SlideShare a Scribd company logo
Video Inpainting detection using inconsistencies in
Optical Flow
Thesis Committee
Dr. A V Subramanyam (Advisor)
Dr. Pradeep Atrey(External Reviewer)
Dr. Sambuddho Chakravarty(Internal Reviewer)
Shobhita Saxena
M.Tech CSE (MT13015)
1
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
2
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
3
Aims at :
 restoring lost parts of videos and
reconstructing them based on the
background information and
spatial - temporal details.
 removal or replacement of
unwanted objects from frames
such that no distortion is observed
when video is played as a
sequence.
What is Video Inpainting?
4
Figure 1 : Removal of unwanted object from
a video frame
Video Inpainting as Video Forgery
 Video Inpainting can be used as a major forgery tool to perform malicious changes in
videos such as object removal .
5Figure 2 : Video Inpainting as forgery type (a) source video frames (b) Inpainted video frames
Research Motivation
 Video Inpainting forgery produces inpainted regions in video frames in a
visually plausible manner.
 Inpainting forgery is highly sophisticated and gets more difficult to detect
in comparison to other forgery types thus posing a challenging research
problem.
 Very few works have been proposed in the area of video inpainting
detection.
 Existing inpainting detection techniques fail to perform detection of latest
state-of-the-art inpainting techniques.
6
Research Aim
 To study and analyse the optical flow pattern in source and inpainted
videos .
 To present a robust technique for effective detection and localization of
inpainted regions in a given video sequence.
 To propose a single algorithm which detects multiple inpainting techniques.
7
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
8
Related Work
Hsu et al. [1] Proposed approach to locate forged regions in an inpainted video
using correlation of noise residue.
Zhang et al. [2] Performs inpainting forgery detection based on ghost shadow
artifacts.
Das et al.[3] Proposed a blind detection method based on zero-connectivity feature
and fuzzy membership function to detect video inpainting forgery.
Lin et al. [4] Proposed spatio-temporal coherance based approach for video
inpainting detection and localization.
9
Research Contribution
 Propose an approach which investigates video inpainting forgery which has not
been studied much in previous works
 Propose a novel approach to detect and temporally localize inpainted regions in a
given video sequence.
 Propose algorithm performs well in detection and localization of popular and
effective state-of-the-art inpainting techniques on which other inpainting detection
algorithms fail to perform .
10
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
11
Problem definition
 Given an input video sequence VN having N frames, determine if its an authentic
or an inpainted video .
 For a video that gets classified as inpainted, perform temporal localization of the
inpainted regions.
12
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
13
Targeted Inpainting Techniques
14
 This algorithm performs on two variants of Temporal Copy Paste (TCP) inpainting.
They are as follows :
 Conventional TCP – one of the first and most popular inpainting techniques
proposed by Patwardhan et al [5] in 2007. Handles relatively simple motion
types in videos for inpainting.
 Complex TCP – one of the state-of-the-art inpainting techniques proposed by
Alasdair et al [6] in 2014. Handles relatively complex motions in videos to
performing inpainting.
Algorithm Design
15
Optical Flow
16
 Optical Flow (Of) characterizes
the motion of every pixel in one
image to its corresponding
location in next image[7].
 Performs motion estimation in
between video frames .
 It is best applied to video frames
as these are sequence of time
ordered images.
Figure 3 : (a,b) mouth regions of two consecutive
images of a person speaking . (c) Flow field
estimated using optical flow.
17* Picture from Khurram Hassan-Shafique CAP5415 Computer Vision 2003
Figure 4 : Two frames of a video sequence
18
Figure 6 : Colour scheme used to
represent the orientation and
magnitude of optical flow
Figure 5 : Optical Flow computation in between two
images
Optical Flow Computation - Procedure
19
V video under consideration having N
frames
m number of optical flow matrices
computed for each frame
N-m number of frames chosen for optical
flow computation
Of Optical flow matrix computed in
between frames as Of(n,n+1), Of(n,n+2),
Of(n,n+3)…. Of(n,n+m) , where n is a
particular frame
(N-m)*m Number of optical flow matrices
