Journal of Network and Computer Applications

Size: px
Start display at page:

Download "Journal of Network and Computer Applications"

Transcription

1 Journal of Network and Computer Applications 34 (2011) Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: A passive image authentication scheme for detecting region-duplication forgery with rotation Guangjie Liu a,n, Junwen Wang a, Shiguo Lian b, Zhiquan Wang a a School of Automation, Nanjing University of Science & Technology, Nanjing , China b France Telecom R&D (Orange Labs) Beijing, Beijing , China article info Article history: Received 6 March 2010 Received in revised form 9 August 2010 Accepted 1 September 2010 Available online 7 September 2010 Keywords: Region duplication Image forensics Passive authentication Hu moment Rotation Robustness abstract Region-duplication forgery is one of most common tampering artifices. Several methods have been developed to detect and locate the tampered region, while most methods do fail when the copied region is rotated before being pasted because of the de-synchronization in the searching procedure. To solve the problem, the paper proposes an efficient and robust passive authentication method that uses the circle block and the Hu moments to detect and locate the duplicate regions with rotation. Experimental results show that our method is robust not only to noise contamination, blurring and JPEG compression, but also to the rotation. Meanwhile, the proposed method has better time performance compared with exiting methods because of the lower feature dimension. & 2010 Elsevier Ltd. All rights reserved. 1. Introduction It is a very sophisticated skill to tamper images in the past film time, which usually requires the forger to have professional dark-room equipments such as the special developer, the photographic paper, and so on. With the wide application of powerful digital image processing software, such as Photoshop, it has become easier and easier to create digital forgeries from one or multiple images. The tampered image might cause some great threats. For example, in 2007, the event of South China tiger s photograph misled many people to believe the existence of wild South China tiger, while finally, the photograph was proved to be a paper tiger (Lian and Zhang, 2010). In 2008, Iran published a picture of missile test, which contains 4 missiles in rocketing. It is doubted that one of the missile is copied from another one (Lian and Zhang, 2010). Through the above examples, we can find that the multimedia forgery will bring many troubles. In the photo contest, some journalists make the forgery photos, which disobey the principle of fair play. In the news reports, the forgery pictures will distort the truth and mislead public opinions. And, someone may change the person s face in a photo with another person s, and put the n Corresponding author. addresses: gjieliu@gmail.com (G. Liu), junwen_wang@yahoo.com.cn (J. Wang), shiguo.lian@orange-ftgroup.com (S. Lian), wangzqwhz@yahoo.com.cn (Z. Wang). forged image over Internet, which also destroys the person s privacy or reputation. A faked image also may be used in the academic paper to indicate a better experimental result. Furthermore, the important object may be wiped off from an evidence image, which causes the miscarriage of the court. Thus, it is important and critical to tell When is seeing believing? According to the above analysis, a multimedia forensics system (MFS) is urgently needed for identification of the authenticity of a multimedia object as illustrated in Fig. 1. Here, we just discuss the forensics of digital image. There are two kinds of techniques, the active authentication and the passive one (Lian et al., 2009). The active methods can be divided into two classes. The first class is based on digital watermarking that embeds a watermark into the image at the acquirement end and extracts it at the authentication end to check whether the image is tampered. The second class is based on the digital signature. It generates a signature at the acquirement end and regenerates another one using the same method at the authentication end. Through comparison, the authenticity of the image can be identified. The passive authentication, also called digital forensic, is the method to make authentication without any help of the additional information. The typical applications include media source identification (Ng and Tsui, 2009a,b), forgery detection (Wang et al., 2009a,b), etc. Taking image forgery detection for example, it makes use of images distinct properties to detect unnatural operations and identify the tampered regions (Zhang and Kong, 2009; Cao et al., 2009) /$ - see front matter & 2010 Elsevier Ltd. All rights reserved. doi: /j.jnca

