Detection and Localization of Image and Document Forgery: Survey and Benchmarking

Size: px
Start display at page:

Download "Detection and Localization of Image and Document Forgery: Survey and Benchmarking"

Transcription

1 Detection and Localization of Image and Document Forgery: Survey and Benchmarking Anurag Ghosh Dongmian Zou Maneesh Singh Verisk Analytics {anurag.ghosh, dongmian.zou, Abstract Modern technology makes it easier to manipulate images. It is important to detect image forgery effectively since it can be malicious and has severe consequences. Different algorithms have been designed to detect various image tampering operations. In this paper, we summarize some of recently developed algorithms and available databases. We construct a dataset from the available raw images and benchmark the algorithms. Moreover, we conduct preliminary fusion according the output maps of the algorithms. We further train a convolutional neural network classifier using our dataset. The performance on the CNN classifier highly promising and state-of-the-art. 1. Introduction Images can be manipulated in various ways. Different touch-ups and image manipulation techniques are applied to augment or enhance a given image. For instance, mobile applications such as Instagram are very popular where users apply filters to improve the presentation of their images. Furthermore, images are regularly re-sized and recompressed, such that they can be more easily exchanged over the Internet due to the proliferation of cloud-based photo sharing and editing websites like Flickr and Picasa, spurred by the social media applications like WhatsApp, Instagram and Snapchat. These manipulations are typically not recognized as Image Tampering as the intent to manipulate the information content of the images is minimal. However, there exists many instances where nefarious intent is the sole purpose of manipulating images, such as manipulating the dollar amount on receipt images. Figure 1 illustrates an example of a forged image: the left picture is a manipulated picture showing a dent on a car, while the testing result on the right shows that it is highly possible that the dent is not authentic. The proliferation of image processing software, such as Photoshop and GIMP, provides the necessary tools to (a) The manipulated image (b) The likelihood map Figure 1: Manipulated image of a car and testing result achieve malicious manipulation of images with ease. This makes the reliable detection of tampering instances an important task. The process of detecting such manipulations is termed Image Forensics. An image forensics algorithm shall output information indicating whether the image has been tampered with, as well as more importantly, identify the portions of the image that have been altered. Image tampering and manipulation is typically detected with two kinds of techniques. First, active techniques which involve embedding a watermark to an image when it is taken and authenticating the image by checking the watermark. These techniques have not gained much momentum as they require sophisticated hardware Birajdar and Mankar [1]. Second, passive techniques that asses the integrity of the image based on the content and structure of the data representing the image. Blind image forensics techniques do not take image semantics in to consideration while identifying image forgery, i.e. there is no attempt made at understanding the content of the image. Although tampering methods may not have visibly manipulated the image, they very commonly leave some traces of the manipulation in terms of changes in image statistics, artifacts and inconsistencies. These inconsistencies are leveraged to identify when an image has been tampered and to localize the tampered region of the image. The blind image forensic algorithms examine various kinds of traces as we will see in subsequent sections. The popularity and high interest in these blind and passive techniques stems from the fact that they require computational resources as

2 opposed to active techniques Birajdar and Mankar [1]. Most of the widely referenced surveys, including [2, 3, 1], list algorithms proposed for both active and passive image forgery detection. However, they are not focused on nefarious manipulations, and they do not benchmark the performance of the surveyed algorithms. It is important for us to be able to distinguish between image enhancements from image tampering. It has been noted that image enhancement mostly do not involve local manipulations (notable exception would include Bilateral Filtering for touch-ups) while tampering at times involves local manipulations [3]. For instance, contrast and brightness adjustments are some operations which are normally not useful per se for image tampering, whereas sharpening and blurring operations may aid in image tampering to some extent and copy-move, splicing operations make up the malicious end of the spectrum. A universal definition of malicious intent in image manipulations is not straight forward. The definition of malicious intent would differ with the use case at hand. For example, a bank which allows photo-based check transactions by accepting customer check images, would accept manipulations caused by the process of sending those images, such quality reduction from compression. However, the manipulation of digits written in the image would be catastrophic and must be detected. In another instance, a cosmetics advertisement involving photos of models usually contain various manipulations and touch-ups, which may be considered malicious from a consumer s perspective. Various methods have been developed in recent years to tackle these image manipulations. Along with identifying malicious intent and different forms of manipulations, it is equally important to identify algorithms which are complementary in nature. These complementary algorithms can be integrated together to produce evidence of tampering covering different types of manipulations. In this paper, we deliver a survey of the different techniques and setup a new benchmark for future research. 2. Manipulation Classes Malicious image manipulation is typically done by applying local manipulations.localizing these manipulations provides a forensics expert with a lot of insight and some degree of confidence about the nature and extent of the tampering. We briefly describe the most common ways of tampering with images in such circumstances: Image Splicing is a very common type of manipulation where two or more images are spliced together, normally to create an impression that a foreground object is part of the background taken from the other image. This may involve blurring and other kinds of additional touch-ups to make the image look authentic. This can be used by well trained forgery experts to tamper documents where letters or whole words may be removed or manipulated, changing the entire meaning of the document. Another instance would be moving a person beside another in an unlikely image, say a politician beside a terrorist to create a rumor. Copy-moving is another kind of alteration where parts of the same image are used to retouch the image or hide objects (such as changing a crime scene photograph). An overview and evaluation of the methods used to detect copymove forgery has been documented by Christlein et al. [4] very well. Other techniques, such as seam carving are also used to remove objects from images and can be detected, for instance Sarkar et al. [5] discusses this manipulation. Rendered imagery due to advances in computer graphics are at times photo-realistic and thus indistinguishable to the naked eye. However, because they are not acquired from a digital device, it s seen that they can be distinguished from natural images through differences in noise residuals and artifacts that arise from the camera acquisition process. Steganography is another field of manipulation which attempts to convey hidden messages by hiding information in cover images without affecting the covers statistical properties, which might be used for detection. 3. Passive and Blind Localization Techniques Passive detection techniques normally do not involve the study of the contents of the image and only concentrate on various image statistics that can be used to discern from non-tampered regions from tampered regions. Some of the techniques involve exploiting the artifacts and inconsistencies that are created due to JPEG compression used widely as an Image format. Some techniques exploit the inherent noise present in the image due to difference in Color Filter array interpolation in different cameras or inconsistencies in the local noise pattern caused due to splicing. Yet another class of algorithm looks at the lighting inconsistency, but as these are primarily semi-automatic techniques, we will not be evaluating them. The biggest defining characteristics of the algorithms we review is that they do not involve any prior knowledge about the content of the image and only try to detect tampering through statistical means. For a list of algorithms that work only for copy-move operations, [4] provides a survey and benchmark. In general, a copy-move tampering does not need sophisticated techniques. We thus focus more heavily on splicing. For the names of the algorithms, we will use abbreviations according to Zampoglou et al. [21] for convenience DCT and Block Level Artifacts JPEG images are compressed according to 8 8 Discrete Cosine Transform (DCT) blocks. Algorithms use this fact to detect tampering operations under various principles.