generated for each frame in a video
sequence
Optical Flow – Results
20
a) Source video frames
b) Optical Flow of source framesFigure 7:
21
a) Inpainted video frames
b) Optical Flow of inpainted video framesFigure 8:
Chi-Square Distance computation - Procedure
22
H Histogram vector
computed for each
optical flow matrix..
chisq Chi – square distance
computed for
comparing histograms
(N-m)*(m-1) Number of chi –
square values
produced
Guassian Mixture curve fitting
 Applied to normalized chi – square values
 Measures goodness-of-fit for authentic and inpainted videos by giving
Root Mean Square Error(RMSE) values
23
GM Distribution Fit to chi-square values
24
Figure 9 : Source and Inpainted GM distributions
Markov Chain – feature extraction
 Each video VN divided into VN / k frames set
 Optical Flow Of of each frame set is modelled as firsst order spatial
Markov Chain
 Values in Of are rounded of to nearest integer values to get integer
value states and then truncated in between –Tr to +Tr before
extracting the transition probabilities .
25
 Number of states to model a markov chain = (2Tr+1)
 For each matrix, number of Transition Probabilities = (2Tr+1) * (2Tr+1)
 TPM is constructed as :
where, u,v ϵ [-Tr , Tr] , and u,v ϵ Z.
Similarly, probabilities can be estimated for other directions.
 Perform SVM classification on above obtained TPMs.
26
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
27
Dataset
 Experiments have been conducted on test videos of two inpainting
techniques - complex TCP and convenional TCP .
28
Table 1 : Conventional TCP inpainting dataset
29
Table 2 : Complex TCP Inpainting Dataset
 RMS value threshold τ is empericaly set to 3.5.
30
Figure 10 : RMS value based classification for complex TCP inpainting
31
Figure 11 : RMS value based classification for conventional TCP inpainting
Performance Evaluation
 Performance has been measured by Precision, Recall and Accuracy .
 Precision(P) = TP/(TP+FP)
 Recall (R) = TP/(TP+FN)
 Accuracy(A) = (TP+TN)/(TP+TN+FP+FN)
32
TP True Positive
TN True Negative
FN False Negative
FP False Positive
Results - Video Inpainting Detection
33
Table 3:Classification Results for Complex TCP Table 4 : Classification Results for Conventional TCP
Table 5 : Video Inpainting Detection Results
Results - Video Inpainting Localization
34
Table 6 :Classification Results for Complex TCP Table 7 : Classification Results for Conventional TCP
Table 8 : Video Inpainting Localization Results
Comparison
 Proposed approach is compared with spatio-temporal coherence
based technique proposed by Lin et al [4]for inpainting detection and
localization .
 Spatio- Temporal coherence based approach fails to perform on
complex TCP inpainting dataset.
35
36
Figure 12: Spatio_Temporal Approach Result on conventional TCP dataset
37
Figure 13 : Spatio_Temporal Approach Result on complex TCP dataset
Outline
 Research Motivation and Aim
 Related Work and Research Contribution
 Problem definition
 Proposed Algorithm
 Experimental Results and Comparison Analysis
 Limitations
38
Limitations
 Considers only static camera videos with no camera motion.
 Multiple objects removal case not considered in complex inpainting dataset .
 Spatial Localization is not performed of inpainted regions is not performed.
 Dataset is small .
39
References
40
1) Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin, and Chiou-Ting Hsu. Video forgery detection
using correlation of noise residue. In Multimedia Signal Processing, 2008 IEEE 10th
Workshop on, pages 170– 174. IEEE, 2008.
2) Jing Zhang, Yuting Su, and Mingyu Zhang. Exposing digital video forgery by ghost
shadow artifact. In Proceedings of the First ACM workshop on Multimedia in
forensics, pages 49–54. ACM, 2009
3) Sreelekshmi Das Gopu Darsan and Shreyas L Divya Devan. Blind detection method
for video inpainting forgery
4) Cheng-Shian Lin and Jyh-Jong Tsay. A passive approach for effective detection and
localization of region-level video forgery with spatio-temporal coherence analysis.
Digital Investigation, 11(2):120– 140, 2014
References
41
5) Kedar Patwardhan, Guillermo Sapiro, Marcelo Bertalimo, et al. Video inpainting
under constrained camera motion. Image Processing, IEEE Transactions on, 16(2):545–
553, 2007.
6) Alasdair Newson, Andres Almansa, Matthieu Fradet, Yann ´ Gousseau, and Patrick
Perez ´ . Video inpainting of complex scenes. 2015
7) Thomas Brox, Andres Bruhn, Nils Papenberg, and Joachim We- ´ ickert. High
accuracy optical flow estimation based on a theory for warping. In Computer Vision-
ECCV 2004, pages 25–36. Springer, 2004

