- Open Access
Secure self-recovery watermarking scheme for error concealment and tampering detection
© The Author(s) 2016
- Received: 21 April 2016
- Accepted: 8 September 2016
- Published: 22 September 2016
In this paper, we present a method for protecting and restoring lost or tampered information in images or videos using secure watermarks. The proposed method consists of a combination of techniques that are able to detect image and video manipulations. Contrary to most existing watermarking schemes, the method can identify the exact position of the tampered region. Furthermore, the method is capable of restoring the manipulated information and retrieve the original content. This set of capabilities make it possible to use the proposed method in error concealment and digital tampering applications.
The proposed method is employed as both an error concealment algorithm and a tampering detection algorithm. The proposed method is divided into two stages. At the encoder side, the method generates a binary version (watermark) of the original picture (image or video frame) using a halftoning technique. Then, a quantization index modulation technique is used to embed this watermark into the protected picture. At the decoder side, after the lost or tampered regions are identified, the original content is recovered by extracting the watermark corresponding to the affected areas. An inverse halftoning algorithm is used to convert the dithered version of the picture into a good-quality multi-level approximation of the original content.
First, we test the method in error concealment applications, using a set of still images and H.264 videos. Then, we test the proposed method for tampering detection and content retrieval applications, again considering both images and videos. We compare the proposed method with several other several state-of-the-art algorithms. The results show that the proposed method is fast, robust, and accurate.
Our results show that we can use a single approach to tackle both error concealment and tampering detection problems. The proposed method provides high levels of security, high detection accuracy, and recovery capability, and it is robust to several types of attacks.
- Quantization index modulation
- Error concealment
- Tampering detection
The flexibility of digital images and videos is both a blessing and a curse. Digital technologies make it possible to create high-quality pictures, animations, games, and special effects with an amazing realism. Digital pictures (images and videos) can be enhanced, compressed, transmitted, translated across different standards, and displayed in a variety of devices. Because of the significant advances in compression and transmission techniques, it is possible to deliver high-quality visual content to the end user in many different ways. As a consequence, a variety of delivery services have been created in the last years, such as direct TV broadcast satellite, digital broadcast television, and IP-based video streaming.
In content delivery applications, video and image signals are transmitted in a compressed format  and they are divided into packets before transmission. Unfortunately, during the transmission over wired and wireless channels, some packets may be lost or delayed. These transmission losses cause various types of visible degradations that may affect the quality of the perceived content. In video signals, transmission losses cause spatial and temporal degradations. These degradations may again affect the overall perceived video quality, what influences the acceptability and popularity of the application.
To minimize the effect of transmission errors, error resiliency techniques are often used. These techniques can be classified as forward, interactive, and concealment techniques . Forward techniques add redundant data to the video. Although this increases the amount of data to be transmitted, forward methods have the advantage of not requiring interaction between the encoder and the decoder. On the other hand, interactive techniques use a feedback channel that allows the decoder to request the encoder to resend data. A transmission of redundant data avoids wasting resources but may introduce delays and locks that make it unsuitable for real-time video streaming applications . In contrast to these approaches, concealment techniques usually do not increase the amount of data to be transmitted or require a side channel . They can be implemented with or without a modification to the encoder. Therefore, concealment techniques are very attractive for real-time applications that require a low bit-rate and delay .
Although there are several possible approaches, most error concealment algorithms use error prediction techniques, like interpolation [6, 7]. For example, Lin et al.  use an advanced interpolation technique. Their algorithm makes a partition decision considering information from previous frames. Ranjan et al.  propose a method that uses an affine transformation that uses a speed-up robust features (SURF) algorithm to find a relation between current and previous frames and, then, predict the lost data. Koloda et al.  proposes an error concealment technique that is based on sparse linear prediction.
Other approaches that promote error resiliency combine concealment and forward techniques. Basically, the error is concealed using information previously embedded into the original signal, what does not increase the amount of data to be transmitted. If some part of the data is lost during the transmission, the embedded information can be extracted and used to recover the original data. The signal acts as a channel (host) to transmit the hidden data. Often, this approach is related to dirty paper coding , specially when the data hiding technique is the quantization index modulation (QIM) algorithm [12, 13].