3 Bianchi et al. [7] Amerini et al. [8] ADQ2 Double quantization effect. Probabilistic model for detecting tampering of block ADQ3 Double quantization effect, DCT coefficient first digit features (Benford s Law) Bianchi and NA Non aligned double Piva [9] JPEG compression (grid shifted tampering) Bianchi and NADQ Double JPEG compression Piva [10] (both aligned and not aligned) Krawets [11] ELA Error Level analysis (Resaving JPEG to get compression noise) Farid [12] GHO Error Level analysis, then finding ghosts Wang et al. [13] PCA (local minima) Error Level analysis, PCA to discriminate high frequency noise Li et al. [14] BLK Blocking artifact grid detection, marking abnormal grids Ye et al. [15] BLK2, Blocking artifact DCT measure / Quantization table estimation Method Abbr. Basis Strengths Weaknesses Other Remarks Lin et al. [6] ADQ1 Double quantization Works for splicing, Resolution of Widely used, first effect. Probabilistic inpainting etc. Re- DCT block automatic method. model for detecting tampering of block size. Probability sulting map has direct probabilistic interpretation Works for splicing, inpainting etc. Separates two conditional probabilities Uses simple but effective features Works for cropping and shifting, Threshold based detector Likelihood map for tampering, can be extended to use other evidences Very simple Works for splicing, inpainting etc, Fast and simple Works for splicing, inpainting etc, Fast and simple Works for splicing, inpainting, cropping and copy move Very fast (uses MLE for estimation) inaccurately defined Resolution of DCT block size. The probabilistic map looks noisy Doesn t work for heavily compressed images. The first-digit statistics is suitable mainly for natural images Not useful for splicing, copy move etc Doesn t work if image is resized Not very discriminating Only lower quality region are detected Tampered regions should have high frequency component The block artifact grid maps need to be made clearer JPEG recompression reduces efficacy Table 1: Tamper Localization approaches which exploit JPEG related artifacts The authors train an SVM for classification. Can be adapted to JPEG2000 format Automatic. The authors claim improvement on [6] when the second quantization factor is small Automatic. The authors train an SVM for classification Semi-automatic. Detailed math model Automatic. Detailed math model Semi-automatic Semi-automatic Automatic Semi-automatic Semi-automatic, One of the earliest approaches Double Quantization JPEG images which are tampered suffer from a double phenomenon known as double compression, with inconsistencies between DCT histograms of singly and doubly compressed regions. DCT coefficients of unmodified areas undergo a double JPEG compression thus exhibiting double quantization (DQ) artifacts, while DCT coefficients of tampered areas will result from a single compression and very likely present no artifacts.

4 Method Abbr. Basis Strengths Weaknesses Other Remarks Ferrara CFA1 Tampering alters artifacts Gives a tampering Strongly affected by Same as Dirik et al. [16] due to demo- probability of 2 2 JPEG compression and Memon [17], saicking algorithm block, very fine and resizing High false positive grained likelihood rate for very map sharp regions Dirik and CFA2 Tampering alters artifacts One feature and sim- Strongly affected by Automatic, Some Memon due to demople thresholding clas- JPEG compression sensors don t ex- [17] saicking algorithm sifier and resizing hibit CFA artifacts Yerushalmy PFA Inconsitancies in Works for cropped Contrast dependent Automatic, PFA and Hel- Chromatic abberation images (sensitive to very low events may not Or [18] artifacts (Purple Fringing) contrast) be found in every image Mahdian NOI1 Segmentation based Simple median Assumption might Automatic and Saic on noise level obtained based estimator not hold. The authentic [19] from Wavelet transform (MAD) and merging algorithm part may have noise variance Lyu et al. NOI2 Estimating Noise Efficient, complementary Assumption might Automatic [20] characteristics (Kurtosis to JPEG not hold. The au- in band pass artifacts at high thentic part may domain) quality levels have noise variance. Heavy compression affects efficacy Table 2: Tamper Localization approaches which exploit Local Noise related features Lin et al. [6], Bianchi et al. [7] both try to identify tampered blocks by considering DCT coefficients and computing a likelihood map indicating the probability for each 8 8 DCT block of being double compressed. Low frequency coefficients within each block are used in practice to determine the probability that a block is tampered assuming that the DCT coefficients within a block are mutually independent. The likelihoods are computed based on a Bayesian approach according to the evaluated periodicity of the DCT coefficient histograms. The difference lies in the choice of assumed distribution. Further, Bianchi and Piva [9] and [10] improve and extend on the aforementioned methods by identifying two kinds of double JPEG artifacts. A-DJPG and NA-DJPG artifacts depend on whether the second JPEG compression adopts a discrete cosine transform (DCT) grid aligned with the one used by the first compression or not. The authors proceed by describing two accurate models (and their simplified versions) to characterize A-DJPG and NA-DJPG artifacts, based on previous work by Lin et al. [6]. Amerini et al. [8] describes a method which identifies a specialized feature set to classify blocks using SVM as being double compressed or not. The authors claim that DCT coefficients of single quantized images follow Benford s distribution, while it is not the case for double quantized images Error Level Analysis Error level analysis is another method proposed by Krawets [11]. It works by intentionally resaving the JPEG image at a known error rate and then computing the difference between the images. Any modification to the picture will alter the image such that stable areas become unstable. Differently compressed versions of the image are compared with the possibly tampered one by Farid [12]. When the same quality factor of the tampered area is adopted, a spatial local minima, christened as JPEG ghosts by the author, appear and can be used to discern tampered regions. Wang et al. [13] extend the analysis by extracting the high frequency noise from this noise map using Principal Component Analysis and then characterizing the tampered region based on the high frequency noise Block Artifact Grids For manipulated images, when the tampered part is pasted into the background image, the DCT blocks do not match and some block artifacts will be left. Li et al. [14] describe a method that uses second order difference of pixel values

