Dr Pam Johnston p.johnston2@rgu.ac.uk
Lecturer
Dr Pam Johnston p.johnston2@rgu.ac.uk
Lecturer
Professor Eyad Elyan e.elyan@rgu.ac.uk
Supervisor
Chrisina Jayne
Supervisor
Video compression is pervasive in digital society. With rising usage of deep convolutional neural networks (CNNs) in the fields of computer vision, video analysis and video tampering detection, it is important to investigate how patterns invisible to human eyes may be influencing modern computer vision techniques and how they can be used advantageously. This work thoroughly explores how video compression influences accuracy of CNNs and shows how optimal performance is achieved when compression levels in the training set closely match those of the test set. A novel method is then developed, using CNNs, to derive compression features directly from the pixels of video frames. It is then shown that these features can be readily used to detect inauthentic video content with good accuracy across multiple different video tampering techniques. Moreover, the ability to explain these features allows predictions to be made about their effectiveness against future tampering methods. The problem is motivated with a novel investigation into recent video manipulation methods, which shows that there is a consistent drive to produce convincing, photorealistic, manipulated or synthetic video. Humans, blind to the presence of video tampering, are also blind to the type of tampering. New detection techniques are required and, in order to compensate for human limitations, they should be broadly applicable to multiple tampering types. This thesis details the steps necessary to develop and evaluate such techniques.
JOHNSTON, P. 2019. Beyond the pixels: learning and utilising video compression features for localisation of digital tampering. Robert Gordon University [online], PhD thesis. Available from: https://openair.rgu.ac.uk
Thesis Type | Thesis |
---|---|
Deposit Date | Jan 27, 2020 |
Publicly Available Date | Jan 27, 2020 |
Keywords | Video compression; Video tampering; Tampering detection; Computer vision; Deep learning |
Public URL | https://rgu-repository.worktribe.com/output/841280 |
Award Date | Aug 31, 2019 |
JOHNSTON 2019 Beyond the pixels
(42.4 Mb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by-nc/4.0/
Copyright Statement
© The Author.
Fusion methods for face presentation attack detection.
(2022)
Journal Article
Deep transfer learning on the aggregated dataset for face presentation attack detection.
(2022)
Journal Article
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search