The use of data hiding reduces the decoder’s complexity. One example of this approach is the technique proposed by Yin et al.  that uses data hiding to embed a set of features extracted from the signal at the encoder. Similarly, Chung et al.  use a reversible data hiding technique to insert motion vectors (MVs) into zero quantized discrete cosine transform (QDCT) coefficients and perform intra-frame error concealment for H.264/AVC coded video sequences. A general method for recovering missing DCT coefficients in DCT-transformed images is proposed by Li et al. . The work of Xu et al.  is an improvement of Chung’s method, which exploits the number of coefficients that needs to be modified to extract the hidden data. Their work considers the residual blocks produced by the data hiding algorithm. Wang et al.  present an image restoration method that is based on on a linear optimization model and restores part of the image from structured side information.
A slightly different approach was proposed by Adsumilli et al. . Their technique uses a spread-spectrum watermarking algorithm to embed a dithered version of a picture frame into the host video. Navak et al.  improved Adsumilli’s technique by adding motion estimation vectors with edge-correlated information. Both schemes embed a low-resolution version of the picture or video frame into the original video content using a spread-spectrum watermarking technique. At the receiver side (decoder), the embedded watermark is extracted from the received video frame and is used as a reference for reconstructing the original signal. Unfortunately, the disadvantage of these two works is that the quality of the reconstruction is low because of the low capacity of the spread-spectrum data hiding scheme.
In addition to error concealment techniques, another important concern for image and video applications is tamper detection and copyright protection. Nowadays, there are several softwares for editing images and videos, making it very easy to alter (tamper) content without leaving any clear sign. Several techniques have been proposed with the goal of detecting tampered areas and reconstructing the original content . These techniques share similar goals with the error concealment algorithms. The difference is that in tampering detection the “non-original” areas are deliberately modified, while in the error concealment case the “non-original” areas are damaged or lost. Tampering detection techniques can be divided into no-reference, reduced-reference, and full-reference approaches. Full-reference approaches require the full original picture to determine whether the picture is tampered. Reduced-reference approaches need some information of the original to determine the tampering but do not require the full original picture. No-reference approaches detect tampering using only the tested picture, i.e. they do not require any information from the original content. For transmission applications, the original is not available. Therefore, no-reference approaches are the most adequate ones. Most no-reference techniques are specialized in detecting only one type of tampering [22, 23], what is not generally not very useful in practical applications.
Similarly to the error concealment techniques proposed by Adsumilli et al.  and Navak et al. , one popular no-reference tampering detection approach consists of using data hiding. Imaizumi et al.  detect and locate tampered areas in images using a reversible data hiding and a low cost scheme with efficiently multiplexed layers. The method proposed by Xu et al.  embeds data directly into the encrypted H.264/AVC video bitstream. Phadikar et al. , on the other hand, proposes a tamper detection and correction scheme based on a novel semi-fragile data hiding technique. This method is based on an integer wavelet transform and a quantization index modulation (QIM) algorithm. Tong et al.  also use a watermarking algorithm to detect and localize tampered areas. Lin et al.  present an authentication and recovery method for tampered images.
Among the methods available in the literature, few approaches address the problem of restoring the original content with good quality. Dadkhah et al.  propose an effective tamper detection that uses a singular value decomposition (SVD) in a self-recovery algorithm. In a more recent work, Som et al.  propose a discrete wavelet transform (DWT) watermarking scheme for tamper detection, localization, and restoration targeted at cropping attacks. Although these methods have a good performance (in terms of quality), they are very specialized and only work for one or two types of attacks.
In this paper, we present a method that works both as an error concealment technique and a tampering detector with restoration capability. The proposed method is based on watermarking and halftoning techniques. At the encoder side, the method generates a binary version of the original picture (image or video frame) using a halftoning technique. Then, a watermarking technique is used to embed this mark into the host content. The watermarking technique used is a modification of the QIM that achieves a higher data hiding capacity than traditional methods. For tampering detection, a ciphered key is also embedded into the host video to allow spatial and temporal localization of tampered regions. At the decoder side, after the modified (degraded or tampered) regions are identified, the original content is recovered by extracting the halftone image corresponding to the affected areas. An improved inverse halftoning algorithm is used to convert the dithered picture into a good quality approximation (colored) of the original picture. The quality of the reconstructed areas is higher than for other algorithms available in the literature. The tampering method is generic enough to recover tampered areas independently of the type of attack. Finally, the proposed method is among the few methods in the literature that also work for video signals, detecting and reconstructing (spatially and temporally) modified regions in videos with a good perceived quality and few temporal artifacts.
