Log In Sign Up

Forensic Analysis of Video Files Using Metadata

by   Ziyue Xiang, et al.

The unprecedented ease and ability to manipulate video content has led to a rapid spread of manipulated media. The availability of video editing tools greatly increased in recent years, allowing one to easily generate photo-realistic alterations. Such manipulations can leave traces in the metadata embedded in video files. This metadata information can be used to determine video manipulations, brand of video recording device, the type of video editing tool, and other important evidence. In this paper, we focus on the metadata contained in the popular MP4 video wrapper/container. We describe our method for metadata extractor that uses the MP4's tree structure. Our approach for analyzing the video metadata produces a more compact representation. We will describe how we construct features from the metadata and then use dimensionality reduction and nearest neighbor classification for forensic analysis of a video file. Our approach allows one to visually inspect the distribution of metadata features and make decisions. The experimental results confirm that the performance of our approach surpasses other methods.


page 3

page 7


Camera-Model Identification Using Encoding and Container Characteristics of Video Files

We introduce a new method for camera-model identification. Our approach ...

LaTeX, metadata, and publishing workflows

The field of scientific publishing that is served by LaTeX is increasing...

Metadata Extraction from Raw Astroparticle Data of TAIGA Experiment

Today, the operating TAIGA (Tunka Advanced Instrument for cosmic rays an...

ir_metadata: An Extensible Metadata Schema for IR Experiments

The information retrieval (IR) community has a strong tradition of makin...

Growing a Tree in the Forest: Constructing Folksonomies by Integrating Structured Metadata

Many social Web sites allow users to annotate the content with descripti...

A Map Equation with Metadata: Varying the Role of Attributes in Community Detection

As the No Free Lunch theorem formally states [1], algorithms for detecti...