{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T15:54:03Z","timestamp":1770393243569,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:00:00Z","timestamp":1729641600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:00:00Z","timestamp":1729641600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"crossref","award":["HR00112090136"],"award-info":[{"award-number":["HR00112090136"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The forensic analysis of digital videos is becoming increasingly relevant to deal with forensic cases, propaganda, and fake news. The research community has developed numerous forensic tools to address various challenges, such as integrity verification, manipulation detection, and source characterization. Each tool exploits characteristic traces to reconstruct the video life-cycle. Among these traces, a significant source of information is provided by the specific way in which the video has been encoded. While several tools are available to analyze codec-related information for images, a similar approach has been overlooked for videos, since video codecs are extremely complex and involve the analysis of a huge amount of data. In this paper, we present a new tool designed for extracting and parsing a plethora of video compression information from H.264 encoded files, including macroblocks structure, prediction residuals, and motion vectors. We demonstrate how the extracted features can be effectively exploited to address various forensic tasks, such as social network identification, source characterization, and double compression detection. We provide a detailed description of the developed software, which is released free of charge to enable its use by the research community to create new tools for forensic analysis of video files.<\/jats:p>","DOI":"10.1186\/s13635-024-00181-4","type":"journal-article","created":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T12:02:54Z","timestamp":1729684974000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["CoFFEE: a codec-based forensic feature extraction and evaluation software for H.264 videos"],"prefix":"10.1186","volume":"2024","author":[{"given":"Giulia","family":"Bertazzini","sequence":"first","affiliation":[]},{"given":"Daniele","family":"Baracchi","sequence":"additional","affiliation":[]},{"given":"Dasara","family":"Shullani","sequence":"additional","affiliation":[]},{"given":"Massimo","family":"Iuliani","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Piva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,23]]},"reference":[{"key":"181_CR1","doi-asserted-by":"publisher","unstructured":"S.S. Sundar, M.D. Molina, E.\u00a0Cho, Seeing is believing: Is video modality more powerful in spreading fake news via online messaging apps? J. Comput.-Mediated Commun. 26(6), 301\u2013319 (2021). https:\/\/doi.org\/10.1093\/jcmc\/zmab010","DOI":"10.1093\/jcmc\/zmab010"},{"key":"181_CR2","first-page":"7","volume-title":"Media Forensics in the Age of Disinformation","author":"J Hendrix","year":"2022","unstructured":"J. Hendrix, D. Morozoff, Media Forensics in the Age of Disinformation (Springer, Singapore, 2022), pp.7\u201340"},{"key":"181_CR3","doi-asserted-by":"publisher","unstructured":"B. Mahdian, S. Saic, Using noise inconsistencies for blind image forensics. Image Vis. Comput. 27(10), 1497\u20131503 (2009). https:\/\/doi.org\/10.1016\/j.imavis.2009.02.001. Special Section: Computer Vision Methods for Ambient Intelligence","DOI":"10.1016\/j.imavis.2009.02.001"},{"issue":"1","key":"181_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.imavis.2012.09.002","volume":"31","author":"IC Chang","year":"2013","unstructured":"I.C. Chang, J.C. Yu, C.C. Chang, A forgery detection algorithm for exemplar-based inpainting images using multi-region relation. Image Vis. Comput. 31(1), 57\u201371 (2013). https:\/\/doi.org\/10.1016\/j.imavis.2012.09.002","journal-title":"Image Vis. Comput."