The rest of this paper is divided as follows. In the “Halftoning” section, the halftoning method is described. In the “Watermarking embedding” section, the watermarking embedding stage is explained. In the “Watermarking extraction” and “Inverse halftoning” sections, the watermarking extraction and inverse halftoning stages are detailed. In the “Error concealment algorithm” and “Tampering detection algorithm” sections, we describe the implementation and simulation results of the two main applications of the proposed system: error concealment and tampering detection algorithm. Finally, the “Conclusions” section presents the conclusions.
Halftoning is a technique for converting multi-level images into binary images using patterns of white and black dots . This technique creates the illusion of seeing multiple intensity levels in a binary image, what makes it suitable for applications where only a reduced number of levels is available, such as newspapers, fax machines, and document printing processes.
In this work, a halftoning algorithm is used to generate a dithered version of each picture (still image or video frame), which is later embedded into the host picture itself. At the decoder, if any loss or tampered area is detected, the dithered version of the picture is recovered and used to restore the content back to its original state. Therefore, the quality of the restored image or video depends strongly on the efficiency of the halftoning algorithm. One of the contributions of this work is the design of a halftoning and an inverse halftoning algorithms that are able to generate simple dithered images that can be later inverted with a good quality.
To promote high data hiding capacity, we propose a combinatorial dispersed-dot dithering pattern. This dithering method is capable of generating all combinations of bits necessary to represent a number of intensity levels [32, 33]. This way, we can increase the number of mapped intervals without increasing the size of the dot-pattern matrix. For example, using a 3 × 3 Bayesian matrix to generate a dispersed-dot dithering, we can represent 10 distinct intensity levels. On the other hand, using a 3 × 3 combinatorial matrix allows for up to 512 intensity levels.
where x and y are the horizontal and vertical spatial coordinates, respectively, c refers to the color channel (1≤c≤3), and I Q is the resulting dithered image. To enable restoration, up to 3 bits can be embedded in each color channel without causing visible degradations . This means that the dithered mark (I Q ) is represented with a total of 9 bits per pixel. Then, we substitute each value of I Q (x,y,c) by the corresponding 3-bit combinatorial dispersed dot patterns.
For videos signals, we also perform an embedding temporal distribution by inserting the mark corresponding to the current picture frame in a previous picture frame, located 1 s before. By distributing the mark spatially and temporally, a region does not store the mark necessary to restore it, what increases the probability that the algorithm is able to restore the content to its original version. The mark is also encrypted applying a XOR cipher to protect it from being extracted by an unauthorized user.
To detect if a picture region is lost or tampered, the extracted watermark is compared with the corresponding “host” content. For tampering detection, we extract the watermark and compute its inverse halftoning version. By computing the structural similarity (SSIM) between blocks of inverse halftoning and host content, it is expected that SSIM is higher for blocks where there are no tampers. On the other hand, if the image is tampered, the structural similarity between host and restored blocks are lower. For error concealment, the position of the lost areas are identified by the decoder and the damaged areas are substituted by the recovered watermark after an inverse halftoning process.
Given that I th is the dithered picture frame, D(p) is the distribution of the area surrounding the pixel p in I dth. To reconstruct an 8-bit pixel from the dithered picture, we first calculate the local distribution D(p) for all pixels in I dth. From this distribution, we find the corresponding mapped interval that contains the most probable pixel value in the corresponding color channel, according to the indices of the dot patterns. Once this interval is found, we randomly select a value within it, generating a slightly noisy picture I inv.
Error concealment algorithm
We used the techniques described in the previous sections to design an error concealment algorithm. The algorithm is designed to be integrated into a compression codec but can also be used independently of the codec technology. Since decoders are able to identify which packets were lost, there is no need for a key code. To increase the quality of restored areas, for each color channel, we used dithered watermarks of 3 bits (see the “Methods” section, Fig. 2 b).
Tampering detection algorithm
In this section, we present the simulations of the error concealment algorithm and the tampering detection algorithm, for videos and images.
Quality of watermarking algorithm
UQI, PSNR and SSIM values calculated between original and watermarked videos
Error concealment for images
Error concealment for videos
Second, we test the ability of the proposed algorithm to recover lost packets. The block diagram of this error concealment algorithm for videos is depicted in Fig. 5. We use publicly available videos in YUV 4:4:4 color CIF (352 × 288, progressive) format, with around 300 frames each. The videos are “Foreman,” “Mobile,” “Carphone,” and “Suzie” . We embed the proposed error concealment algorithm into a video stream. In order to simulate packet losses into a given bitstream, we use a simple model that simulates packet losses over error-prone channels. The following packet loss rates (PLR) are used: 0.5, 1, 3, 5, and 10 %.
