Computer Science ›› 2025, Vol. 52 ›› Issue (8): 363-373.doi: 10.11896/jsjkx.250500051

• Information Security • Previous Articles     Next Articles

Motion-angle-based Video Frame Deletion Detection Algorithm and Its Evidentiary Validity Standards

WANG Kangqing1, XIA Likuan2, LI Shuo3   

  1. 1 School of Criminal Justice,China University of Political Science and Law,Beijing 100088,China
    2 National Judges College,Beijing 100070,China
    3 People's Public Security University of China,Beijing 100088,China
  • Received:2025-05-14 Revised:2025-07-09 Online:2025-08-15 Published:2025-08-08
  • About author:WANG Kangqing,born in 1989,Ph.D,lecturer,is a member of CCF( No.Z3557M).His main research interests include information network security and digital law.
    XIA Likuan,born in 1991,Ph.D,lectu-rer.His main research interests include criminal trial and criminal evidence.
  • Supported by:
    Special Fund for Basic Scientific Research Operating Expenses of Central Universities(24CXTD02), Key Project of the National Social Science Fundation of China(22AFX009) and University-Level Project of China University of Political Science and Law(23624199).

Abstract: In recent years,malicious video tampering has become increasingly prevalent,posing severe challenges to the authenti-city and reliability of electronic evidence.Among such tampering methods,video frame deletion,which can obscure factual truth,proves particularly destructive to video-based electronic evidence.Consequently,frame deletion detection has attracted growing research attention.Current mainstream detection methods primarily rely on identifying content continuity degradation in the temporal domain caused by frame deletion.However,the complexity of temporal information in videos makes such temporal continuity-based detection approaches unstable.To address this issue,this paper focuses on motion patterns of objects in videos.By establi-shing a first-order Markov model,it derives frequency-domain Markov continuity decay traces.Subsequently,based on these frequency-domain traces,this paper proposes a video frame deletion detection algorithm utilizing time-frequency analysis techniques.Experimental results demonstrate that compared with temporal continuity decay traces,the frequency-domain continuity decay-based detection algorithm exhibits superior forensic performance.Building upon this technical advancement,this research further constructs a legal framework from perspectives of evidence legality,evidence authenticity,and evidence relevance,providing theoretical references for improving electronic evidence regulations in the digital era.This dual approach achieves both technological justice and procedural justice objectives.

Key words: Frame deletion detection, Passive evidence collection, Markov model, Continuous attenuation traces, Time-frequency analysis, Evidentiary validit

CLC Number: 