More Related Content

What's hot (20)

PDF
Variational Autoencoder
Mark Chang
 
PDF
Machine Learning - Object Detection and Classification
Vikas Jain
 
PPTX
Real Time Object Tracking
Vanya Valindria
 
PDF
04 image enhancement edge detection
Rumah Belajar
 
PDF
Digital Image Processing: Image Segmentation
Mostafa G. M. Mostafa
 
PPT
Convolution final slides
ramyasree_ssj
 
PPTX
Multiple object detection
SAURABH KUMAR
 
PPTX
Pattern Recognition
Maaz Hasan
 
PDF
Distributed Multi-GPU Computing with Dask, CuPy and RAPIDS
PeterAndreasEntschev
 
PDF
Image Segmentation
Syed Muhammad Hammad
 
PDF
Introduction to pattern recognition
Luís Gustavo Martins
 
PPTX
The Singular Value Decomposition theroy + example
shivam choubey
 
PDF
Machine learning in image processing
Data Science Thailand
 
PPTX
Vision Transformer(ViT) / An Image is Worth 16*16 Words: Transformers for Ima...
changedaeoh
 
PPT
Image processing9 segmentation(pointslinesedges)
John Williams
 
PPTX
Image proccessing and its application
Ashwini Awatare
 
PPTX
Photorealistic style transfer via wavelet transforms
soul8085
 
PDF
Medical Imaging (D3L3 2017 UPC Deep Learning for Computer Vision)
Universitat Politècnica de Catalunya
 
PPTX
Image processing presentation
Bibus Poudel
 
PPT
Pattern Recognition
Talal Alsubaie
 
Variational Autoencoder
Mark Chang
 
Machine Learning - Object Detection and Classification
Vikas Jain
 
Real Time Object Tracking
Vanya Valindria
 
04 image enhancement edge detection
Rumah Belajar
 
Digital Image Processing: Image Segmentation
Mostafa G. M. Mostafa
 
Convolution final slides
ramyasree_ssj
 
Multiple object detection
SAURABH KUMAR
 
Pattern Recognition
Maaz Hasan
 
Distributed Multi-GPU Computing with Dask, CuPy and RAPIDS
PeterAndreasEntschev
 
Image Segmentation
Syed Muhammad Hammad
 
Introduction to pattern recognition
Luís Gustavo Martins
 
The Singular Value Decomposition theroy + example
shivam choubey
 
Machine learning in image processing
Data Science Thailand
 
Vision Transformer(ViT) / An Image is Worth 16*16 Words: Transformers for Ima...
changedaeoh
 
Image processing9 segmentation(pointslinesedges)
John Williams
 
Image proccessing and its application
Ashwini Awatare
 
Photorealistic style transfer via wavelet transforms
soul8085
 
Medical Imaging (D3L3 2017 UPC Deep Learning for Computer Vision)
Universitat Politècnica de Catalunya
 
Image processing presentation
Bibus Poudel
 
Pattern Recognition
Talal Alsubaie
 

Viewers also liked (20)

PDF
Optical Flow на GPU
MSU GML VideoGroup
 
PDF
Introduction to Optial Flow
Sylvain_Lobry
 
PPT
Svm
wltongxing
 
PDF
Lecture30
zukun
 
PDF
Ensemble of Exemplar-SVM for Object Detection and Beyond
zukun
 
DOCX
People or human tracking system
Venkatesan S
 
PDF
Multi-Camera Multi-Human Tracking System (oral presentation)
Yu-Sheng (Yosen) Chen
 
