Automatic Detection of Object-Based Video Forgery Using Various Groups of Pictures (GOP)


  • Alex Khang Global Research Institute of Technology and Engineering, USA
  • Neyara Radwan Industrial Engineering Dept., College of Applied Sciences, Al Maarefa University, Saudi Arabia



In recent years, there has been a lot of interest in detecting object-based video forgeries. There has been a lack of satisfactory performance with object-based forgery detectors until recently since a majority of them are still based on handcrafted features. There has been a great deal of interest in passive video forensics in recent years. Forgery of video encoded with advanced codec frameworks remains one of the biggest challenges in object-based forgery research. An object-based forgery detection approach is presented in this paper. To evaluate the proposed method, a derived test dataset of variable video lengths and frame sizes is also used in addition to the SYSU-OBJFORG dataset. This process's efficacy is verified by comparing its results with other methods. When tested on datasets with degraded-quality videos, the proposed framework performed better in real-life scenarios.


S. P. Yadav, M. Jindal, P. Rani, V. H. C. De Albuquerque, C. Dos Santos Nascimento, and M. Kumar, "An improved deep learning-based optimal object detection system from images," Multimed. Tools Appl., Sep. 2023, doi: 10.1007/s11042-023-16736-5.

R. Chen, Q. Dong, H. Ren, and J. Fu, "Video forgery detection based on non-subsampled contourlet transform and gradient information," Inf. Technol. J., vol. 11, no. 10, p. 1456, 2012.

P. Rani and R. Sharma, "Intelligent transportation system for internet of vehicles based vehicular networks for smart cities," Comput. Electr. Eng., vol. 105, p. 108543, 2023.

R. Li, S. Yu, and X. Yang, "Efficient spatio-temporal segmentation for extracting moving objects in video sequences," IEEE Trans. Consum. Electron., vol. 53, no. 3, pp. 1161–1167, 2007.

G. Ansari, P. Rani, and V. Kumar, "A Novel Technique of Mixed Gas Identification Based on the Group Method of Data Handling (GMDH) on Time-Dependent MOX Gas Sensor Data," in Proceedings of International Conference on Recent Trends in Computing, vol. 600, R. P. Mahapatra, S. K. Peddoju, S. Roy, and P. Parwekar, Eds., in Lecture Notes in Networks and Systems, vol. 600. , Singapore: Springer Nature Singapore, 2023, pp. 641–654. doi: 10.1007/978-981-19-8825-7_55.

P. Rani and R. Sharma, "An Experimental Study of IEEE 802.11n Devices for Vehicular Networks with Various Propagation Loss Models," in Advanced IoT Sensors, Networks and Systems, vol. 1027, A. K. Dubey, V. Sugumaran, and P. H. J. Chong, Eds., in Lecture Notes in Electrical Engineering, vol. 1027. , Singapore: Springer Nature Singapore, 2023, pp. 125–135. doi: 10.1007/978-981-99-1312-1_11.

A. V. Subramanyam and S. Emmanuel, "Video forgery detection using HOG features and compression properties," in 2012 IEEE 14th international workshop on multimedia signal processing (MMSP), IEEE, 2012, pp. 89–94.

J. Chao, X. Jiang, and T. Sun, "A novel video inter-frame forgery model detection scheme based on optical flow consistency," in The International Workshop on Digital Forensics and Watermarking 2012: 11th International Workshop, IWDW 2012, Shanghai, China, October 31–November 3, 2012, Revised Selected Papers, Springer, 2013, pp. 267–281.

I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "A sift-based forensic method for copy–move attack detection and transformation recovery," IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3, pp. 1099–1110, 2011.

X. Pan and S. Lyu, "Region duplication detection using image feature matching," IEEE Trans. Inf. Forensics Secur., vol. 5, no. 4, pp. 857–867, 2010.

W. Li and N. Yu, "Rotation robust detection of copy-move forgery," in 2010 IEEE International Conference on Image Processing, IEEE, 2010, pp. 2113–2116.

T. Van Lanh, K.-S. Chong, S. Emmanuel, and M. S. Kankanhalli, "A survey on digital camera image forensic methods," in 2007 IEEE international conference on multimedia and expo, IEEE, 2007, pp. 16–19.

X. Qiu, H. Li, W. Luo, and J. Huang, "A universal image forensic strategy based on steganalytic model," in Proceedings of the 2nd ACM workshop on information hiding and multimedia security, 2014, pp. 165–170.

J. Kodovský and J. Fridrich, "Calibration revisited," in Proceedings of the 11th ACM workshop on Multimedia and security, 2009, pp. 63–74.

J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Secur., vol. 7, no. 2, pp. 432–444, 2011.

T. Pevny and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis," in Security, steganography, and watermarking of multimedia contents IX, SPIE, 2007, pp. 28–40.

T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," in Proceedings of the 11th ACM workshop on Multimedia and security, 2009, pp. 75–84.

J. Kodovský, T. Pevný, and J. Fridrich, "Modern steganalysis can detect YASS," in Media Forensics and Security II, SPIE, 2010, pp. 9–19.

J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Secur., vol. 7, no. 3, pp. 868–882, 2012.

J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," in Media Watermarking, Security, and Forensics 2012, SPIE, 2012, pp. 81–93.







How to Cite

A. Khang and Neyara Radwan, “Automatic Detection of Object-Based Video Forgery Using Various Groups of Pictures (GOP)”, WJCMS, vol. 2, no. 4, pp. 126–133, Dec. 2023, doi: 10.31185/wjcms.234.