Passive detection of copy-paste forgery between JPEG images

Xiang-hua Li , Yu-qian Zhao , Miao Liao , F. Y. Shih , Y. Q. Shi

Journal of Central South University ›› 2012, Vol. 19 ›› Issue (10) : 2839 -2851.

PDF
Journal of Central South University ›› 2012, Vol. 19 ›› Issue (10) : 2839 -2851. DOI: 10.1007/s11771-012-1350-5
Article

Passive detection of copy-paste forgery between JPEG images

Author information +
History +
PDF

Abstract

A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed. Two copy-paste tampering scenarios were introduced at first: the tampered image was saved in an uncompressed format or in a JPEG compressed format. Then the proposed detection method was analyzed and simulated for all the cases of the two tampering scenarios. The tampered region is detected by computing the averaged sum of absolute difference (ASAD) images between the examined image and a resaved JPEG compressed image at different quality factors. The experimental results show the advantages of the proposed method: capability of detecting small and/or multiple tampered regions, simple computation, and hence fast speed in processing.

Keywords

image forensic / JPEG compression / copy-paste forgery / passive detection / tampered image / compressed image

Cite this article

Download citation ▾
Xiang-hua Li, Yu-qian Zhao, Miao Liao, F. Y. Shih, Y. Q. Shi. Passive detection of copy-paste forgery between JPEG images. Journal of Central South University, 2012, 19(10): 2839-2851 DOI:10.1007/s11771-012-1350-5

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

MahdianB., SaicS.. A bibliography on blind methods for identifying image forgery [J]. Signal Processing: Image Communication, 2010, 25(6): 389-399

[2]

ChamlawiR., KhanA.. Digital image authentication and recovery: Employing integer transform based information embedding and extraction [J]. Information Sciences, 2010, 180(24): 4909-4928

[3]

MahdianB., SaicS.. Using noise inconsistencies for blind image forensics [J]. Image and Vision Computing, 2009, 27(10): 1497-1503

[4]

FaridH.. A survey of image forgery detection [J]. IEEE Signal Processing Magazine, 2009, 26(2): 16-25

[5]

CAO Hong, KOT A C. Detection of tampering inconsistencies on mobile photos [C]// 9th International Workshop on Digital Water-marking, Seoul. Korea, 2010: 1–11.

[6]

LiW.-h., YuanY., YuN.-hai.. Passive detection of doctored JPEG image via block artifact grid extraction [J]. Signal Processing, 2009, 89(9): 1821-1829

[7]

LUO Wei-qi, QU Zhen-hua, HUANG Ji-wu, QIU Guo-ping. A novel method for detecting cropped and recompressed image block [C]// IEEE International Conference on Acoustics, Speech and Signal Processing. Honolulu, Hawaii, USA, 2007: II-217–II-220.

[8]

BARNI M, COSTANZO A, SABATINI L. Identification of cut & paste tampering by means of double-JPEG detection and image segmentation [C]// Proceedings of 2010 IEEE International Symposium on Circuits and Systems. Paris, France, 2010: 1687–1690.

[9]

YE Shui-ming, SUN Qi-bin, CHANG Ee-Chien. Detecting digital image forgeries by measuring inconsistencies of blocking artifact [C]// IEEE International Conference on Multimedia and Expo. Beijing, China, 2007: 12–15.

[10]

FuD.-d., ShiY. Q., SuWei.. A generalized Benford’s law for JPEG coefficients and its applications in image forensics [C]. Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents IX. San Jose, USA, 2007, 6505: 1L1-1L11

[11]

LinZ.-c., HeJ.-f., TangX.-o., TangC.-Keung.. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis [J]. Pattern Recognition, 2009, 42(11): 2492-2501

[12]

FRIDRICH J, SOUKAL D, LUKÁŠ J. Detection of copy-move forgery in digital images [C]// Proceedings of Digital Forensic Research Workshop. Cleveland, OH, USA, 2004.

[13]

MahdianB., SaicS.. Detection of copy-move forgery using a method based on blur moment invariants [J]. Forensic Science International, 2007, 171(2): 180-189

[14]

ShihF. Y., YuanYuan.. A comparison study on copy-cover image forgery detection [J]. The Open Artificial Intelligence Journal, 2010, 4: 49-54

[15]

BAYRAM S, SENCAR H T, MEMON N. An efficient and robust method for detecting copy-move forgery [C]// IEEE International Conference Acoustics, Speech and Signal Processing. Taipei, Taiwan, 2009: 1053–1056.

[16]

HuangY.-p., LuW., SunW., LongD.-yang.. Improved DCT-based detection of copy-move forgery in images [J]. Forensic Science International, 2011, 206(1/2/3): 178-184

[17]

LuoW.-q., HuangJ.-w., QiuG.-ping.. JPEG error analysis and its applications to digital image forensics [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3): 480-491

[18]

WangW., DongJ., TanT.-niu.. Tampered region localization of digital color images based on JPEG compression noise [J]. Lecture Notes in Computer Science, 2011, 6526: 121-135

[19]

JohnsonM. K., FaridH.. Exposing digital forgeries in complex lighting environments [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 450-461

[20]

FaridH.. Exposing digital forgeries from JPEG ghosts [J]. IEEE Transactions on Information Forensics and Security, 2009, 4(1): 154-160

[21]

PopescuA. C., FaridH.. Exposing digital forgeries by detecting traces of resampling [J]. IEEE Transactions on Signal Processing, 2005, 53(2): 758-767

[22]

LUKAS J, FRIDRICH J. Estimation of primary quantization matrix in double compressed JPEG images [C]// Proceedings of Digital Forensic Research Workshop. Cleveland, OH, USA, 2003: 5–8.

[23]

LI Bin, SHI Y Q, HUANG Ji-wu. Detecting doubly compressed JPEG images by using mode based first digit features [C]// IEEE International Workshop on Multimedia Signal Processing. Queensland, Australia, 2008: 730–735.

[24]

PopescuA. C.Statistical tools for digital image forensics [D], 2005New HampshireDartmouth College, USA

[25]

OLMOS A, KINGDOM F A. McGill Calibrated Colour Image Database. http://tabby.vision.mcgill.ca, 2004.

[26]

SchaeferG., StichM.UCID — An uncompressed colour image database [R]. Technical Report, School of Computing and Mathematics, 2003U.K.Nottingham Trent University

AI Summary AI Mindmap
PDF

119

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/