home home Staff Contact
Forensic Protection - Services Forensic Protection - Rates Forensic Protection - FP_System Forensic Protection - Feedback
VELA

PROBLEM: Video content manipulation is extremely difficult to detect.

SOLUTION: Video Error Level Analysis (VELA)

VELA can definitively identify and document video cropping and the addition, removal, relocation or alteration of an object, weapon, person, vehicle or text. Since VELA software is virtually non-existent, I will share my free open-source software solution. First, let me explain how VELA works.

With rare exception, video compression is lossy and thus creates an imperfect copy of the original video data. Each time a video is resaved, additional video quality losses occur, even in the absence of any editing or alterations. Furthermore, since most video CoDecs compress utilizing data from adjacent frames, and within pixel blocks, video cropping will disproportionably affect perimeter pixels.

Modern CoDec compression causes quantization data errors, often seen as visual artifacts, as the data extremes are suppressed to reduce the overall video file size. Each subsequent compression reduces the variance extremes between adjacent, and blocks of, pixels by a lesser amount. After a nearly infinite number of compressions, the minimal error level will be reached and the video may appear as a homogeneous blur.

If an object is added to, or relocated in, an already compressed video, it will be at the earlier stages of this process. As such, when the altered video is compressed again, any recent viewable alterations will incur larger changes in quantization data errors than the remainder of the video content. This can be visually represented by subtracting a re-compressed video from the version that you began with. The resulting video will appear black with areas of brightness (luminosity) indicating the differences in error levels between both videos.

Boundaries of high contrast (e.g. a bright pixel adjacent to a dark pixel) will have higher VELA values and thus appear relatively brighter. Points of video alteration will be depicted as pixels which are brighter than their relative contrast would suggest. If a video has been cropped to reduce the field of view, the altered perimeter edges will appear abnormally bright. These are the suspected points of manipulation.

If the points of manipulation are colored differently than the underlying objects, this information can aid in fingerprinting the software that was used to alter the video. Additional clues can be deduced from analyzing the video’s visual consistency (reflections, clarity, shadows, etc…), metadata and chain of custody. Principal Component Analysis (PCA), Discrete Cosine Transform (DCT), and Wavelet analysis can further identify the exact points of manipulation. My prior writings address many of these complimentary topics.

Required tools to replicate our results:    (or use VideoCleaner for a simple and free VELA method)

VirtualDub Free open-source non-linear video editor
AVIsynth Free open-source scripting interface for VirtualDub (remember to associate VirtualDub)
XVID Free h.263 video CoDec

1. Install VirtualDub, AVISynth and the XVID CoDec.
2. Run VirtualDub and open (under the FILE menu) the video named "BEFORE.avi".
    The altered object is a 4th logo moving from the upper left corner until it disappears in the lower right.
3. Under the VIDEO menu, set compression to XVID (use the "configure" button to set quantizer to 8)
4. Use the Save command (under the FILE menu) to save this video with the name "AFTER.avi".
5. Create a new text file named “TEST.avs” with the following text:
 BEFORE=directshowsource("BEFORE.avi")
 AFTER=directshowsource("AFTER.avi")
 Overlay(BEFORE,AFTER,mode="Subtract")
 Levels(0,5,100,0,255)
 stackhorizontal(BEFORE,last)
6. Right click to open "TEST.avs" with VirtualDub, and then save the resulting video as "RESULTS.avi”.

The files described above:

BEFORE.avi Test video depicting 3 moving logos with a 4th as the video tamper event
AFTER.avi The test video recompressed using XVID (quantizer set to 8)
TEST.avs The complete testing script
RESULTS.avi The "BEFORE" and VELA results synchronized in a side-by-side view. Available On-line

As the RESULTS video plays, the VELA value of the added (aka manipulated) fourth company logo will nearly always be larger, and thus appear brighter, than the original three logos. By comparison, detecting video tampering through a visual inspection would be nearly impossible, especially when the depicted objects are of varying size, color or brightness.

NOTE: The resulting VELA view of the original three moving logos will briefly become brighter as they overlap the altered logo. This is a side effect of the CoDec’s predictive frames algorithm, and this issue was intentionally encouraged to demonstrate the power of VELA, even under worse-case scenarios.

I invite you to try VELA on your own videos. If you rename your video to "BEFORE.avi", the above steps will work without any modifications. For a printer friendly version, download the VELA technical notes abstract. If you would like a more in depth VELA description, I would suggest the peer review version HERE.

If you would like a free hands-on training workshop, recommend me and this topic to the educational committee of any national group that you belong to. Upcoming training dates are listed in my CV.

The above work is the original creation and intellectual property of Doug Carner, president of Forensic Protection, Inc. with special thanks to Dr. Neal Krawetz at the 2007 Black Hat conference.

UPDATE June 5th, 2013, Dr. Neal Krawetz commented that {down sampled videos are a "resave" and can obscure the ability to detect modifications. For example, if a video uploaded to Youtube gets resaved at a very low quality it is unlikely to have detectable modifications under VELA.} 

UPDATE February 25th, 2017, As of 2016, VELA and DCT tests (along with additional authentication-tamper detection tools) are now built into VideoCleaner, a free open-source forensic enhancement and authentication application.  Thus eliminating the need for the user to write code or understand programming to detect and document video tampering or image tampering.

Copyright © Forensic Protection
QuickLinks | Main page | Case study | Media | FAQs | Contact us