5 to extract the Block Artifact Grids and then automatically identify the regions which are likely to be tampered. Ye et al. [15] proposes two methods. The first method uses DCT coefficients to estimate the block artifacts. The second method is by first estimating the DCT quantization table and then checking the uniformity of the quantization remainders Camera and Local Noise Residuals Color Filter Array Image features like Local Noise or Camera Noise arising from the image acquisition process or due to the manufacturing or hardware characteristics of a digital cameras, provide sufficient information to determine an image s authenticity since they are sensitive to image manipulation as well as being difficult to forge synthetically. The methods described in this section are based on the intuition that image regions of different origins may have different noise characteristics introduced by the sensors or post-processing steps of their original source. During acquisition, every pixel receives only a single color-channel value (red, green or blue). To produce the final image, the raw data undergoes an interpolation process, using Color Filter Array (CFA) to obtain a color image with different cameras using slightly different parameters to perform the interpolation. Dirik and Memon [17], Ferrara et al. [16] exploit the artifacts created by Color Filter Array processing in most digital cameras. Both of the techniques involve estimating CFA interpolation pattern and CFA based noise analysis as features and training a classifier based on these features. This line of attack is more robust than the algorithms mentioned above as they can be applied to images other than those saved in JPEG format. A limitation is that the CFA estimation are sensitive to strong JPEG recompression and resizing Purple Fringing Aberration Yerushalmy and Hel-Or [18] tamper identification method is based on the effects introduced in the acquired image by the optical and sensing systems of the camera and tries to identify local artifacts arising from chromatic-abberation (Purple Fringing Aberration or PFA) due to image acquisition procedure of a camera lens. The geometric center of the image can be inducted from the PFA events. For localization, the PFA normal flows are used to detect tampered areas Local Noise Analysis Mahdian and Saic [19] propose a novel method where they estimate noise levels of blocks from a sub-band generated from a one level wavelet transform and then label and merge blocks by thresholding the difference of the estimated noise levels. The noise levels are estimated by a median based estimator. The main drawback of this method is that authentic images also can contain various isolated regions with totally different variances which can be denoted as inconsistent with the rest of the image. Lyu et al. [20] exploits a regular property of Kurtosis of images in band pass space to estimate noise characteristics. The noise statistics estimation is formulated as an optimization problem with closed-form solution, which is used to estimate local noise statistics to discern between tampered regions of an image. 4. Related Datasets In this section, we present related datasets which are used for image forgery classification and detection: CASIA Image Tampering Detection Evaluation Database [22] is a widely used standard dataset for evaluating forgery detection. It consists of uncompressed images with various resolution as well as JPEG images with different compression quality factors. The images involve splicing (with arbitrary contour) and also post-processing (blurring and filtering). However, this dataset does not provide the ground truth masks for localization of the tampering operations. Furthermore, in [23], the authors argue that there exist statistical artifacts in the way the dataset is built, and might produce unfair results for many forgery detection algorithms. MICC Image Databases [24] is a dataset which aimed at copy move forgery detection and localization. The databases can be further divided into there datasets: F2000, F600, F220, which all contains high resolution images. In each of these datasets, around half of the images are tampered. Only the F600 provides ground truth masks for the tampered images. The type of processing on the copy-move forgeries is limited to rotation and scaling. Dresden Image Database [25] is constructed with the aim of evaluating and developing methods for detecting image tampering as well as identifying the type of device for the acquisition of an image. It contains images taken using 73 digital cameras in 25 different models. They use various camera settings when the authors take the pictures. Columbia Uncompressed Image Splicing Detection Evaluation Dataset [26] provides tampered and original images with image splicing without various post processing techniques applied. It also provides edge ground truth masks for evaluation of the localization of the tampered images. However, the resolution is low and the size of the set is small (e.g., 363 images with 180 tampered and 183 authentic. RAISE Raw Image Dataset [27] consists of 8156 highresolution uncompressed images. The images contain various categories, including outdoor images, indoor images,

6 Dataset Type Size Remarks CASIA Tampered Image Image Spliced and 7491 tampered and 5123 au- No ground truth masks provided for Detection Evaluation Post Processed thentic localization Database (CASIA TIDE) MICC F2000 Image Copy Move Forgery 700 tampered and 1300 authentic No ground truth masks provided for database localization MICC F600 Image database Copy Move Forgery 160 tampered and 440 au- Ground truth masks provided thentic 180 tampered and 183 authentic Columbia Uncompressed Image Spliced, Uncompresseverted Edge masks provided, can be con- Image Splicing Detection to ground truth Evaluation Dataset RAISE Raw Image dataset Uncompressed 8156 raw images Can be used to create artificial sets with various JPEG qualities and tampering classes Uncompressed Color Image Database (UCID) Dresden Natural Images Database Christlein et al. [4] s Dataset Uncompressed 1300 raw images Low resolution, Same as RAISE Uncompressed 1492 raw images Aimed at Camera Identification, Same as RAISE Uncompressed, 48 authentic images Constructs a large number of manipulations Copy-move along with other artifacts Table 3: An overview of the datasets commonly used in image forgery detection Landscape and Nature scenes along with People, Objects and Buildings. They have also provided smaller subsets, RAISE-1k, RAISE-2k, RAISE-4k and RAISE-6k. Uncompressed Colour Image Database [28] was originally a benchmark dataset for image retrieval with the goal of understanding the effects of compression on contentbased image retrieval (CBIR). Table 3 gives a summary of the datasets. 5. Results 5.1. Our Dataset From the existing datasets we build our dataset for benchmarking and learning. The Dresden uncompressed image dataset and the RAISE image dataset (see detail in Section 4) have a relatively larger number of raw images of high resolution and thus are a good source for carrying out operations such as splicing and copy-moving. We cut a rectangular part of size 720-by-600 as the authentic image. We build an image forgery simulation system which take input raw images and automatically generates tampered images and produces ground truth masks as well. Note that in this way it might be easy for a human to distinguish a tampered image from an authentic one, but the difficulty does not reduce for the machine and the dataset is appropriate for benchmarking. Specifically, the tampered images used in our experiments are spliced ones. For splicing, the system randomly picks one JPEG image and one uncompressed (TIFF) image from the authentic images. A polygonal part is taken from the TIFF image and used to replace part from the JPEG image. Then we filter our image with Gaussian and save the image as a compressed JPEG file. The simulation system is capable of handling other types of tampering operation as well. For copy-move, it takes an authentic image from the dataset and copies a polygonal part and paste to another region on the same image and we carry out the same post-processing as we do for splicing. The benchmarking tasks in Section 5.2 are done with authentic images and tampered images (thus in total). The algorithms to be benchmarked all work for splicing and thus we take the spliced images. The same set of images are used for fusion in Section 5.3: there, the images are further split into training images and 9990 testing images (we had to discard 30 maps as the algorithm outputs weren t uniform). The details for training will be given in the specific section Benchmarks We take thirteen of the algorithms described in Section 2 and perform a benchmarking using authentic images and spliced images as described in the last section. We collect the results both for the classification (i.e. whether an image has been tampered) and localization / detection (i.e. which part of an image has been tampered). In [21] the authors perform a Kolmogorov-Smirnov test and compare the

