{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T09:33:11Z","timestamp":1772789591843,"version":"3.50.1"},"reference-count":36,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Research Grant of Kwangwoon University","award":["2020-0-00011"],"award-info":[{"award-number":["2020-0-00011"]}]},{"name":"Institute of Information &amp; communications Technology Planning &amp; Evaluation (IITP)","award":["2020-0-00011"],"award-info":[{"award-number":["2020-0-00011"]}]},{"name":"Korean government (MSIT)","award":["2020-0-00011"],"award-info":[{"award-number":["2020-0-00011"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In digital forensics, video becomes important evidence in an accident or a crime. However, video editing programs are easily available in the market, and even non-experts can delete or modify a section of an evidence video that contains adverse evidence. The tampered video is compressed again and stored. Therefore, detecting a double-compressed video is one of the important methods in the field of digital video tampering detection. In this paper, we present a new approach to detecting a double-compressed video using the proposed descriptors of video encoders. The implementation of real-time video encoders is so complex that manufacturers should develop hardware video encoders considering a trade-off between complexity and performance. According to our observation, hardware video encoders practically do not use all possible encoding modes defined in the video coding standard but only a subset of the encoding modes. The proposed method defines this subset of encoding modes as the descriptor of the video encoder. If a video is double-compressed, the descriptor of the double-compressed video is changed to the descriptor of the video encoder used for double-compression. Therefore, the proposed method detects the double-compressed video by checking whether the descriptor of the test video is changed or not. In our experiments, we show descriptors of various H.264 and High-Efficiency Video Coding (HEVC) video encoders and demonstrate that our proposed method successfully detects double-compressed videos in most cases.<\/jats:p>","DOI":"10.3390\/s22239291","type":"journal-article","created":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T07:38:50Z","timestamp":1669793930000},"page":"9291","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detection of Double-Compressed Videos Using Descriptors of Video Encoders"],"prefix":"10.3390","volume":"22","author":[{"given":"Yun Gu","family":"Lee","sequence":"first","affiliation":[{"name":"School of Software, Kwangwoon University, Seoul 01897, Republic of Korea"}]},{"given":"Gihyun","family":"Na","sequence":"additional","affiliation":[{"name":"Digital Analysis Division, National Forensic Service, Gangwondo 26460, Republic of Korea"}]},{"given":"Junseok","family":"Byun","sequence":"additional","affiliation":[{"name":"Digital Analysis Division, National Forensic Service, Gangwondo 26460, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2022,11,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Poisel, R., and Tjoa, S. (2011, January 10\u201312). Forensics investigations of multimedia data: A review of the state-of-the-art. Proceedings of the 2011 Sixth International Conference on IT Security Incident Management and IT Forensics, Stuttgart, Germany.","DOI":"10.1109\/IMF.2011.14"},{"key":"ref_2","first-page":"325","article-title":"Overview of state-of-the-art in digital image forensics","volume":"3","author":"Sencar","year":"2008","journal-title":"Algorithms Archit. Inf. Syst. Secur."},{"key":"ref_3","first-page":"1","article-title":"An Examination of Digital Forensic Models","volume":"1","author":"Reith","year":"2002","journal-title":"Int. J. Digit. Evid."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"S64","DOI":"10.1016\/j.diin.2010.05.009","article-title":"Digital forensics research: The next 10 years","volume":"7","author":"Simson","year":"2010","journal-title":"Digit. Investig."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MSP.2008.931089","article-title":"Digital forensics","volume":"26","author":"Delp","year":"2009","journal-title":"IEEE Signal Process."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Sencar, H.T., and Memon, N. (2008). Overview of State-of-the-Art in Digital Image Forensics. Part of Indian Statistical Institute Platinum Jubilee Monograph Series Titled Statistical Science and Interdisciplinary Research, World Scientific Press.","DOI":"10.1142\/9789812836243_0015"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"496701","DOI":"10.1155\/2013\/496701","article-title":"An overview on image forensics","volume":"2013","author":"Piva","year":"2013","journal-title":"ISRN Signal Process."},{"key":"ref_8","unstructured":"Chen, W., and Shi, Y.Q. (2008, January 10\u201312). Detection of double mpeg compression based on first digit statistics. Proceedings of the 2008 International Workshop on Digital Watermarking, Busan, Republic of Korea."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.diin.2016.06.003","article-title":"Digital video tampering detection: An overview of passive techniques","volume":"18","author":"Sitara","year":"2016","journal-title":"Digit. Investig."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, S., and Bian, S. (2014, January 5\u20138). Detecting frame deletion in H.264 video. Proceedings of the International Conference on Information Security Practice and Experience, Fuzhou, China.","DOI":"10.1007\/978-3-319-06320-1_20"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Feng, C., Xu, Z., Zhang, W., and Xu, Y. (2014, January 11\u201313). Automatic location of frame deletion point for digital video forensics. Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, Salzburg, Austria.","DOI":"10.1145\/2600918.2600923"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.diin.2013.10.004","article-title":"Detection of frame deletion for digital video forensics","volume":"10","author":"Shanableh","year":"2013","journal-title":"Digit. Investig."