results show that the proposed Generalized VPF (G-VPF) technique outperforms the state of the art, not only in terms of double compression detection and GOP size estimation, but also in reducing computational time.

%B IEEE Transactions on Information Forensics and Security %V 15 %P 1815-1830 %8 12/2019 %G eng %N 1 %& 1815 %0 Conference Paper %B IEEE International Workshop on Multimedia Signal Processing (MMSP) %D 2013 %T Localization of Forgeries in MPEG-2 Video through GOP Size and DQ analysis %A Daniele Labartino %A Tiziano Bianchi %A Alessia De Rosa %A Marco Fontani %A David Vázquez-Padín %A Alessandro Piva %A Mauro Barni %X

This work addresses forgery localization in MPEG-2 compressed videos. The proposed method is based on the analysis of Double Quantization (DQ) traces in frames that were encoded twice as intra (i.e., I-frames).  Employing a state-of-the-art method, such frames are located in the video under analysis by estimating the size of the Group Of Pictures (GOP) that was used in the first compression; then, the DQ analysis is devised for the MPEG-2 encoding scheme and applied to frames that were intra-coded in both the first and second compression. In such a way, regions that were manipulated between the two encodings are detected. Compared to existing methods based on double quantization analysis, the proposed scheme makes forgery localization possible on a wider range of settings.

 
%B IEEE International Workshop on Multimedia Signal Processing (MMSP) %C Pula (Sardinia), Italy %P 494-499 %G eng %1

Top 10% Award

%0 Conference Proceedings %B 2013 IEEE International Workshop on Information Forensics and Security (WIFS) %D 2013 %T Near optimal detection of quantized signals and application to JPEG forensics %A Tiziano Bianchi %A Alessandro Piva %A Fernando Pérez-González %B 2013 IEEE International Workshop on Information Forensics and Security (WIFS) %C Guangzhou, China %P 168-173 %8 11/2013 %G eng %U http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6707813 %0 Conference Paper %B IEEE International Workshop on Information Forensics and Security (WIFS) %D 2012 %T Detection of video double encoding with GOP size estimation %A David Vázquez-Padín %A Marco Fontani %A Tiziano Bianchi %A Pedro Comesaña %A Alessandro Piva %A Mauro Barni %X

Video forensics is an emerging discipline, that aims at inferring information about the processing history undergone by a digital video in a blind fashion. In this work we introduce a new forensic footprint and, based on it, propose a method for detecting whether a video has been encoded twice; if this is the case, we also estimate the size of the Group Of Pictures (GOP) employed during the first encoding. As shown in the experiments, the footprint proves to be very robust even in realistic settings (i.e., when encoding is carried out using typical compression rates), that are rarely addressed by existing techniques.

%B IEEE International Workshop on Information Forensics and Security (WIFS) %I IEEE %C Tenerife, Spain %P 151-156 %8 12/2012 %G eng