PDF
Digital Image Forgery Detection Using Improved Illumination Detection Model
Editor IJMTER
 
PPT
Seminar On Kalman Filter And Its Applications
Barnali Dey
 
PPTX
Kalman filters
Saravanan Natarajan
 
PPT
Text categorization
Phuong Nguyen
 
PPTX
Human Action Recognition Using 3D Joint Information and HOOFD Features
Barış Üstündağ
 
PDF
EEG based Motor Imagery Classification using SVM and MLP
Dr. Rajdeep Chatterjee
 
PPT
Kalman filter
Raghava Raghu
 
PPTX
Kalman filter for object tracking
Mohit Yadav
 
PPTX
Passive techniques for detection of tampering in images by Surbhi Arora and S...
arorasurbhi
 
PPTX
Image forgery and security
أحلام انصارى
 
PDF
Video Forgery Detection: Literature review
Tharindu Rusira
 
PDF
Kalman filter - Applications in Image processing
Ravi Teja
 
PPTX
Image segmentation
Rania H
 
Optical Flow на GPU
MSU GML VideoGroup
 
Introduction to Optial Flow
Sylvain_Lobry
 
Lecture30
zukun
 
Ensemble of Exemplar-SVM for Object Detection and Beyond
zukun
 
People or human tracking system
Venkatesan S
 
Multi-Camera Multi-Human Tracking System (oral presentation)
Yu-Sheng (Yosen) Chen
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Editor IJMTER
 
Seminar On Kalman Filter And Its Applications
Barnali Dey
 
Kalman filters
Saravanan Natarajan
 
Text categorization
Phuong Nguyen
 
Human Action Recognition Using 3D Joint Information and HOOFD Features
Barış Üstündağ
 
EEG based Motor Imagery Classification using SVM and MLP
Dr. Rajdeep Chatterjee
 
Kalman filter
Raghava Raghu
 
Kalman filter for object tracking
Mohit Yadav
 
Passive techniques for detection of tampering in images by Surbhi Arora and S...
arorasurbhi
 
Image forgery and security
أحلام انصارى
 
Video Forgery Detection: Literature review
Tharindu Rusira
 
Kalman filter - Applications in Image processing
Ravi Teja
 
Image segmentation
Rania H
 
Ad

Similar to Video Inpainting detection using inconsistencies in optical Flow (20)

PDF
06714519
yatin209
 
PDF
Video inpainting using backgroung registration
eSAT Publishing House
 
PDF
40120140502005
IAEME Publication
 
PDF
A New Approach for video denoising and enhancement using optical flow Estimation
IRJET Journal
 
PDF
IRJET- Framework for Image Forgery Detection
IRJET Journal
 
PDF
Event recognition image & video segmentation
eSAT Journals
 
PDF
An efficient novel dual deep network architecture for video forgery detection
International Journal of Reconfigurable and Embedded Systems
 
PDF
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
IRJET Journal
 
PDF
A survey on passive digital video forgery detection techniques
IJECEIAES
 
PDF
The problem of Spatio-Temporal Invariant Points in Videos
Priyatham Bollimpalli
 
PDF
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
IRJET Journal
 
PDF
IRJET - A Research on Video Forgery Detection using Machine Learning
IRJET Journal
 
PPTX
06-08 ppt.pptx
Farah Naaz
 
PPTX
Viii sem
Lavesh Kaushik
 
PDF
Interactive Control over Temporal Consistency while Stylizing Video Streams
Matthias Trapp
 
PDF
PR-376: Softmax Splatting for Video Frame Interpolation
Hyeongmin Lee
 
PDF
REMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESIS
IJCSEA Journal
 
PDF
A Combined Model for Image Inpainting
iosrjce
 
PDF
I017265357
IOSR Journals
 
PDF
AN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSING
cscpconf
 
06714519
yatin209
 
Video inpainting using backgroung registration
eSAT Publishing House
 
40120140502005
IAEME Publication
 
A New Approach for video denoising and enhancement using optical flow Estimation
IRJET Journal
 