7 statistics of the tampered region and the untampered region. They then put a threshold on that difference and draw an ROC curve. However in this way it is not clear how accurate the detected region is localized. Moreover it does not work if the algorithm only outputs a classification result and does not have the likelihood map of tampering. We propose two benchmark processes for classification and localization respectively. The expected output of a classification algorithm is a single value. The expected output of a localization algorithm is normally a likelihood map of pixels or blocks. Our performance characterization system takes both cases. In case the result does not contain a classification result, we use a uniform decision rule and compare the performance. From a classification algorithm we can easily compute the true positive (TP) and false positive (FP) rates since the output is binary. In case we have a localization algorithm, we first resize the output likelihood map and the ground truth to the same dimension, say m-by-n. Let p(x, y) denote the (x, y)-pixel value of an images, 1 x m, 1 y n. Then the value of the pixels, p(x, y) are normalized to be in the range [0, 1]. A threshold h is introduced to distinguish tampered and untampered pixels. In particular, we generate a binary decision map P with P (x, y) = 1 if p(x, y) > h and P (x, y) = 0 otherwise, with the understanding that 1 means tampered and 0 means untampered. Also, denote the groundtruth mask by N(x, y). We count the number of pixels N 1 = {(x, y) : N(x, y) = P (x, y) = 1}, N 2 = {(x, y) : N(x, y) = 1, P (x, y) = 0}, N 3 = {(x, y) : N(x, y) = 0, P (x, y) = 1}, N 4 = {(x, y) : N(x, y) = 0, P (x, y) = 0}. Consequently we compute the intersection-over-union (IOU) metric, which is given as IOU = N 1 /(N 1 + N 2 + N 3 ). We use another threshold h for IOU: for an image, the output is 1 if IOU > h and 0 if otherwise, with the understanding that 1 means detect and 0 means not detected. Then we can compute the TP and FP rates according to the respective number of images. Note that for a fixed h, if we adjust h, we get a series of pairs of TP-FP rates. We plot them and connect to draw an ROC curve. In this case, if we take a number of values for h, we get a bunch of ROC curves. Note that each TP-FP plot corresponds to a threshold, and thus a decision rule. Therefore, each point on the line segment connecting any two plots corresponds to an available decision rule. Therefore, from a reasonable user s point of view, it is sufficient to consider the convex hull of an ROC curve. In our case we have both h and h ; therefore we take the convex hull of all the curves. Although it is always the case for users, in general a larger area under curve (AUC) implies a preference for the corresponding algorithm. If we are only provided with the likelihood maps, it is important that we have an automatic decision rule. An easy approach is that we count the number of tampered pixels. Algorithm Classification Detection Dectection (Area) ADQ ADQ ADQ BLK BLK CFA CFA DCT ELA GHO NADQ NOI NOI Table 4: Area-Under-the-Curve (AUC) for classification and detection. The algorithm names corresponds to the abbreviations in Table 1 and 2. In this case, we again use h to distinguish tampered and untampered pixels, as discussed above. We then count the number n of pixels with p(x, y) = 1. The output is tampered if n > h, and untampered if otherwise. Again fix h we draw an ROC curve for h, and then we get a number of curves by adjusting h. The ROC curves for the classification and detection for the 13 algorithms are put in the supplementary file. The AUC s are given in Table 4. While the above benchmarks are standard in the computer vision community, people may use different methods. In some papers (e.g. Lyu et al. [20]) people draw ROC curves based on the area of correctly detected region. This idea can be practiced by counting the number of pixels. Still we use threshold h to distinguish tampered and untampered pixels. Then we count the total number of pixels over all the images. Similar to above we calculate N 1,, N 4. Then the average TP rate is N 1 /(N 1 + N 3 ) and the average FP rate is N 2 /(N 2 + N 4 ) Fusion When making a decision on image forgery, it is sometimes useful to consider combining the algorithms and their fused result. According to Fontani et al. [29], there are three basic approaches to fusion: at the feature level, the output level and the abstract level. In our case, the easiest way to fusion is through the decision rule from all the algorithms. Since we have the 13 algorithms and their ROC curves, we can draw the convex hull of the ROC curves altogether, which represents a decision rule based on thresholds of all the algorithms. The resulting curve is as drawn in Figure 2. This is more like on an abstract level, that is, a fusion

8 based on the thresholded results. It is the simplest way but may not represent the best result as for accuracy of classification Experiments using Fully Connected Networks To classify images by fusing outputs from the above benchmarked algorithm, we build a simple fusion architecture and also benchmark decision making using neural networks for each individual algorithm. We divided our dataset into a training set of images and test set of 9990 images, over which we benchmarked optimizerour networks (we had to discard 30 maps as the algorithm outputs were not uniform). Firstly, We train a separate 4-layer fully connected network for the algorithms. The input to the individual networks is taken as the flattened output of the algorithms (scaled to dimension for ELA, GHO and NOI2, other algorithms were either of size or 38 45). The intermediate layers are activated using the softmax activation function while the ultimate layer is activated using a sigmoid function. Mean-squared error and Adam optimizer( Kingma and Ba [30]) are taken as the loss function and optimizer respectively. Secondly, to build an end-to-end fusion architecture, we extend the networks we described above. We connect the penultimate layers of the individual networks to a merge layer which simply concatenates the outputs of all the algorithms. We then further connect a fully connected layer activated by the softmax function and the last layer is activated using the sigmoid function. Our initial results are very encouraging as can be seen from the results presented in Table 5 (we compare with the best accuracy derived from the ROC curves). It should be noted that the training and testing setups are different while computating both the columns but we do not anticipate the performance to change. Algorithm Accuracy (NN) Accuracy (ROC) ADQ ADQ ADQ BLK BLK CFA CFA DCT ELA GHO NADQ NOI NOI Fusion Table 5: Accuracy for classification: the second column is from the neural network, the third column is from the best result according to the ROC curve. 6. Discussion In this paper, we summarized state-of-the-art algorithms for image forgery detection. We prepared a dataset for benchmarking algorithms with outputs in the form of a likelihood map. We performed benchmarking with respect to three different measures and got the ROC curves respectively. We also trained a neural network to get a classifier for image forgery from the output maps. For benchmarking, it may appear anomalous that the detection results are better than the classification ones. However, detection curves are computed only for positive images, i.e. for those images where manipulations exist. It is worth noting that our two benchmarks for detection have different meanings. The one according to IOU is based on the number of correctly and incorrectly detected images, while the one according to the area is based on the number of correctly and incorrectly detected pixels. The latter one has much worse result since the requirement is more strict. The fusion result for the neural network is promising. Note that individual results may not exceed the accuracy according to our simple decision rule discussed in Section 5.2. Nevertheless when we have a combined network we have a classifier that is outperforming. Our future work includes creating a larger dataset that covers a wider range of manipulations and building networks accordingly. It would also be interesting to extend the architecture to detect the manipulated regions more effectively apart from just classifying. Figure 2: Fused ROC curves