},{"issue":"5","key":"181_CR5","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L Verdoliva","year":"2020","unstructured":"L. Verdoliva, Media forensics and deepfakes: An overview. IEEE J. Sel. Top. Signal Process. 14(5), 910\u2013932 (2020). https:\/\/doi.org\/10.1109\/JSTSP.2020.3002101","journal-title":"IEEE J. Sel. Top. Signal Process."},{"issue":"3","key":"181_CR6","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"T. Bianchi, A. Piva, Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans. Inf. Forensic Secur. 7(3), 1003\u20131017 (2012)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"181_CR7","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.jvcir.2017.09.003","volume":"49","author":"M Barni","year":"2017","unstructured":"M. Barni, L. Bondi, N. Bonettini, P. Bestagini, A. Costanzo, M. Maggini, B. Tondi, S. Tubaro, Aligned and non-aligned double jpeg detection using convolutional neural networks. J. Vis. Commun. Image Represent. 49, 153\u2013163 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"181_CR8","doi-asserted-by":"crossref","unstructured":"B.\u00a0Lorch, C.\u00a0Riess, in Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Image forensics from chroma subsampling of high-quality JPEG images (Association for Computing Machinery,\u00a0New York, 2019), pp. 101\u2013106","DOI":"10.1145\/3335203.3335722"},{"key":"181_CR9","doi-asserted-by":"publisher","first-page":"S68","DOI":"10.1016\/j.diin.2019.01.016","volume":"28","author":"P Mullan","year":"2019","unstructured":"P. Mullan, C. Riess, F. Freiling, Forensic source identification using JPEG image headers: the case of smartphones. Digit. Investig. 28, S68\u2013S76 (2019)","journal-title":"Digit. Investig."},{"key":"181_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3253389","volume-title":"Multi-clue reconstruction of sharing chains for social media images","author":"S Verde","year":"2023","unstructured":"S. Verde, C. Pasquini, F. Lago, A. Goller, F. De Natale, A. Piva, G. Boato, Multi-clue reconstruction of sharing chains for social media images (IEEE Trans, Multimed, 2023)"},{"key":"181_CR11","unstructured":"I. Adventure. Jpegsnoop (2017). https:\/\/github.com\/ImpulseAdventure\/JPEGsnoop. Accessed 22 Oct 2024"},{"key":"181_CR12","unstructured":"P.\u00a0Sallee. Jpeg toolbox (2003). https:\/\/digitnet.github.io\/jpeg-toolbox\/. Accessed 22 Oct 2024"},{"key":"181_CR13","unstructured":"Amped Software. Authenticate (2024). https:\/\/ampedsoftware.com\/authenticate. Accessed 22 Oct 2024"},{"issue":"3","key":"181_CR14","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/TIFS.2018.2859760","volume":"14","author":"M Iuliani","year":"2019","unstructured":"M. Iuliani, D. Shullani, M. Fontani, S. Meucci, A. Piva, A video forensic framework for the unsupervised analysis of MP4-like file container. IEEE Trans. Inf. Forensic Secur. 14(3), 635\u2013645 (2019). https:\/\/doi.org\/10.1109\/TIFS.2018.2859760","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"5","key":"181_CR15","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/JSTSP.2020.3008088","volume":"14","author":"P Yang","year":"2020","unstructured":"P. Yang, D. Baracchi, M. Iuliani, D. Shullani, R. Ni, Y. Zhao, A. Piva, Efficient video integrity analysis through container characterization. IEEE J. Sel. Top. Signal Process. 14(5), 947\u2013954 (2020)","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"181_CR16","doi-asserted-by":"publisher","first-page":"3211","DOI":"10.1109\/TIFS.2022.3204210","volume":"17","author":"E Altinisik","year":"2022","unstructured":"E. Altinisik, H.T. Sencar, D. Tabaa, Video source characterization using encoding and encapsulation characteristics. IEEE Trans. Inf. Forensic Secur. 17, 3211\u20133224 (2022)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"181_CR17","doi-asserted-by":"crossref","unstructured":"Z.