IRJET- Framework for Image Forgery Detection
IRJET Journal
 
Event recognition image & video segmentation
eSAT Journals
 
An efficient novel dual deep network architecture for video forgery detection
International Journal of Reconfigurable and Embedded Systems
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
IRJET Journal
 
A survey on passive digital video forgery detection techniques
IJECEIAES
 
The problem of Spatio-Temporal Invariant Points in Videos
Priyatham Bollimpalli
 
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
IRJET Journal
 
IRJET - A Research on Video Forgery Detection using Machine Learning
IRJET Journal
 
06-08 ppt.pptx
Farah Naaz
 
Viii sem
Lavesh Kaushik
 
Interactive Control over Temporal Consistency while Stylizing Video Streams
Matthias Trapp
 
PR-376: Softmax Splatting for Video Frame Interpolation
Hyeongmin Lee
 
REMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESIS
IJCSEA Journal
 
A Combined Model for Image Inpainting
iosrjce
 
I017265357
IOSR Journals
 
AN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSING
cscpconf
 
Ad

More from Cybersecurity Education and Research Centre (17)

PDF
Automated Methods for Identity Resolution across Online Social Networks
Cybersecurity Education and Research Centre
 
PDF
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Cybersecurity Education and Research Centre
 
PPTX
TASVEER : Tomography of India’s Internet Infrastructure
Cybersecurity Education and Research Centre
 
PDF
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Cybersecurity Education and Research Centre
 
PDF
A Strategy for Addressing Cyber Security Challenges
Cybersecurity Education and Research Centre
 
PDF
Identification and Analysis of Malicious Content on Facebook: A Survey
Cybersecurity Education and Research Centre
 
PPTX
Clotho : Saving Programs from Malformed Strings and Incorrect
Cybersecurity Education and Research Centre
 
PDF
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
Cybersecurity Education and Research Centre
 
PDF
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
Cybersecurity Education and Research Centre
 
PDF
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Cybersecurity Education and Research Centre
 
PDF
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Cybersecurity Education and Research Centre
 
PDF
Securing the Digital Enterprise
Cybersecurity Education and Research Centre
 
PDF
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Cybersecurity Education and Research Centre
 
PDF
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Cybersecurity Education and Research Centre
 
PDF
Web Application Security 101
Cybersecurity Education and Research Centre
 
PPTX
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Cybersecurity Education and Research Centre
 
PDF
The future of interaction & its security challenges
Cybersecurity Education and Research Centre
 
Automated Methods for Identity Resolution across Online Social Networks
Cybersecurity Education and Research Centre
 
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Cybersecurity Education and Research Centre
 
TASVEER : Tomography of India’s Internet Infrastructure
Cybersecurity Education and Research Centre
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Cybersecurity Education and Research Centre
 
A Strategy for Addressing Cyber Security Challenges
Cybersecurity Education and Research Centre
 
Identification and Analysis of Malicious Content on Facebook: A Survey
Cybersecurity Education and Research Centre
 
Clotho : Saving Programs from Malformed Strings and Incorrect
Cybersecurity Education and Research Centre
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
Cybersecurity Education and Research Centre
 
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
Cybersecurity Education and Research Centre
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Cybersecurity Education and Research Centre
 
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Cybersecurity Education and Research Centre
 
Securing the Digital Enterprise
Cybersecurity Education and Research Centre
 
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Cybersecurity Education and Research Centre
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Cybersecurity Education and Research Centre
 
Web Application Security 101
Cybersecurity Education and Research Centre
 
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Cybersecurity Education and Research Centre
 
The future of interaction & its security challenges
Cybersecurity Education and Research Centre
 

Recently uploaded (20)

DOCX
Lesson 1 - Nature and Inquiry of Research
marvinnbustamante1
 
PDF
Lesson 1 : Science and the Art of Geography Ecosystem
marvinnbustamante1
 
PPTX
How Physics Enhances Our Quality of Life.pptx
AngeliqueTolentinoDe
 
PPTX
How to Add a Custom Button in Odoo 18 POS Screen
Celine George
 
PPTX
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
PDF
Our Guide to the July 2025 USPS® Rate Change
Postal Advocate Inc.
 