9 References [1] G. K. Birajdar and V. H. Mankar, Digital image forgery detection using passive techniques: A survey, Digital Investigation, vol. 10, no. 3, pp , [2] H. Farid, Image forgery detection a survey, [3] A. Rocha, W. Scheirer, T. Boult, and S. Goldenstein, Vision of the unseen: Current trends and challenges in digital image and video forensics, ACM Computing Surveys (CSUR), vol. 43, no. 4, p. 26, [4] V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, An evaluation of popular copy-move forgery detection approaches, Information Forensics and Security, IEEE Transactions on, vol. 7, no. 6, pp , [5] A. Sarkar, L. Nataraj, and B. S. Manjunath, Detection of seam carving and localization of seam insertions in digital images, in Proceedings of the 11th ACM workshop on Multimedia and security. ACM, 2009, pp [6] Z. Lin, J. He, X. Tang, and C.-K. Tang, Fast, automatic and fine-grained tampered jpeg image detection via dct coefficient analysis, Pattern Recognition, vol. 42, no. 11, pp , [7] T. Bianchi, A. De Rosa, and A. Piva, Improved dct coefficient analysis for forgery localization in jpeg images, in Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. IEEE, 2011, pp [8] I. Amerini, R. Becarelli, R. Caldelli, and A. Del Mastio, Splicing forgeries localization through the use of first digit features, in Information Forensics and Security (WIFS), 2014 IEEE International Workshop on. IEEE, 2014, pp [9] T. Bianchi and A. Piva, Detection of nonaligned double jpeg compression based on integer periodicity maps, Information Forensics and Security, IEEE Transactions on, vol. 7, no. 2, pp , [10], Image forgery localization via block-grained analysis of jpeg artifacts, Information Forensics and Security, IEEE Transactions on, vol. 7, no. 3, pp , [11] N. Krawets, A picture s worth: Digital image analysis and forensics, [12] H. Farid, Exposing digital forgeries from jpeg ghosts, Information Forensics and Security, IEEE Transactions on, vol. 4, no. 1, pp , [13] W. Wang, J. Dong, and T. Tan, Tampered region localization of digital color images based on jpeg compression noise, in Digital Watermarking. Springer, 2010, pp [14] W. Li, Y. Yuan, and N. Yu, Passive detection of doctored jpeg image via block artifact grid extraction, Signal Processing, vol. 89, no. 9, pp , [15] S. Ye, Q. Sun, and E.-C. Chang, Detecting digital image forgeries by measuring inconsistencies of blocking artifact, in Multimedia and Expo, 2007 IEEE International Conference on. IEEE, 2007, pp [16] P. Ferrara, T. Bianchi, A. De Rosa, and A. Piva, Image forgery localization via fine-grained analysis of cfa artifacts, Information Forensics and Security, IEEE Transactions on, vol. 7, no. 5, pp , [17] A. E. Dirik and N. Memon, Image tamper detection based on demosaicing artifacts, in Image Processing (ICIP), th IEEE International Conference on. IEEE, 2009, pp [18] I. Yerushalmy and H. Hel-Or, Digital image forgery detection based on lens and sensor aberration, International journal of computer vision, vol. 92, no. 1, pp , [19] B. Mahdian and S. Saic, Using noise inconsistencies for blind image forensics, Image and Vision Computing, vol. 27, no. 10, pp , [20] S. Lyu, X. Pan, and X. Zhang, Exposing region splicing forgeries with blind local noise estimation, International Journal of Computer Vision, vol. 110, no. 2, pp , [21] M. Zampoglou, S. Papadopoulos, Y. Kompatsiaris, R. Bouwmeester, and J. Spangenberg, Web and social media image forensics for news professionals, in Social Media In the NewsRoom, SMNews16@CWSM, Tenth International AAAI Conference on Web and Social Media workshops, [22] National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Science, Corel Image Database, and photographers, Casia tampered image detection evaluation database. [23] G. Cattaneo and G. Roscigno, A possible pitfall in the experimental analysis of tampering detection algorithms, in Network-Based Information Systems (NBiS), th International Conference on. IEEE, 2014, pp [24] I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, A sift-based forensic method for copy move attack detection and transformation recovery, Information Forensics and Security, IEEE Transactions on, vol. 6, no. 3, pp , [25] T. Gloe and R. Böhme, The dresden image database for benchmarking digital image forensics, Journal of Digital Forensic Practice, vol. 3, no. 2-4, pp , [26] Y.-F. Hsu and S.-F. Chang, Detecting image splicing using geometry invariants and camera characteristics consistency, in International Conference on Multimedia and Expo, [27] D.-T. Dang-Nguyen, C. Pasquini, V. Conotter, and G. Boato, Raise: a raw images dataset for digital image forensics, in Proceedings of the 6th ACM Multimedia Systems Conference. ACM, 2015, pp

10 [28] G. Schaefer and M. Stich, Ucid-an uncompressed colour image database. [29] M. Fontani, T. Bianchi, A. D. Rosa, A. Piva, and M. Barni, A framework for decision fusion in image forensics based on dempster shafer theory of evidence, IEEE Transactions on Information Forensics and Security, vol. 8, no. 4, pp , April [30] D. Kingma and J. Ba, Adam: A method for stochastic optimization, arxiv preprint arxiv: , 2014.