  • TP391.41
[1]SINGH R D,AGGARWAL N.Video Content Authentication Techniques:A Comprehensive Surve[J].Multimedia Systems,2018,2(24):211-240.
[2]WANG W,FARID H.Exposing Digital Forgeries in Video by Detecting Double Quantization[C]//ACM Workshop Mutimedia Security.New York:ACM,2009:9-48.
[3]SU Y,JING Z,JIE L.Exposing Digital Video Forgery by Detecting Motion-Compensated Edge Artifact[C]//Computational Intelligence and Software Engineering.2010:37-47.
[4]VAZQUEZPADIN D,FONTANI M,BIANCHI T.Detection of video double encoding with GOP size estimation[C]//IEEE International Workshop on Information Forensics and Security.2012:151-156.
[5]FENG C,XU Z,JIA S,et al.Motion-Adaptive Frame Deletion Detection for Digital Video Forensics[J].IEEE Transactions on Circuits and Systems for Video Technology,2017,27(12):2543-2554.
[6]SHANABLEH T.Detection of Frame Deletion for Digital Video Forensics[J].Digital Investigation,2013,4(10):350-360.
[7]ZHANG Z,HOU J,LI Z.Efficient Video Frame Insertion and Deletion Detection Based on Inconsistency of Correlations between Local Binary Pattern Coded Frames[J].Security and Communication Networks,2017,8(2):311-320.
[8]ZHAO Y,PANG T,LIANG X,et al.Frame Deletion Detection for Static-Background Video Based on Multi-scale Mutual Information[C]//Cloud Computing and Security:Third International Conference.2017:371-384.
[9]ZHANG Z Z,HOU J J,LI Z H,et al.Video frame-interpolation and frame-deletion forgery detection based on MSSIM quotient consistency[J].Journal of Beijing University of Posts and Telecommunications,2015,38(4):84-88.
[10]LIU Y,HUANG T.Exposing Video Inter-Frame Forgery byZernike Opponent Chromaticity Moments and Coarseness Analysis[J].Multimedia Systems,2017,2(23):223-238.
[11]CONOTTER V,O'BRIEN J F,FARID H.Exposing Digital Forgeries in Ballistic Motion [J].IEEE Transactions on Information Forensics and Security,2012,7(1):283-296.
[12]CHAO J,JIANG X,SUN T.A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency [C]//International Workshop on Digital Watermarking.Berlin:Springer,2012:267-281.
[13]WANG W,JIANG X,WANG S.Identifying Video ForgeryProcess Using Optical Flow [C]//International Workshop on Digital Watermarking.Berlin:Springer, 2014:244-257.
[14]LI S,HUO H T.Frame Deletion Detection Based on OpticalFlow Orientation Variation[J].IEEE Access,2021,99:37196-37209.
[15]BAO Q,WANG Y,HUA H,et al.An anti-forensics video forgery detection method based on noise transfer matrix analysis[J].Sensors,2024,24(16):5341.
[16]GOWDA R,PAWAR D.Deep learning-based forgery identification and localization in videos[J].Signal,Image and Video Processing,2023,17:2185-2192.
[17]LI S,HUO H T.Continuity-Attenuation Captured Network for Frame Deletion Detection[J].Signal,Image and Video Process,2024,18(4):3285-3297.
[18]FENG C,WU D,WU T,et al.An MSDCNN-LSTM Framework for Video Frame Deletion Forensics[J].Multimedia Tools and Applications,2024,83:72745-72764.
[19]YI D H.Time Series Analysis:Forecasting and Control [J].Application of Statistics and Management,2000(3):51.
[20]HU Y,SALMAN A.Construction and testing of video tamper detection database[J].Journal of South China University of Technology(Natural Science Edition),2017,45:57-64.
[1] XIE Bai-lin, LI Qi, KUANG Jiang. Microblog Popular Information Detection Based on Hidden Semi-Markov Model [J]. Computer Science, 2022, 49(6A): 291-296.
[2] LUO Jing-jie, WANG Yong-li. ADCSM:A Fine-grained Driving Cycle Model Construction Method [J]. Computer Science, 2021, 48(6A): 289-294.
[3] MA Chuang, YUAN Ye and YOU Hai-sheng. Agricultural Product Output Forecasting Method Based on Grey-Markov Model [J]. Computer Science, 2020, 47(6A): 535-539.
[4] ZHANG Cheng-wei, LUO Feng-e, DAI Yi. Prediction Method of Flight Delay in Designated Flight Plan Based on Data Mining [J]. Computer Science, 2020, 47(11A): 464-470.
[5] ZHANG Jing, YANG Jian, SU Peng. Survey of Monosyllable Recognition in Speech Recognition [J]. Computer Science, 2020, 47(11A): 172-174.
[6] JIA Zhi-chun, LI Xiang, YU Zhan-lin, LU Yuan, XING Xing. QoS Satisfaction Prediction of Cloud Service Based on Second Order Hidden Markov Model [J]. Computer Science, 2019, 46(9): 321-324.
[7] WU Jian-wei, LI Yan-ling, ZHANG Hui, ZANG Han-lin. HMM Cooperative Spectrum Prediction Algorithm Based on Density Clustering [J]. Computer Science, 2018, 45(9): 129-134.
[8] YUE Xin, DU Jun-wei, HU Qiang, WANG Yan-ping. Fault Tree Structure Matching Algorithm and Its Application [J]. Computer Science, 2018, 45(9): 202-206.
[9] GONG Fa-ming,ZHU Peng-hai. Word Segmentation Based on Adaptive Hidden Markov Model in Oilfield [J]. Computer Science, 2018, 45(6A): 97-100.
[10] TONG Zhen-ming, LIU Zhi-peng. Next Place Prediction of Massively Multiplayer Online Role-playing Games [J]. Computer Science, 2018, 45(11A): 453-457.
[11] CHEN Bing-cai, WANG Xi-bao, YU Chao, NIAN Mei, TAO Xin, PAN Wei-min, LU Zhi-mao. Saliency Detection Based on Surroundedness and Markov Model [J]. Computer Science, 2018, 45(10): 272-275.
[12] XU Guang-gen, YANG Lu and YAN Jian-feng. Sparse Trajectory Destination Prediction Algorithm Based on Markov Model [J]. Computer Science, 2017, 44(8): 193-197.
[13] YANG Lu, YU Shou-wen and YAN Jian-feng. Type-2 Fuzzy Logic Based Multi-threaded Data Race Detection [J]. Computer Science, 2017, 44(12): 135-143.
[14] LUO Feng-e, ZHANG Cheng-wei and LIU An. Flight Delays Early Warning Management and Analysis Based on Data Mining [J]. Computer Science, 2016, 43(Z6): 542-546.
[15] LI Wei-lin, WEN Jian and MA Wen-kai. Speech Recognition System Based on Deep Neural Network [J]. Computer Science, 2016, 43(Z11): 45-49.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!