PDF
DIGESTION OF CARBOHYDRATES ,PROTEINS AND LIPIDS
raviralanaresh2
 
PDF
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
PDF
Quiz Night Live May 2025 - Intra Pragya Online General Quiz
Pragya - UEM Kolkata Quiz Club
 
PDF
Indian National movement PPT by Simanchala Sarab, Covering The INC(Formation,...
Simanchala Sarab, BABed(ITEP Secondary stage) in History student at GNDU Amritsar
 
PDF
Learning Styles Inventory for Senior High School Students
Thelma Villaflores
 
PPTX
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
PDF
Nanotechnology and Functional Foods Effective Delivery of Bioactive Ingredien...
rmswlwcxai8321
 
PPTX
Lesson 1 Cell (Structures, Functions, and Theory).pptx
marvinnbustamante1
 
PPTX
Ward Management: Patient Care, Personnel, Equipment, and Environment.pptx
PRADEEP ABOTHU
 
PDF
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.06.25.pdf
TechSoup
 
PPTX
Comparing Translational and Rotational Motion.pptx
AngeliqueTolentinoDe
 
PDF
The Power of Compound Interest (Stanford Initiative for Financial Decision-Ma...
Stanford IFDM
 
PPTX
Iván Bornacelly - Presentation of the report - Empowering the workforce in th...
EduSkills OECD
 
PPTX
Parsing HTML read and write operations and OS Module.pptx
Ramakrishna Reddy Bijjam
 
Lesson 1 - Nature and Inquiry of Research
marvinnbustamante1
 
Lesson 1 : Science and the Art of Geography Ecosystem
marvinnbustamante1
 
How Physics Enhances Our Quality of Life.pptx
AngeliqueTolentinoDe
 
How to Add a Custom Button in Odoo 18 POS Screen
Celine George
 
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
Our Guide to the July 2025 USPS® Rate Change
Postal Advocate Inc.
 
DIGESTION OF CARBOHYDRATES ,PROTEINS AND LIPIDS
raviralanaresh2
 
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
Quiz Night Live May 2025 - Intra Pragya Online General Quiz
Pragya - UEM Kolkata Quiz Club
 
Indian National movement PPT by Simanchala Sarab, Covering The INC(Formation,...
Simanchala Sarab, BABed(ITEP Secondary stage) in History student at GNDU Amritsar
 
Learning Styles Inventory for Senior High School Students
Thelma Villaflores
 
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
Nanotechnology and Functional Foods Effective Delivery of Bioactive Ingredien...
rmswlwcxai8321
 
Lesson 1 Cell (Structures, Functions, and Theory).pptx
marvinnbustamante1
 
Ward Management: Patient Care, Personnel, Equipment, and Environment.pptx
PRADEEP ABOTHU
 
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.06.25.pdf
TechSoup
 
Comparing Translational and Rotational Motion.pptx
AngeliqueTolentinoDe
 
The Power of Compound Interest (Stanford Initiative for Financial Decision-Ma...
Stanford IFDM
 
Iván Bornacelly - Presentation of the report - Empowering the workforce in th...
EduSkills OECD
 
Parsing HTML read and write operations and OS Module.pptx
Ramakrishna Reddy Bijjam
 