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Global Contrast Enhancement Detection via Deep Multi-Path Network

Global Contrast Enhancement Detection via Deep Multi-Path Network Global Contrast Enhancement Detection via Deep Multi-Path Network Cong Zhang, Dawei Du, Lipeng Ke, Honggang Qi School of Computer and Control Engineering University of Chinese Academy of Sciences, Beijing,

More information

Forgery Detection using Noise Inconsistency: A Review

Forgery Detection using Noise Inconsistency: A Review Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by

More information

Exposing Digital Forgeries from JPEG Ghosts

Exposing Digital Forgeries from JPEG Ghosts 1 Exposing Digital Forgeries from JPEG Ghosts Hany Farid, Member, IEEE Abstract When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person

More information

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department

More information

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian

More information

RAISE - A Raw Images Dataset for Digital Image Forensics

RAISE - A Raw Images Dataset for Digital Image Forensics RAISE - A Raw Images Dataset for Digital Image Forensics Duc-Tien Dang-Nguyen 1, Cecilia Pasquini 2, Valentina Conotter 2, Giulia Boato 2 1 DIEE - University of Cagliari, Italy 2 DISI - University of Trento,

More information

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in

More information

Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples

Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on ed Samples Mauro Barni, Ehsan Nowroozi, Benedetta Tondi Department of Information Engineering and Mathematics, University of

More information

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches Dhara Anandpara 1, Rohit Srivastava 2 1, 2 Computer Engineering Department, Parul

More information

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot 24 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY Khosro Bahrami and Alex C. Kot School of Electrical and

More information

Camera identification from sensor fingerprints: why noise matters

Camera identification from sensor fingerprints: why noise matters Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS

More information

Image Manipulation Detection using Convolutional Neural Network

Image Manipulation Detection using Convolutional Neural Network Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National

More information

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area

More information

Countering Anti-Forensics of Lateral Chromatic Aberration

Countering Anti-Forensics of Lateral Chromatic Aberration IH&MMSec 7, June -, 7, Philadelphia, PA, USA Countering Anti-Forensics of Lateral Chromatic Aberration Owen Mayer Drexel University Department of Electrical and Computer Engineering Philadelphia, PA, USA

More information

Fragile Sensor Fingerprint Camera Identification

Fragile Sensor Fingerprint Camera Identification Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera

More information

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.

More information

Tampering and Copy-Move Forgery Detection Using Sift Feature

Tampering and Copy-Move Forgery Detection Using Sift Feature Tampering and Copy-Move Forgery Detection Using Sift Feature N.Anantharaj 1 M-TECH (IT) Final Year, Department of IT, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India 1 ABSTRACT:

More information

Different-quality Re-demosaicing in Digital Image Forensics

Different-quality Re-demosaicing in Digital Image Forensics Different-quality Re-demosaicing in Digital Image Forensics 1 Bo Wang, 2 Xiangwei Kong, 3 Lanying Wu *1,2,3 School of Information and Communication Engineering, Dalian University of Technology E-mail:

More information

Impeding Forgers at Photo Inception

Impeding Forgers at Photo Inception Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth

More information

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence

More information

Image Forgery Identification Using JPEG Intrinsic Fingerprints

Image Forgery Identification Using JPEG Intrinsic Fingerprints 1 Image Forgery Identification Using JPEG Intrinsic Fingerprints A. Garg, A. Hailu, and R. Sridharan Abstract In this paper a novel method for image forgery detection is presented. he method exploits the

More information

Literature Survey on Image Manipulation Detection

Literature Survey on Image Manipulation Detection Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,

More information

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models

More information

Learning Rich Features for Image Manipulation Detection

Learning Rich Features for Image Manipulation Detection Learning Rich Features for Image Manipulation Detection Peng Zhou Xintong Han Vlad I. Morariu Larry S. Davis University of Maryland, College Park Adobe Research pengzhou@umd.edu {xintong,lsd}@umiacs.umd.edu

More information

Multimedia Forensics

Multimedia Forensics Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer

More information

Exposing Image Forgery with Blind Noise Estimation

Exposing Image Forgery with Blind Noise Estimation Exposing Image Forgery with Blind Noise Estimation Xunyu Pan Computer Science Department University at Albany, SUNY Albany, NY 12222, USA xypan@cs.albany.edu Xing Zhang Computer Science Department University

More information

Automation of JPEG Ghost Detection using Graph Based Segmentation

Automation of JPEG Ghost Detection using Graph Based Segmentation International Journal Of Computational Engineering Research (ijceronline.com) Vol. Issue. 2 Automation of JPEG Ghost Detection using Graph Based Segmentation Archana V Mire, Dr S B Dhok 2, Dr P D Porey,

More information

PRIOR IMAGE JPEG-COMPRESSION DETECTION

PRIOR IMAGE JPEG-COMPRESSION DETECTION Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION

More information

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic

More information

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ A REVIEW OF TRENDS IN DIGITAL IMAGE PROCESSING FOR FORENSIC CONSIDERATION Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ Department of Forensic Science Sam Higginbottom Institute of agriculture Technology

More information

CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen

CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS Kuan-Chuan Peng and Tsuhan Chen Cornell University School of Electrical and Computer Engineering Ithaca, NY 14850

More information

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Feature Based Analysis of Copy-Paste Image Tampering

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

Digital Watermarking Using Homogeneity in Image

Digital Watermarking Using Homogeneity in Image Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar

More information

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Chiew K.T., et al. (Eds.): PGRES 2017, Kuala Lumpur: Eastin Hotel, FCSIT, 2017: pp 35-42 IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Thamarai Subramaniam and Hamid

More information

Exposing Image Splicing with Inconsistent Local Noise Variances

Exposing Image Splicing with Inconsistent Local Noise Variances Exposing Image Splicing with Inconsistent Local Noise Variances Xunyu Pan Xing Zhang Siwei Lyu Computer Science Department University at Albany, State University of New York {xzhang5,xypan,slyu@albany.edu

More information

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX 77341,

More information

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Linear Gaussian Method to Detect Blurry Digital Images using SIFT IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org

More information

Neuro-Fuzzy based First Responder for Image forgery Identification

Neuro-Fuzzy based First Responder for Image forgery Identification ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,

More information

Image Forgery Localization via CFA Based Feature Extraction and Poisson Matting

Image Forgery Localization via CFA Based Feature Extraction and Poisson Matting Image Forgery Localization via CFA Based Feature Extraction and Poisson Matting Priyanka Prasad M-Tech, Department of CSE, SNGCE, Kadayiruppu, Ernakulam, Kerala, India Abstract: In this era of digital

