Biometric authentication takes on many forms. Some of the more researched forms are fingerprint and facial authentication. Due to the amounts of research in these areas there are benchmark datasets easily accessible for new researchers to utilize when evaluating new systems. A newer, less researched biometric method is that of lip motion authentication. These systems entail a user producing a lip motion password to authenticate, meaning they must utter the same word or phrase to gain access. Because this method is less researched, there is no large-scale dataset that can be used to compare methods as well as determine the actual levels of security that they provide. We propose an automated dataset collection pipeline that extracts a lip motion authentication dataset from collections of videos. This dataset collection pipeline will enable the collection of large-scale datasets for this problem thus advancing the capability of lip motion authentication systems.
Identifying the source of a video recording created by a camera or smartphone has been a common and challenging task in media forensics for many years. We present an approach for source identification on the very common MP4 file format. In extension to related works, we propose to consider the suitability of attribute field values and their respective order in the atom/box tree in a specific manner. The significance of a field attribute and its particular value for source identification will be reflected by means of up and down weighting during the training and the matching process. Experimental result indicate that our approach allows distinguishing major brands. Even device identification is possible for a subset of our training data.
This paper describes how watermarking technology can be used to prevent the proliferation of Deepfake news. In the proposed system, digital watermarks are embedded in the audio and video tracks of video clips of trusted news agencies at the time the videos are captured or before they are distributed. The watermarks are detected at the social media network’s portals, nodes, and back ends. The embedded watermark imparts a unique identifier to the video, that links it to a blockchain. The watermarks also allow video source tracking, integrity verification, and alteration localization. The watermark detectors can be standalone software applications, or they can be integrated with other applications. They are used to perform three main tasks: (1) they alert the internet user when he watches an inauthentic news video, so that he may discard it, (2) they prevent a Deepfake news video from propagating through the network (3) they perform forensic analysis to help track and remove Deepfake news video postings. The paper includes Proof-of- Concept simulation results.