Video Inpainting detection using inconsistencies in optical Flow

  • 1. Video Inpainting detection using inconsistencies in Optical Flow Thesis Committee Dr. A V Subramanyam (Advisor) Dr. Pradeep Atrey(External Reviewer) Dr. Sambuddho Chakravarty(Internal Reviewer) Shobhita Saxena M.Tech CSE (MT13015) 1
  • 2. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 2
  • 3. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 3
  • 4. Aims at :  restoring lost parts of videos and reconstructing them based on the background information and spatial - temporal details.  removal or replacement of unwanted objects from frames such that no distortion is observed when video is played as a sequence. What is Video Inpainting? 4 Figure 1 : Removal of unwanted object from a video frame
  • 5. Video Inpainting as Video Forgery  Video Inpainting can be used as a major forgery tool to perform malicious changes in videos such as object removal . 5Figure 2 : Video Inpainting as forgery type (a) source video frames (b) Inpainted video frames
  • 6. Research Motivation  Video Inpainting forgery produces inpainted regions in video frames in a visually plausible manner.  Inpainting forgery is highly sophisticated and gets more difficult to detect in comparison to other forgery types thus posing a challenging research problem.  Very few works have been proposed in the area of video inpainting detection.  Existing inpainting detection techniques fail to perform detection of latest state-of-the-art inpainting techniques. 6
  • 7. Research Aim  To study and analyse the optical flow pattern in source and inpainted videos .  To present a robust technique for effective detection and localization of inpainted regions in a given video sequence.  To propose a single algorithm which detects multiple inpainting techniques. 7
  • 8. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 8
  • 9. Related Work Hsu et al. [1] Proposed approach to locate forged regions in an inpainted video using correlation of noise residue. Zhang et al. [2] Performs inpainting forgery detection based on ghost shadow artifacts. Das et al.[3] Proposed a blind detection method based on zero-connectivity feature and fuzzy membership function to detect video inpainting forgery. Lin et al. [4] Proposed spatio-temporal coherance based approach for video inpainting detection and localization. 9
  • 10. Research Contribution  Propose an approach which investigates video inpainting forgery which has not been studied much in previous works  Propose a novel approach to detect and temporally localize inpainted regions in a given video sequence.  Propose algorithm performs well in detection and localization of popular and effective state-of-the-art inpainting techniques on which other inpainting detection algorithms fail to perform . 10
  • 11. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 11
  • 12. Problem definition  Given an input video sequence VN having N frames, determine if its an authentic or an inpainted video .  For a video that gets classified as inpainted, perform temporal localization of the inpainted regions. 12
  • 13. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 13
  • 14. Targeted Inpainting Techniques 14  This algorithm performs on two variants of Temporal Copy Paste (TCP) inpainting. They are as follows :  Conventional TCP – one of the first and most popular inpainting techniques proposed by Patwardhan et al [5] in 2007. Handles relatively simple motion types in videos for inpainting.  Complex TCP – one of the state-of-the-art inpainting techniques proposed by Alasdair et al [6] in 2014. Handles relatively complex motions in videos to performing inpainting.
  • 16. Optical Flow 16  Optical Flow (Of) characterizes the motion of every pixel in one image to its corresponding location in next image[7].  Performs motion estimation in between video frames .  It is best applied to video frames as these are sequence of time ordered images. Figure 3 : (a,b) mouth regions of two consecutive images of a person speaking . (c) Flow field estimated using optical flow.
  • 17. 17* Picture from Khurram Hassan-Shafique CAP5415 Computer Vision 2003 Figure 4 : Two frames of a video sequence
  • 18. 18 Figure 6 : Colour scheme used to represent the orientation and magnitude of optical flow Figure 5 : Optical Flow computation in between two images
  • 19. Optical Flow Computation - Procedure 19 V video under consideration having N frames m number of optical flow matrices computed for each frame N-m number of frames chosen for optical flow computation Of Optical flow matrix computed in between frames as Of(n,n+1), Of(n,n+2), Of(n,n+3)…. Of(n,n+m) , where n is a particular frame (N-m)*m Number of optical flow matrices generated for each frame in a video sequence
