期刊文献+

Passive detection of copy-paste forgery between JPEG images 被引量:5

Passive detection of copy-paste forgery between JPEG images
下载PDF
导出
摘要 A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed format or in a JPEG compressed format.Then the proposed detection method was analyzed and simulated for all the cases of the two tampering scenarios.The tampered region is detected by computing the averaged sum of absolute difference(ASAD) images between the examined image and a resaved JPEG compressed image at different quality factors.The experimental results show the advantages of the proposed method:capability of detecting small and/or multiple tampered regions,simple computation,and hence fast speed in processing. A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed, Two copy-paste tampering scenarios were introduced at first: the tampered image was saved in an uncompressed format or in a JPEG compressed format. Then the proposed detection method was analyzed and simulated for all the cases of the two tampering scenarios, The tampered region is detected by computing the averaged sum of absolute difference (ASAD) images between the examined image and a resaved JPEG compressed image at different quality factors. The experimental results show the advantages of the proposed method: capability of detecting small and/or multiple tampered regions, simple computation, and hence fast speed in processing.
出处 《Journal of Central South University》 SCIE EI CAS 2012年第10期2839-2851,共13页 中南大学学报(英文版)
基金 Project(61172184) supported by the National Natural Science Foundation of China Project(200902482) supported by China Postdoctoral Science Foundation Specially Funded Project Project(12JJ6062) supported by the Natural Science Foundation of Hunan Province,China
关键词 image forensic JPEG compression copy-paste tbrgery passive detection tampered image compressed image JPEG图像 检测能力 复制 粘贴 伪造 JPEG压缩 压缩格式 平均绝对差
  • 相关文献

参考文献26

  • 1MAHDIAN B, SAIC S. A bibliography on blind methods fbr identifying image forgery [J]. Signal Processing: Image Communication, 2010, 25(6): 389 399.
  • 2CHAMLAW1 R, KHAN A. Digital image authentication and recovery: Employing integer transform based information embedding and extraction [J]. information Sciences, 2010, 180(24): 4909-4928.
  • 3MAHDIAN B, SAIC S. Using noise inconsistencies for blind image forensics [J]. Image and Vision Computing, 2009, 27(10): 1497-1503.
  • 4FARID H. A survey of image forgery detection [J]. IEEE Signal Processing Magazine, 2009, 26(2): 16-15.
  • 5CAO Hong, KOT A C. Detection of tampering inconsistencies on mobile photos [C]// 9th International Workshop on Digital Water- marking, Seoul. Korea, 2010: 1-11.
  • 6LI Wei-hai, YUAN Yuan, YU Neng-hai. Passive detection of doctored JPEG image via block artifact grid extraction [J]. Signal Processing, 2009, 89(9): 1821-1829.
  • 7LUO Wei-qi, QU Zhen-hua, HUANG Ji-wu, QIU Guo-ping. A novel method for detecting cropped and recompressed image block [C]// IEEE International Conference on Acoustics, Speech and Signal Processing. Honolulu, Hawaii, USA, 2007: II-217- II-220.
  • 8BARNI M, COSTANZO A, SABATINI L. Identification of cut & paste tampering by means of double-JPEG detection and image segmentation [C]// Proceedings of 2010 IEEE International Symposium on Circuits and Systems. Paris, France, 2010:1687- 1690.
  • 9YE Shui-ming, SUN Qi-bin, CHANG Ee-Chien. Detecting digital image forgeries by measuring inconsistencies of blocking artifact [C]// IEEE International Conference on Multimedia and Expo. Beijing, China, 2007: 12-15.
  • 10FU Dong-dong, SHI Y Q, SU Wei. A generalized Benford's law for JPEG coefficients and its applications in image forensics [C]// Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents IX. San Jose, USA, 2007, 6505: 1LI-ILll.

同被引文献66

  • 1KEE E, JOHSON M, FARID H. Digital image authentication from JPEG headers [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 393-402.
  • 2KANG X, LI Y, QU Z, HUANG J. Enhancing source camera identification performance with a camera reference phase sensor pattern noise [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 393-402.
  • 3MAHALAKSHMI D S, VIJAVALAKSHMI K, PR/YADHARSINI S. Digital image forgery detection and estimation by exploring basic image manipulations [J]. Digital Investigation, 2012, 8(3/4): 215-225.
  • 4AMERINI I, BALLAN L, CALDELLI R, BIMBO A D, TONGO L D, SERRA G. Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J]. Signal Processing: Image Communication, 2013, 28(6): 659-669.
  • 5KAKAR P, SUDHA N. Exposing post processed copy-paste forgeries through transform-invariant features [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 1018-1028.
  • 6LYNCH G, SHIH F Y, LIAO H Y M. An efficient expanding block algorithm for image copy-move forgery detection [J]. Information Sciences, 2013, 239: 253-265.
  • 7LI Yue-nan. Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching [J]. Forensic Science International, 2013, 224(1/3): 59-67.
  • 8HUANG Yah-ping, LU Wei, SUN Wei, LONG Ding-yang. Improved DCT-based detection of copy-move forgery in images [J]. Forensic Science International, 2011, 206(1/3): 178-184.
  • 9FRIDRICH J, SOUKAL D, LUKAS J. Detection of copy-move forgery in digital images [C]// Proceedings of Digital Forensic Research Workshop. Cleveland, OH, USA, 2003: 55-61.
  • 10POPESCU A C, FAR/D H. Exposing digital forgeries by detecting duplicated image regions [R]. Technical Report, TR2004-515, 2004.

引证文献5

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部