\u00a0Xiang, A.K.S. Yadav, P.\u00a0Bestagini, S.\u00a0Tubaro, E.J. Delp, in Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, MTN: Forensic analysis of MP4 video files using graph neural networks (IEEE, 2023), pp. 963\u2013972","DOI":"10.1109\/CVPRW59228.2023.00103"},{"key":"181_CR18","doi-asserted-by":"publisher","unstructured":"Z.\u00a0Xiang, J.\u00a0Horvath, S.\u00a0Baireddy, P.\u00a0Bestagini, S.\u00a0Tubaro, E.\u00a0Delp, Forensic analysis of video files using metadata (2021), pp. 1042\u20131051. https:\/\/doi.org\/10.1109\/CVPRW53098.2021.00115","DOI":"10.1109\/CVPRW53098.2021.00115"},{"key":"181_CR19","doi-asserted-by":"publisher","unstructured":"R.\u00a0Ramos L\u00f3pez, A.L. Sandoval Orozco, L.J. Garc\u00eda Villalba, Compression effects and scene details on the source camera identification of digital videos. Expert Syst. Appl. 170, 114515 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2020.114515","DOI":"10.1016\/j.eswa.2020.114515"},{"key":"181_CR20","unstructured":"A.M. Tourapis, A.\u00a0Leontaris, K.\u00a0S\u00fchring, G.\u00a0Sullivan. H.264\/14496-10 AVC reference software manual (2009). https:\/\/iphome.hhi.de\/suehring\/tml\/JM. Reference Software Manual (JVT-AE010).pdf Accessed 22 Oct 2024"},{"key":"181_CR21","unstructured":"Elecard. Streameye (2024). https:\/\/www.elecard.com\/software. Accessed 22 Oct 2024"},{"key":"181_CR22","unstructured":"VicueSoft. VQ Analyzer (2024). https:\/\/vicuesoft.com\/vq-analyzer. Accessed 22 Oct 2024"},{"key":"181_CR23","unstructured":"Jongbel Media Solutions. AVC\/H.264 Video ES Viewer (2024). https:\/\/www.jongbel.com\/manual-analysis\/h-264-video-es-viewer. Accessed 22 Oct 2024"},{"key":"181_CR24","unstructured":"L.\u00a0Xiaohua. VideoEye (2014). https:\/\/sourceforge.net\/projects\/videoeye. Accessed 22 Oct 2024"},{"key":"181_CR25","unstructured":"Codecian. CodecVisa (2017). https:\/\/codecian.com\/. Accessed 22 Oct 2024"},{"key":"181_CR26","doi-asserted-by":"publisher","unstructured":"B.\u00a0Blair, W.\u00a0Kallander, D.\u00a0Poland, U.N.N.S. Administration. Trestles, version 1.0 (2023). https:\/\/doi.org\/10.11578\/dc.20230207.3","DOI":"10.11578\/dc.20230207.3"},{"key":"181_CR27","doi-asserted-by":"crossref","unstructured":"I.E. Richardson, The H.264 Advanced Video Compression Standard (Wiley, 2003)","DOI":"10.1002\/0470869615"},{"key":"181_CR28","unstructured":"Video Quality Experts Group. Modified JM H.264\/AVC codec (2018). https:\/\/vqeg.github.io\/software-tools\/encoding\/modified-avc-codec\/. Accessed 2021-12-30"},{"issue":"2","key":"181_CR29","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MCSE.2010.118","volume":"13","author":"S Behnel","year":"2011","unstructured":"S. Behnel, R. Bradshaw, C. Citro, L. Dalcin, D. Seljebotn, K. Smith, Cython: The best of both worlds. Comput. Sci. Eng. 13(2), 31\u201339 (2011). https:\/\/doi.org\/10.1109\/MCSE.2010.118","journal-title":"Comput. Sci. Eng."},{"key":"181_CR30","unstructured":"ITU-T recommendation and final draft international standard of joint video specification (ITU-T Rec. H.264\/ISO\/IEC 14 496-10 AVC,\u201d in Joint Video Team (JVT) of ISO\/IEC MPEG and ITU-T VCEG, JVTG050 (2003)"},{"key":"181_CR31","doi-asserted-by":"crossref","unstructured":"I.\u00a0Amerini, A.\u00a0Anagnostopoulos, L.\u00a0Maiano, L.R. Celsi, in ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Learning double-compression video fingerprints left from social-media platforms (IEEE, 2021), pp. 2530\u20132534","DOI":"10.1109\/ICASSP39728.2021.9413366"},{"key":"181_CR32","doi-asserted-by":"crossref","unstructured":"L.\u00a0Maiano, I.\u00a0Amerini, L.\u00a0Ricciardi\u00a0Celsi, A.\u00a0Anagnostopoulos, Identification of social-media platform of videos through the use of shared features. J. Imaging. 