DOI: 10.3724/SP.J.1249.2017.02165

Journal of Shenzhen University Science and Engineering (深圳大学学报理工版) 2017/34:2 PP.165-172

Tamper detection based on adaptive hashing algorithm for live video streaming

A new adaptive hashing algorithm based on video compression frames for real-time detection of the tampered video streaming is proposed. According to data length of a frame, the algorithm divides the frame into a number of intervals with different step-size and extracts the frame feature in spatial structure. The feature is quantized to generate the secret key. The experimental results show that the algorithm can meet real-time requirement and is robust and discriminative. It can detect accurately a video tampered through counting the similarity of keys in each group of pictures in the video.

Key words:computer perception,adaptive hashing algorithm,video forgery,video content protection,real-time video,H.264 encoder

ReleaseDate:2017-04-10 18:10:20

[1] 牛夏牧,焦玉华.感知哈希综述[J].电子学报,2008,36(7):1405-1411. Niu Xiamu,Jiao Yuhua.An overview of perceptual hashing[J].Acta Electronica Sinica,2008,36(7):1405-1411.(in Chinese)

[2] Tan Lina, Sun Xingming. Robust text hashing for content-based document authentication[J]. Information Technology Journal, 2011, 10(8):1608-1613.

[3] Zhang Qiuyu, Liu Yangwei,Huang Yibo,et al. Perceptual hashing algorithm for speech content identification based spectrum entropy in compressed domain[J]. International Journal on Smart Sensing and Intelligent Systems,2014,7(1):283-300.

[4] Zhang Qiuyu, Liu Yangwei,Di Yanjun,et al. MFCC-based perceptual hashing for compressed domain of speech content identification[J]. Journal of Chemical & Pharmaceutical Research, 2014, 6(7):379-386.

[5] Tang Zhenjun, Yu Junwei, Zhang Xianquan, et al. Discovery of tampered image with robust hashing[C]//Advanced Data Mining and Applications:10th International Conference. Guilin, China:Springer International Publishing, 2014:112-122.

[6] Tang Zhenjun, Ruan Linlin, Qin Chuan, et al. Robust image hashing with embedding vector variance of LLE[J]. Digital Signal Processing, 2015, 43:17-27.

[7] Liu Xiaocui, Sun Jiande, Liu Ju, et al. Shot-based temporally respective frame generation algorithm for video hashing[C]//IEEE International Workshop on Information Forensics and Security. Guangzhou, China:IEEE, 2013:149-150.

[8] Liu Xiaocui, Sun Jiande, Liu Ju. Visual attention based temporally weighting method for video hashing[J]. IEEE Signal Processing Letters, 2013, 20(12):1253-1256.

[9] 李海涛,林新棋,吴鹏,等.基于颜色内容一致性的视频篡改检测[J].福建师范大学学报自然科学版,2014, 30(2):26-33. Li Haitao, Lin Xinqi, Wu Peng, et al. Digital video forgery detection based on color-content congruency[J]. Journal of Fujian Normal University Natural Science Edition, 2014, 30(2):26-33.(in Chinese)

[10] 文振焜,高金花, 朱映映,等.融合时空域变化信息的视频感知哈希算法研究[J].电子学报,2014,42(6):1163-1167. Wen Zhenkun, Gao Jinhua, Zhu Yingying, et al. Video perceptual hashing fusing spatiotemporal change detection[J]. Acta Electronica Sinica, 2014, 42(6):1163-1167.(in Chinese)

[11] 文振焜,高金花,杜以华,等.鲁棒可区分的压缩视频感知哈希算法研究[J].深圳大学学报理工版,2013,30(2):157-161. Wen Zhenkun, Gao Jinhua, Du Yihua, et al.Robust and discriminative perceptual hash algorithm in compressed video[J]. Journal of Shenzhen University Science and Engineering, 2013, 30(2):157-161.(in Chinese)

[12] 高毅.基于UDP的视频图像传输的研究与实现[J].信息与电脑,2014(5):148-148. Gao Yi. Research and realization of transmitted video image based on UDP[J]. China Computer & Communication, 2014(5):148-148.(in Chinese)

[13] 刘河潮,常义林,陈玉峰.H.264/AVC网络视频的丢包失真评估[J].哈尔滨工业大学学报,2014,46(5):81-86. Liu Hechao, Chang Yilin, Chen Yufeng. H.264/AVC video quality assessment over IP network based on packet loss[J]. Journal of Harbin Institute of Technology, 2014, 46(5):81-86.(in Chinese)

[14] Wiegand T, Sullivan G J, Bjontegaard G, et al. Overview of the H.264/AVC video coding standard[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2015, 13(7):560-576.

[15] 张悦.基于HBase的彩虹表MD5哈希密码解密[J].深圳职业技术学院学报,2015(1):18-22. Zhang Yue. Deciphering rainbow table MD5 hash password based on HBase[J]. Journal of Shenzhen Polytechnic, 2015(1):18-22.(in Chinese)