More information

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge 2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge This competition is sponsored by the IEEE Signal Processing Society Introduction The IEEE Signal Processing Society s 2018

More information

Improved SIFT Matching for Image Pairs with a Scale Difference

Improved SIFT Matching for Image Pairs with a Scale Difference Improved SIFT Matching for Image Pairs with a Scale Difference Y. Bastanlar, A. Temizel and Y. Yardımcı Informatics Institute, Middle East Technical University, Ankara, 06531, Turkey Published in IET Electronics,

More information

arxiv: v3 [cs.cv] 18 Dec 2018

arxiv: v3 [cs.cv] 18 Dec 2018 Video Colorization using CNNs and Keyframes extraction: An application in saving bandwidth Ankur Singh 1 Anurag Chanani 2 Harish Karnick 3 arxiv:1812.03858v3 [cs.cv] 18 Dec 2018 Abstract In this paper,

More information

Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images

Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images Xufeng Lin, Xingjie Wei and Chang-Tsun Li Department of Computer Science, University of Warwick, Coventry, CV4 7AL, UK

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): 2321-0613 High-Quality Jpeg Compression using LDN Comparison and Quantization Noise Analysis S.Sasikumar

More information

Retrieval of Large Scale Images and Camera Identification via Random Projections

Retrieval of Large Scale Images and Camera Identification via Random Projections Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

Image Forgery Detection: Developing a Holistic Detection Tool

Image Forgery Detection: Developing a Holistic Detection Tool Image Forgery Detection: Developing a Holistic Detection Tool Andrew Levandoski and Jonathan Lobo I. INTRODUCTION In a media environment saturated with deceiving news, the threat of fake and altered images

More information

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Roberto Caldelli, Irene Amerini, and Francesco Picchioni Media Integration and Communication Center - MICC, University of

More information

S SNR 10log. peak peak MSE. 1 MSE I i j

S SNR 10log. peak peak MSE. 1 MSE I i j Noise Estimation Using Filtering and SVD for Image Tampering Detection U. M. Gokhale, Y.V.Joshi G.H.Raisoni Institute of Engineering and Technology for women, Nagpur Walchand College of Engineering, Sangli

More information

THE popularization of imaging components equipped in

THE popularization of imaging components equipped in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 3, MARCH 2015 Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis Bin Li, Member, IEEE, Tian-Tsong

More information

SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS

SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS RADT 3463 - COMPUTERIZED IMAGING Section I: Chapter 2 RADT 3463 Computerized Imaging 1 SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS RADT 3463 COMPUTERIZED IMAGING Section I: Chapter 2 RADT

More information

Locating the Query Block in a Source Document Image

Locating the Query Block in a Source Document Image Locating the Query Block in a Source Document Image Naveena M and G Hemanth Kumar Department of Studies in Computer Science, University of Mysore, Manasagangotri-570006, Mysore, INDIA. Abstract: - In automatic

More information

IMAGE COMPOSITE DETECTION USING CUSTOMIZED

IMAGE COMPOSITE DETECTION USING CUSTOMIZED IMAGE COMPOSITE DETECTION USING CUSTOMIZED Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad ssm@iiita.ac.in rctripathi@iiita.ac.in ABSTRACT The multimedia applications

More information

Tampering Detection Algorithms: A Comparative Study

Tampering Detection Algorithms: A Comparative Study International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

ECC419 IMAGE PROCESSING

ECC419 IMAGE PROCESSING ECC419 IMAGE PROCESSING INTRODUCTION Image Processing Image processing is a subclass of signal processing concerned specifically with pictures. Digital Image Processing, process digital images by means

More information

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING Chapter 21 FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING Gilbert Peterson Abstract The use of digital photography has increased over the past few years, a trend which opens the door for new and creative

More information

Correlation Based Image Tampering Detection

Correlation Based Image Tampering Detection Correlation Based Image Tampering Detection Priya Singh M. Tech. Scholar CSE Dept. MIET Meerut, India Abstract-The current era of digitization has made it easy to manipulate the contents of an image. Easy

More information

AUGMENTED CONVOLUTIONAL FEATURE MAPS FOR ROBUST CNN-BASED CAMERA MODEL IDENTIFICATION. Belhassen Bayar and Matthew C. Stamm

AUGMENTED CONVOLUTIONAL FEATURE MAPS FOR ROBUST CNN-BASED CAMERA MODEL IDENTIFICATION. Belhassen Bayar and Matthew C. Stamm AUGMENTED CONVOLUTIONAL FEATURE MAPS FOR ROBUST CNN-BASED CAMERA MODEL IDENTIFICATION Belhassen Bayar and Matthew C. Stamm Department of Electrical and Computer Engineering, Drexel University, Philadelphia,

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

A Study of Slanted-Edge MTF Stability and Repeatability

A Study of Slanted-Edge MTF Stability and Repeatability A Study of Slanted-Edge MTF Stability and Repeatability Jackson K.M. Roland Imatest LLC, 2995 Wilderness Place Suite 103, Boulder, CO, USA ABSTRACT The slanted-edge method of measuring the spatial frequency

More information

An Adaptive Kernel-Growing Median Filter for High Noise Images. Jacob Laurel. Birmingham, AL, USA. Birmingham, AL, USA

An Adaptive Kernel-Growing Median Filter for High Noise Images. Jacob Laurel. Birmingham, AL, USA. Birmingham, AL, USA An Adaptive Kernel-Growing Median Filter for High Noise Images Jacob Laurel Department of Electrical and Computer Engineering, University of Alabama at Birmingham, Birmingham, AL, USA Electrical and Computer

More information

Liangliang Cao *, Jiebo Luo +, Thomas S. Huang *

Liangliang Cao *, Jiebo Luo +, Thomas S. Huang * Annotating ti Photo Collections by Label Propagation Liangliang Cao *, Jiebo Luo +, Thomas S. Huang * + Kodak Research Laboratories *University of Illinois at Urbana-Champaign (UIUC) ACM Multimedia 2008

More information

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods 19 An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods T.Arunachalam* Post Graduate Student, P.G. Dept. of Computer Science, Govt Arts College, Melur - 625 106 Email-Arunac682@gmail.com

More information

Hiding Image in Image by Five Modulus Method for Image Steganography

Hiding Image in Image by Five Modulus Method for Image Steganography Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK xv Preface Advancement in technology leads to wide spread use of mounting cameras to capture video imagery. Such surveillance cameras are predominant in commercial institutions through recording the cameras