7(8), 140 (2021)","DOI":"10.3390\/jimaging7080140"},{"key":"181_CR33","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1109\/LSP.2022.3167631","volume":"29","author":"D Shullani","year":"2022","unstructured":"D. Shullani, D. Baracchi, M. Iuliani, A. Piva, Social network identification of laundered videos based on DCT coefficient analysis. IEEE Signal Process. Lett. 29, 1112\u20131116 (2022)","journal-title":"IEEE Signal Process. Lett."},{"key":"181_CR34","doi-asserted-by":"publisher","unstructured":"G.\u00a0Bertazzini, D.\u00a0Baracchi, D.\u00a0Shullani, M.\u00a0Iuliani, A.\u00a0Piva, in ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), A codec-based approach for video life-cycle characterization in social networks (2024), pp. 4790\u20134794. https:\/\/doi.org\/10.1109\/ICASSP48485.2024.10447289","DOI":"10.1109\/ICASSP48485.2024.10447289"},{"key":"181_CR35","doi-asserted-by":"crossref","unstructured":"A.\u00a0Gemelli, D.\u00a0Shullani, D.\u00a0Baracchi, S.\u00a0Marinai, A.\u00a0Piva, in ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Structure matters: Analyzing videos via graph neural networks for social media platform attribution (IEEE, 2024), pp. 4735\u20134739","DOI":"10.1109\/ICASSP48485.2024.10447089"},{"key":"181_CR36","doi-asserted-by":"publisher","first-page":"76937","DOI":"10.1109\/ACCESS.2019.2922145","volume":"7","author":"BC Hosler","year":"2019","unstructured":"B.C. Hosler, X. Zhao, O. Mayer, C. Chen, J.A. Shackleford, M.C. Stamm, The video authentication and camera identification database: A new database for video forensics. IEEE Access. 7, 76937\u201376948 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2922145","journal-title":"IEEE Access."},{"key":"181_CR37","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.patrec.2020.10.010","volume":"140","author":"S Taspinar","year":"2020","unstructured":"S. Taspinar, M. Mohanty, N. Memon, Camera identification of multi-format devices. Pattern Recogn. Lett. 140, 288\u2013294 (2020). https:\/\/doi.org\/10.1016\/j.patrec.2020.10.010","journal-title":"Pattern Recogn. Lett."},{"key":"181_CR38","doi-asserted-by":"crossref","unstructured":"D.\u00a0Baracchi, D.\u00a0Shullani, M.\u00a0Iuliani, A.\u00a0Piva, Floreview: An image and video dataset for forensic analysis. IEEE Access. 11,\u00a0109267\u2013109282 (2023)","DOI":"10.1109\/ACCESS.2023.3321991"},{"key":"181_CR39","doi-asserted-by":"crossref","unstructured":"D.\u00a0Vazquez-Padin, M.\u00a0Fontani, T.\u00a0Bianchi, P.\u00a0Comesa\u00f1a, A.\u00a0Piva, M.\u00a0Barni, in 2012 IEEE International Workshop on Information Forensics and Security (WIFS), Detection of video double encoding with GOP size estimation (IEEE, 2012), pp. 151\u2013156","DOI":"10.1109\/WIFS.2012.6412641"},{"key":"181_CR40","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1109\/TIFS.2019.2951313","volume":"15","author":"D V\u00e1zquez-Pad\u00edn","year":"2019","unstructured":"D. V\u00e1zquez-Pad\u00edn, M. Fontani, D. Shullani, F. P\u00e9rez-Gonz\u00e1lez, A. Piva, M. Barni, Video integrity verification and GOP size estimation via generalized variation of prediction footprint. IEEE Trans. Inf. Forensic Secur. 15, 1815\u20131830 (2019)","journal-title":"IEEE Trans. Inf. Forensic Secur."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-024-00181-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13635-024-00181-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-024-00181-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T12:04:55Z","timestamp":1729685095000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-024-00181-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,23]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["181"],"URL":"https:\/\/doi.org\/10.1186\/s13635-024-00181-4","relation":{},"ISSN":["2510-523X"],"issn-type":[{"value":"2510-523X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,23]]},"assertion":[{"value":"15 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"34"}}