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"51","DOI":"10.4236\/jcc.2014.24008","article-title":"Video inter-frame forgery identification based on consistency of correlation coefficients of gray values","volume":"2","author":"Wang","year":"2014","journal-title":"J. Comput. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2138","DOI":"10.1109\/TCSVT.2015.2473436","article-title":"Automatic detection of object-based forgery in advanced video","volume":"26","author":"Chen","year":"2015","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.diin.2014.03.016","article-title":"A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis","volume":"11","author":"Lin","year":"2014","journal-title":"Digit. Investig."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6641","DOI":"10.1007\/s11042-014-1915-4","article-title":"A video forgery detection algorithm based on compressive sensing","volume":"74","author":"Su","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wang, W., and Farid, H. (2006, January 26\u201327). Exposing digital forgeries in video by detecting double mpeg compression. Proceedings of the 8th Workshop on Multimedia and Security, Geneva, Switzerland.","DOI":"10.1145\/1161366.1161375"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wang, W., and Farid, H. (2009, January 7\u20138). Exposing digital forgeries in video by detecting double quantization. Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, USA.","DOI":"10.1145\/1597817.1597826"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/LSP.2013.2251632","article-title":"Detection of double compression in MPEG-4 videos based on markov statistics","volume":"20","author":"Jiang","year":"2013","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","article-title":"Overview of the H.264\/AVC video coding standard","volume":"13","author":"Wiegand","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1649","DOI":"10.1109\/TCSVT.2012.2221191","article-title":"Overview of the high efficiency video coding (HEVC) standard","volume":"22","author":"Sullivan","year":"2012","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_22","unstructured":"Costanzo, A., and Barni, M. (September, January 29). Detection of double AVC\/HEVC encoding. Proceedings of the 24th European Signal Processing Conference (EUSIPCO), Budapest, Hungary."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Liao, D., Yang, R., Liu, H., Li, J., and Huang, J. (2011, January 22\u201327). Double H.264\/AVC compression detection using quantized nonzero AC coefficients. Proceedings of the SPIE, San Francisco, CA, USA.","DOI":"10.1117\/12.876566"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.jvcir.2015.11.014","article-title":"Double compression detection based on local motion vector field analysis in static-background videos","volume":"35","author":"He","year":"2016","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2298","DOI":"10.1109\/TIP.2016.2541960","article-title":"Codec and GOP identification in double compressed videos","volume":"25","author":"Bestagini","year":"2016","journal-title":"IEEE Trans. Image Process."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/TIFS.2017.2745687","article-title":"Detection of double compression with the same coding parameters based on quality degradation mechanism analysis","volume":"13","author":"Jiang","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2496","DOI":"10.1109\/TCSVT.2021.3069254","article-title":"One-Class Double Compression Detection of Advanced Videos Based on Simple Gaussian Distribution Model","volume":"32","author":"Li","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"4271","DOI":"10.1109\/ACCESS.2022.3140588","article-title":"Statistical H.264 Double Compression Detection Method Based on DCT Coefficients","volume":"10","author":"Mahfoudi","year":"2022","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1109\/TIFS.2022.3176188","article-title":"Motion-Adaptive Detection of HEVC Double Compression with the Same Coding Parameters","volume":"17","author":"Xu","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1109\/TCSVT.2018.2804768","article-title":"A PatchMatch-based dense-field algorithm for video copy\u2013move detection and localization","volume":"29","author":"Cozzolino","year":"2019","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TCSVT.2003.814967","article-title":"264\/AVC baseline profile decoder complexity analysis","volume":"13","author":"Horowitz","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1109\/TCSVT.2012.2221255","article-title":"HEVC complexity and implementation analysis","volume":"22","author":"Bossen","year":"2012","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_33","unstructured":"(2022, October 31). FFmpeg. Available online: https:\/\/ffmpeg.org\/."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3736","DOI":"10.1109\/TCSVT.2021.3101953","article-title":"Overview of the Versatile Video Coding (VVC) Standard and its Applications","volume":"22","author":"Bross","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_35","unstructured":"(2022, October 31). H.264\/AVC Software. Available online: https:\/\/iphome.hhi.de\/suehring\/tml\/download\/."},{"key":"ref_36","unstructured":"(2022, October 31). HEVC HM Reference Software. Available online: https:\/\/vcgit.hhi.fraunhofer.de\/jvet\/HM."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/23\/9291\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:29:09Z","timestamp":1760146149000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/23\/9291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,29]]},"references-count":36,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["s22239291"],"URL":"https:\/\/doi.org\/10.3390\/s22239291","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,29]]}}}