More information

IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES

IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES Shrishail Math 1 and R.C.Tripathi Indian Institute of Information Technology, Allahabad, India,1101 1 ssm@iiita.ac.in rctripathi@iiita.ac.in

More information

A Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA)

A Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA) A Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA) Suma Chappidi 1, Sandeep Kumar Mekapothula 2 1 PG Scholar, Department of ECE, RISE Krishna

More information

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Camera Model Identification Framework Using An Ensemble of Demosaicing Features Camera Model Identification Framework Using An Ensemble of Demosaicing Features Chen Chen Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: chen.chen3359@drexel.edu

More information

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,

More information

Digital Image Processing

Digital Image Processing Digital Image Processing 1 Patrick Olomoshola, 2 Taiwo Samuel Afolayan 1,2 Surveying & Geoinformatic Department, Faculty of Environmental Sciences, Rufus Giwa Polytechnic, Owo. Nigeria Abstract: This paper

More information

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies International Journal of Computer and Communication Engineering, Vol. 4, No., January 25 Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies Bo Liu and Chi-Man Pun Noise patterns

More information

Effective Pixel Interpolation for Image Super Resolution

Effective Pixel Interpolation for Image Super Resolution IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-iss: 2278-2834,p- ISS: 2278-8735. Volume 6, Issue 2 (May. - Jun. 2013), PP 15-20 Effective Pixel Interpolation for Image Super Resolution

More information

Efficient Estimation of CFA Pattern Configuration in Digital Camera Images

Efficient Estimation of CFA Pattern Configuration in Digital Camera Images Faculty of Computer Science Institute of Systems Architecture, Privacy and Data Security esearch roup Efficient Estimation of CFA Pattern Configuration in Digital Camera Images Electronic Imaging 2010

More information

Frequency Domain Median-like Filter for Periodic and Quasi-Periodic Noise Removal

Frequency Domain Median-like Filter for Periodic and Quasi-Periodic Noise Removal Header for SPIE use Frequency Domain Median-like Filter for Periodic and Quasi-Periodic Noise Removal Igor Aizenberg and Constantine Butakoff Neural Networks Technologies Ltd. (Israel) ABSTRACT Removal

More information

WITH the rapid development of image processing technology,

WITH the rapid development of image processing technology, 480 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 JPEG Error Analysis and Its Applications to Digital Image Forensics Weiqi Luo, Member, IEEE, Jiwu Huang, Senior

More information

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,

More information

Detection of Adaptive Histogram Equalization Robust Against JPEG Compression

Detection of Adaptive Histogram Equalization Robust Against JPEG Compression Detection of Adaptive Histogram Equalization Robust Against JPEG Compression Mauro Barni, Ehsan Nowroozi, Benedetta Tondi Department of Information Engineering and Mathematics, University of Siena Via

More information

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and

8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and 8.1 INTRODUCTION In this chapter, we will study and discuss some fundamental techniques for image processing and image analysis, with a few examples of routines developed for certain purposes. 8.2 IMAGE

More information

Research on Hand Gesture Recognition Using Convolutional Neural Network

Research on Hand Gesture Recognition Using Convolutional Neural Network Research on Hand Gesture Recognition Using Convolutional Neural Network Tian Zhaoyang a, Cheng Lee Lung b a Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China E-mail address:

More information

University of Amsterdam System & Network Engineering. Research Project 1. Ranking of manipulated images in a large set using Error Level Analysis

University of Amsterdam System & Network Engineering. Research Project 1. Ranking of manipulated images in a large set using Error Level Analysis University of Amsterdam System & Network Engineering Research Project 1 Ranking of manipulated images in a large set using Error Level Analysis Authors: Daan Wagenaar daan.wagenaar@os3.nl Jeffrey Bosma

More information

STUDY OF IMAGE TAMPERING AND REVIEW OF TAMPERING DETECTION TECHNIQUES

STUDY OF IMAGE TAMPERING AND REVIEW OF TAMPERING DETECTION TECHNIQUES DOI: http://dx.doi.org/10.26483/ijarcs.v8i7.4541 Volume 8, No. 7, July August 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN

More information

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS Hui Su, Ravi Garg, Adi Hajj-Ahmad, and Min Wu {hsu, ravig, adiha, minwu}@umd.edu University of Maryland, College Park ABSTRACT Electric Network (ENF) based forensic

More information

Convolutional Neural Network-based Steganalysis on Spatial Domain

Convolutional Neural Network-based Steganalysis on Spatial Domain Convolutional Neural Network-based Steganalysis on Spatial Domain Dong-Hyun Kim, and Hae-Yeoun Lee Abstract Steganalysis has been studied to detect the existence of hidden messages by steganography. However,

More information

CNN-BASED DETECTION OF GENERIC CONTRAST ADJUSTMENT WITH JPEG POST-PROCESSING

CNN-BASED DETECTION OF GENERIC CONTRAST ADJUSTMENT WITH JPEG POST-PROCESSING CNN-BASED DETECTION OF GENERIC CONTRAST ADJUSTMENT WITH JPEG POST-PROCESSING M.Barni #, A.Costanzo, E.Nowroozi #, B.Tondi # # Department of Information Engineering and Mathematics University of Siena CNIT

More information

Image Splicing Detection

Image Splicing Detection Image Splicing Detection Ryan Griebenow University of Colorado, Colorado Springs Colorado Springs, CO 80915 Email: rgrieben@uccs.edu Abstract Thus far, most research in Image Forgery Detection has concentrated

More information

Automatic source camera identification using the intrinsic lens radial distortion

Automatic source camera identification using the intrinsic lens radial distortion Automatic source camera identification using the intrinsic lens radial distortion Kai San Choi, Edmund Y. Lam, and Kenneth K. Y. Wong Department of Electrical and Electronic Engineering, University of

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

Copy-Move Image Forgery Detection using SVD

Copy-Move Image Forgery Detection using SVD Copy-Move Image Forgery Detection using SVD Mr. Soumen K. Patra 1, Mr. Abhijit D. Bijwe 2 1M. Tech in Communication, Department of Electronics & Communication, Priyadarshini Institute of Engineering &

More information

Application of Histogram Examination for Image Steganography

Application of Histogram Examination for Image Steganography J. Appl. Environ. Biol. Sci., 5(9S)97-104, 2015 2015, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Application of Histogram Examination

More information