Most video forensic techniques look for traces within the data stream that are, however, mostly ineffective when dealing with strongly compressed or low resolution videos. Recent research highlighted that useful forensic traces are also left in the video container structure, thus offering the opportunity to understand the life-cycle of a video file without looking at the media stream itself. In this paper we introduce a container-based method to identify the software used to perform a video manipulation and, in most cases, the operating system of the source device. As opposed to the state of the art, the proposed method is both efficient and effective and can also provide a simple explanation for its decisions. This is achieved by using a decision-tree-based classifier applied to a vectorial representation of the video container structure. We conducted an extensive validation on a dataset of 7000 video files including both software manipulated contents (ffmpeg, Exiftool, Adobe Premiere, Avidemux, and Kdenlive), and videos exchanged through social media platforms (Facebook, TikTok, Weibo and YouTube). This dataset has been made available to the research community. The proposed method achieves an accuracy of 97.6% in distinguishing pristine from tampered videos and classifying the editing software, even when the video is cut without re-encoding or when it is downscaled to the size of a thumbnail. Furthermore, it is capable of correctly identifying the operating system of the source device for most of the tampered videos.
翻译:最近的研究强调,在视频容器结构中,还留下了有用的法证痕迹,从而提供了了解视频档案生命周期的机会,而不必看媒体流本身。在本文中,我们引入了一种基于集装箱的方法,以识别用于进行视频操纵的软件,在大多数情况下,源设备操作系统。与目前的情况相反,拟议方法既有效又有效,也可以为它的决定提供简单解释。这是通过使用一个基于决定的树级分类器,用于视频容器结构的矢量代表。我们广泛验证了7000个视频文件的数据集,其中包括软件操作的内容(ffpeg、Exiftool、Adobe Prime、Avidemux和Kdenlif),以及通过社交媒体平台(Facebook、TikTok、Weibo和YouTube)交换的视频。这一数据集已经提供给研究界。在对视频的升级和缩略图进行最精确的分类时,它甚至实现了97.6%的系统精确度,因为它能够将视频的缩略图与缩图进行分解。