Although the error concealment methods tested in the previous section (KMMSE, WTM, VC, and XFSE) perform well for images, they are not designed to conceal errors in compressed videos. They are designed to conceal errors only within homogeneous spatial regions and, therefore, cannot recover lost packets because these packets may contain information from several frame blocks distributed along several frames. Given the inability to compare the proposed method with these techniques, we compare it only with the standard H.264 error concealment algorithm.
Tampering detection in images
We test the proposed algorithm using still images with different characteristics: high-detailed, low-detailed, color, grayscale, documents, landscape, faces and people images, etc. Different kinds of attacks are applied to these images: blurring of selected/random areas, noise addition, cut-and-paste, region deletion, and resizing.
Tampering detection in videos
We also test the performance of the algorithm for tampering detection and recovery of digital videos. As in the previous examples, we used publicly available videos in YUV 4:4:4 color CIF (352 × 288, progressive) format with around 300 frames each, downloaded from the Video Trace Library  and from the Consumer Digital Video Library . We tested the following attacks: blurring of selected areas, cut-and-paste, region-deletion, and object-addition. Again, for all test cases, we were able to detect tampered regions in 100 % of the cases. In terms of reconstruction, the algorithm was able to recover tampered regions with good quality.
Mean efficiency of spatial detections per frame for some methods (%)
This paper presents a secure variable-capacity self-recovery watermarking scheme. In the proposed scheme, it is possible to implement both an error concealment algorithm and a tampering detection algorithm. The scheme is based on watermarking and halftoning techniques. In order to increase the data hiding capacity, this work proposed a simple modification of the QIM watermarking algorithm. To obtain higher quality restored areas, improved inverse halftoning algorithms are also proposed. A secret key code is embedded to the host content to identify the spatial and temporal positions of tampered regions, taking advantage of the lower sensitivity of the HVS to degradations in the blue color channel. Above all, the proposed scheme not only achieves variable-capacity, higher security, higher detection accuracy, and strong recovery ability but also can resist collage attack and mean attack.
Future works include a further increase of the data hiding capacity with the goal of embedding even more information. With that, the quality of the restored content can be increased and additional bits can be used for protection of the data against tampering. For example, using some bits to embed additional temporal information can help counter other attacks, such as frame shuffle.
This work was supported by Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq), by Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES), and by the University of Brasília (UnB).
RR developed the methods presented in this paper for his master degree dissertation at the University of Brasília (UnB), Brazil. PGF wrote most of the text, figures, and diagrams presented in this manuscript. MCQF is the research adviser and was responsible to guide the research, the writing, and the revising of this manuscript. All authors read and approved the final version of this work.
The authors declare that they have no competing interests.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
- Yang SH, Tsai JC (2010) A fast and efficient H. 264 error concealment technique based on coding modes In: 2010 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 1–4.. IEEE. http://ieeexplore.ieee.org/document/5463091/.
- Wang Y, Zhu QF (1998) Error control and concealment for video communication: a review. Proc IEEE 86(5): 974–997.View ArticleGoogle Scholar
- Nasiopoulos P, Coria-Mendoza L, Mansour H, Golikeri A (2005) An improved error concealment algorithm for intra-frames in h. 264/avc In: Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium On. IEEE, 320–323. http://ieeexplore.ieee.org/document/1464589/.
- Cui Z, Gan Z, Zhan X, Zhu X (2012) Error concealment techniques for video transmission over error-prone channels: a survey. J Comput Inf Syst 8(21): 8807–8818.Google Scholar
- Al-Mualla ME, Canagarajah CN, Bull DR (2001) Multiple-reference temporal error concealment In: Circuits and Systems, 2001. ISCAS 2001. The 2001 IEEE International Symposium On, vol. 5. IEEE, 149–152. http://ieeexplore.ieee.org/document/922007/.
- Zhou J, Yan B, Gharavi H (2011) Efficient motion vector interpolation for error concealment of h.264/avc. IEEE Trans Broadcast 57(1): 75–80.View ArticleGoogle Scholar
- Sun H, Liu P, Wang J, Goto S (2011) An efficient frame loss error concealment scheme based on tentative projection for H.264/AVC. Springer. http://link.springer.com/chapter/10.1007/978-3-642-15696-0_37.