  • 20. Optical Flow – Results 20 a) Source video frames b) Optical Flow of source framesFigure 7:
  • 21. 21 a) Inpainted video frames b) Optical Flow of inpainted video framesFigure 8:
  • 22. Chi-Square Distance computation - Procedure 22 H Histogram vector computed for each optical flow matrix.. chisq Chi – square distance computed for comparing histograms (N-m)*(m-1) Number of chi – square values produced
  • 23. Guassian Mixture curve fitting  Applied to normalized chi – square values  Measures goodness-of-fit for authentic and inpainted videos by giving Root Mean Square Error(RMSE) values 23
  • 24. GM Distribution Fit to chi-square values 24 Figure 9 : Source and Inpainted GM distributions
  • 25. Markov Chain – feature extraction  Each video VN divided into VN / k frames set  Optical Flow Of of each frame set is modelled as firsst order spatial Markov Chain  Values in Of are rounded of to nearest integer values to get integer value states and then truncated in between –Tr to +Tr before extracting the transition probabilities . 25
  • 26.  Number of states to model a markov chain = (2Tr+1)  For each matrix, number of Transition Probabilities = (2Tr+1) * (2Tr+1)  TPM is constructed as : where, u,v ϵ [-Tr , Tr] , and u,v ϵ Z. Similarly, probabilities can be estimated for other directions.  Perform SVM classification on above obtained TPMs. 26
  • 27. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 27
  • 28. Dataset  Experiments have been conducted on test videos of two inpainting techniques - complex TCP and convenional TCP . 28 Table 1 : Conventional TCP inpainting dataset
  • 29. 29 Table 2 : Complex TCP Inpainting Dataset
  • 30.  RMS value threshold τ is empericaly set to 3.5. 30 Figure 10 : RMS value based classification for complex TCP inpainting
  • 31. 31 Figure 11 : RMS value based classification for conventional TCP inpainting
  • 32. Performance Evaluation  Performance has been measured by Precision, Recall and Accuracy .  Precision(P) = TP/(TP+FP)  Recall (R) = TP/(TP+FN)  Accuracy(A) = (TP+TN)/(TP+TN+FP+FN) 32 TP True Positive TN True Negative FN False Negative FP False Positive
  • 33. Results - Video Inpainting Detection 33 Table 3:Classification Results for Complex TCP Table 4 : Classification Results for Conventional TCP Table 5 : Video Inpainting Detection Results
  • 34. Results - Video Inpainting Localization 34 Table 6 :Classification Results for Complex TCP Table 7 : Classification Results for Conventional TCP Table 8 : Video Inpainting Localization Results
  • 35. Comparison  Proposed approach is compared with spatio-temporal coherence based technique proposed by Lin et al [4]for inpainting detection and localization .  Spatio- Temporal coherence based approach fails to perform on complex TCP inpainting dataset. 35
  • 36. 36 Figure 12: Spatio_Temporal Approach Result on conventional TCP dataset
  • 37. 37 Figure 13 : Spatio_Temporal Approach Result on complex TCP dataset
  • 38. Outline  Research Motivation and Aim  Related Work and Research Contribution  Problem definition  Proposed Algorithm  Experimental Results and Comparison Analysis  Limitations 38
  • 39. Limitations  Considers only static camera videos with no camera motion.  Multiple objects removal case not considered in complex inpainting dataset .  Spatial Localization is not performed of inpainted regions is not performed.  Dataset is small . 39
  • 40. References 40 1) Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin, and Chiou-Ting Hsu. Video forgery detection using correlation of noise residue. In Multimedia Signal Processing, 2008 IEEE 10th Workshop on, pages 170– 174. IEEE, 2008. 2) Jing Zhang, Yuting Su, and Mingyu Zhang. Exposing digital video forgery by ghost shadow artifact. In Proceedings of the First ACM workshop on Multimedia in forensics, pages 49–54. ACM, 2009 3) Sreelekshmi Das Gopu Darsan and Shreyas L Divya Devan. Blind detection method for video inpainting forgery 4) Cheng-Shian Lin and Jyh-Jong Tsay. A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digital Investigation, 11(2):120– 140, 2014
  • 41. References 41 5) Kedar Patwardhan, Guillermo Sapiro, Marcelo Bertalimo, et al. Video inpainting under constrained camera motion. Image Processing, IEEE Transactions on, 16(2):545– 553, 2007. 6) Alasdair Newson, Andres Almansa, Matthieu Fradet, Yann ´ Gousseau, and Patrick Perez ´ . Video inpainting of complex scenes. 2015 7) Thomas Brox, Andres Bruhn, Nils Papenberg, and Joachim We- ´ ickert. High accuracy optical flow estimation based on a theory for warping. In Computer Vision- ECCV 2004, pages 25–36. Springer, 2004