- Lin TL, Yang NC, Syu RH, Liao CC, Tsai WL (2013) Error concealment algorithm for hevc coded video using block partition decisions In: Signal Processing, Communication and Computing (ICSPCC), 2013 IEEE International Conference On, 1–5, doi:10.1109/ICSPCC.2013.6664106.
- Ranjan A, Midya A, Chakraborty J, Sengupta S (2014) Video error concealment using speeded up robust features and affine transformation In: Students’ Technology Symposium (TechSym), 2014 IEEE, 72–75, doi:10.1109/TechSym.2014.6807917.
- Koloda J, Ostergaard J, Jensen SH, Sanchez V, Peinado AM (2013) Sequential error concealment for video/images by sparse linear prediction. IEEE Trans Multimed 15(4): 957–969. doi:10.1109/TMM.2013.2238524.View ArticleGoogle Scholar
- Costa MHM (1983) Writing on dirty paper (corresp.)IEEE Trans Inf Theory 29(3): 439–441. doi:10.1109/TIT.1983.1056659.View ArticleMATHGoogle Scholar
- Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4): 1423–1443.MathSciNetView ArticleMATHGoogle Scholar
- Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital watermarking and steganography 2nd edn.. Morgan Kaufmann Publishers Inc., San Francisco.Google Scholar
- Yin P, Liu B, Yu HH (2001) Error concealment using data hiding In: Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP ’01). 2001 IEEE International Conference On. vol. 3., 1453–14563, doi:10.1109/ICASSP.2001.941204.
- Chung KL, Huang YH, Chang PC, Liao H-YM (2010) Reversible data hiding-based approach for intra-frame error concealment in h.264/avc. IEEE Trans Circ Syst Video Technol 20(11): 1643–1647. doi:10.1109/TCSVT.2010.2077577.View ArticleGoogle Scholar
- Li S, Karrenbauer A, Saupe D, Kuo C-CJ (2011) Recovering missing coefficients in dct-transformed images In: 2011 18th IEEE International Conference on Image Processing, IEEE, 1537–1540. http://ieeexplore.ieee.org/document/6115738/.
- Xu D, Wang R, Shi YQ (2014) An improved reversible data hiding-based approach for intra-frame error concealment in h. 264/avc. J Vis Commun Image Represent 25(2): 410–422.View ArticleGoogle Scholar
- Wang H, Ho AT, Li S (2014) A novel image restoration scheme based on structured side information and its application to image watermarking. Signal Process Image Commun 29(7): 773–787.View ArticleGoogle Scholar
- Adsumilli CB, Farias MCQ, Mitra SK, Carli M (2005) A robust error concealment technique using data hiding for image and video transmission over lossy channels. IEEE Trans Circ Syst Video Technol 15(11): 1394–1406.View ArticleGoogle Scholar
- Nayak CK, Surendran J, Merchant SN, Desai UB, Sanyal S (2010) Error concealment of h.264 encoded video through a hybrid scheme In: Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES ’10, 189–195.. ACM, New York.View ArticleGoogle Scholar
- Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimedia Tools Appl 51(1): 133–162.View ArticleGoogle Scholar
- Ng TT, Chang SF, Sun Q (2004) Blind detection of photomontage using higher order statistics In: Circuits and Systems, 2004. ISCAS’04. Proceedings of the 2004 International Symposium on, V-688–V-691.. IEEE. http://ieeexplore.ieee.org/document/1329901/.
- Peng F, Wang X-l (2010) Digital image forgery forensics by using blur estimation and abnormal hue detection In: 2010 Symposium on Photonics and Optoelectronics, 1–4.. IEEE. http://ieeexplore.ieee.org/document/5504476/.
- Imaizumi S, Taniguchi K (2014) Hierarchical image authentication based on reversible data hiding. Bull Soc Photogr Imag Japan 24(1): 1–5.Google Scholar
- Xu D, Wang R, Shi YQ (2014) Data hiding in encrypted h. 264/avc video streams by codeword substitution. IEEE Trans Inf Forensic Secur 9(3-4): 596–606.View ArticleGoogle Scholar
- Phadikar A, Maity SP, Mandal M (2012) Novel wavelet-based qim data hiding technique for tamper detection and correction of digital images. J Vis Commun Image Represent 23(3): 454–466.View ArticleGoogle Scholar
- Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3): 301–308.View ArticleGoogle Scholar
- Lin SJ, Lin JC (2010) Authentication and recovery of an image by sharing and lattice-embedding. J Electron Imaging 19(4): 043008–043008.View ArticleGoogle Scholar
- Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective svd-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10): 1197–1210.View ArticleGoogle Scholar
- Som S, Palit S, Dey K, Sarkar D, Sarkar J, Sarkar K (2015) Applied Computation and Security Systems: Volume Two. In: Chaki R, Saeed K, Choudhury S, Chaki N (eds), 17–37.. Springer, New Delhi.Google Scholar
- Soleimany H, Sharifi A, Aref M (2010) Improved related-key boomerang cryptanalysis of AES-256 In: 2010 International Conference on Information Science and Applications, 1–7.. IEEE. http://ieeexplore.ieee.org/document/5480302/.
- Knuth DE (1987) Digital halftones by dot diffusion. ACM Trans Graph 6: 245–273.View ArticleMATHGoogle Scholar
- Freitas PG, Farias MCQ, de Araujo APF (2011) Fast inverse halftoning algorithm for ordered dithered images In: 2011 24th SIBGRAPI Conference on Graphics, Patterns and Images, 250–257.. IEEE. http://ieeexplore.ieee.org/document/6134739/.
- Rigoni R, Freitas PG, Farias MC (2016) Detecting tampering in audio-visual content using qim watermarking. Inf Sci 328: 127–143.View ArticleGoogle Scholar
- Mullen KT (1985) The contrast sensitivity of human colour vision to red-green and blue-yellow chromatic gratings. J Physiol 359: 381.View ArticleGoogle Scholar
- Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4): 600–612. doi:10.1109/TIP.2003.819861.View ArticleGoogle Scholar
- Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Proc Lett 9(3): 81–84. doi:10.1109/97.995823.View ArticleGoogle Scholar
- Koloda J, Sánchez V, Peinado AM (2013) Spatial error concealment based on edge visual clearness for image/video communication. Circ Syst Signal Process 32(2): 815–824.MathSciNetView ArticleGoogle Scholar
- Koloda J, Ostergaard J, Jensen SH, Peinado AM, Sanchez V (2012) Sequential error concealment for video/images by weighted template matching In: Data Compression Conference (DCC), 2012, 159–168, doi:10.1109/DCC.2012.24.
- Koloda J, Peinado AM, Sanchez V (2013) On the application of multivariate kernel density estimation to image error concealment In: Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference On, 1330–1334, doi:10.1109/ICASSP.2013.6637867.
- Koloda J, Seiler J, Kaup A, Sanchez V, Peinado AM (2014) Frequency selective extrapolation with residual filtering for image error concealment In: Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference On, 1976–1980, doi:10.1109/ICASSP.2014.68539444.
- Video Trace Library of Arizona State University (ASU). http://trace.eas.asu.edu/. Accessed Apr 2013.
- The Consumer Digital Video Library (CVDL). http://www.cdvl.org/. Accessed Apr 2013.
- Zhi-yu H, Xiang-hong T (2011) Integrity authentication scheme of color video based on the fragile watermarking In: Electronics, Communications and Control (ICECC), 2011 International Conference On, 4354–4358, doi:10.1109/ICECC.2011.6067709.
- Hsu CC, Hung TY, Lin CW, Hsu CT (2008) Video forgery detection using correlation of noise residue In: Multimedia Signal Processing, 2008 IEEE 10th Workshop On, IEEE, 170–174. http://ieeexplore.ieee.org/document/4665069/.
- Lin E, Eskicioglu AM, Lagendijk RL, Delp EJ (2005) Advances in digital video content protection. Proc IEEE 93(1): 171–183.View ArticleGoogle Scholar
- Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensic Secur 5(4): 857–867.View ArticleGoogle Scholar
- Subramanyam A, Emmanuel S (2012) Video forgery detection using hog features and compression properties In: Multimedia Signal Processing (MMSP), 2012 IEEE 14th International Workshop On, IEEE, 89–94. http://ieeexplore.ieee.org/document/6343421/.
- Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6(3): 1099–1110.View ArticleGoogle Scholar
- Wang W, Farid H (2007) Exposing digital forgeries in video by detecting duplication In: Proceedings of the 9th Workshop on Multimedia & Security, ACM, 35–42. http://dl.acm.org/citation.cfm?id=1288876.