2 1558 G. Liu et al. / Journal of Network and Computer Applications 34 (2011) Fig. 1. Application scenarios of multimedia forensics system. We know that in the process of a skilled forgery, besides changing the important region about the image content, there are lots of post-processing manners that can be used to remove the artificial trace. The post-processing will not make the forensic work, so how to deal with various post-processing and improve the robustness of forensic methods has become a very important subject. In this paper, we propose a method to deal with a complex region-duplication forgery including region-rotation and other kinds of post-processing. The rest of the paper is organized as follows. In Section 2, the related work about the passive authentication and the regionduplication forgery model are introduced. The mechanism of feature extraction and the detection method are presented in detail in Section 3. In Section 4, some experimental results are given and the corresponding analysis is presented. Finally, some conclusions are drawn in Section Related work In recent years, many researchers have started to develop passive techniques for detecting various forms of image forgeries. Farid et al. developed several statistical methods for detecting forgeries based on region duplication (Popescu and Farid, 2004), color filter interpolation (Popescu and Farid, 2005a,b), re-sampling (Popescu and Farid, 2005a,b) and lamp direction (Johnson and Farid, 2005). Fridrich et al. (2003) presented methods for detecting the copy-move forgery and performed the forgery detection based on the pattern noise of digital cameras sensor (Lukas et al., 2006). Ng and Chang (2004) and Ng et al. (2005) proposed an image spicing model to detect photomontage and physics-based models to distinguish computer graphics from natural photographs. Luo et al. (2007) developed a method to detect cropped and recompressed image blocks. They also presented a new method for detecting the region-duplication forgery (Luo et al., 2006). Zhou et al. (2007) and Kirchner (2008) proposed some methods to detect re-sampling and blur. Here we mainly pay our attention to region-duplication forgery Model of region-duplication forgery Luo et al. (2006) gave a model of region-duplication forgery. This model describes four basic constraints of region-duplication forgery, including the region connectivity, two regions unintersection, translation vector constraint and the duplicate region area threshold. It assumes that the largest copied region must be holeless and be pasted away from its original location without intersecting with its primer location. However, this model cannot describe the forgery when one copy region is pasted onto two places, and the copy region is rotated before being pasted. A more comprehensive region-duplication forgery model was given by Wang et al. (2009a, b). Assuming that the translation vector threshold is V T ¼[V tx,v ty ], and the copy-region area threshold (defined as the ratio of the copy region s area and the whole image s) is A T, we say an image I is tampered to I 0 via regionduplication means, if i) The copy region C i, ia{1,2,y,n} is connective and has no hole inside, and its area is larger than A T a(i), where a(i) denotes the area of the image I. ii) Suppose the duplication of the copy region C i is M i,theremightbe many region-duplication pairs {C 1 99M 1,C 2 99M 2,y,C n 99M n },C i,m i CI 0, which satisfy C i ac j,8iaj, i,jaf1,2,...,ng and C i \M i ¼. Forany pair C i 99M i, defining the origin of the reference frame as the rotation center, the duplication forgery can be considered as shifting after rotating, described by 8ðx,yÞAC i, f ðx,yþ¼fuðxu,yuþ xu ¼ xcosy ysinyþd x yu ¼ xsinyþycosyþd y qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi D 2 x þd2 y Z9V T 9 aðc i Þ4A T UaðIÞ ð1þ Here, f denotes the pixel at the position (x,y), D x,d y is the shift distance along x and y axis, respectively, and y is the rotation angle. It should be noted that in an intact forgery process, the image tampered by region-duplication artifice is often processed by other operations to eliminate the imprint caused by the forgery. The common means are lossy compressing, noise contamination, filtering and so on. Therefore the two duplicate regions are not equal exactly, and how to make the duplication detection with the inferences of post-processing has become an important issue Current region-duplication forgery detection methods According to the forgery process, the similar regions have large size is more possible to be faked. Therefore the detection focuses on how to find the similar regions with as short time as possible. For improving the robustness and decreasing the computational complexity, Fridrich et al. (2003) analyzed the DCT coefficients of each block and proposed the method based on fuzzy matching. The method just worked well under the JPEG compression attack. Popescu and Farid (2004) proposed to capture the main feature of image blocks by principal component analysis (PCA), and complete

3 G. Liu et al. / Journal of Network and Computer Applications 34 (2011) the duplication detection through the matching of PCA coefficients. The method would fail when the JPEG compression factor was lower than 50 or the SNR after adding Gaussian white noise is smaller than 24 db. To make the detection method faster and more robust, Luo et al. (2006) presented a detection method based on the elaborately chosen characteristic features. Performance comparison of different region duplication methods can be seen in Table 1. The three methods mentioned above use the features to match two blocks, and they have a limitation, i.e., only the postprocessing is considered. When the copy region is rotated, the manner to choose square image block will fail as shown in Fig. 2(a). The block B 1 is obtained by the square block matching, while the same block B 2 cannot be obtained by the same fashion. In the paper, we present to use the circle region to replace the square block and adopt the invariant moments of the circle region to overcome the effect of rotation. Fig. 2(b) gives the pattern of the circle block. We can see that C 2 is actually the rotated version of C 1. Hence, if we construct the rotation-invariant features, the traditional matching procedure can also work. 3. Proposed region-duplication detection scheme Different from existing methods, the proposed method matches the blocks based on circles. Firstly, the image is decomposed by Gaussian pyramid, and the produced sub-image in low frequency is chosen to overcome the possible distortion caused by JPEG compression and noise contamination. Then, the sub-image is divided into many circle blocks overlapping each other. And, the features of Hu moments are extracted from the circle blocks, used as the matching features. Here, the circle-block mode and the Hu moments are able to eliminate the effect of rotation. At last, the forgery regions are located by comparing shift vectors and copy-region areas. down using a Gaussian average (Gaussian blur) and scaled down. When this technique is used multiple times, it creates a stack of successively smaller images, with each pixel containing a local average that corresponds to a pixel neighborhood on a lower level of the pyramid. Fig. 3 gives the illustration about Gaussian pyramid decomposition. Let the original image be G 0, which is taken as the zero level, the lth level image of Gaussian pyramid decomposition can be obtained by making the l 1th level image convoluted by a window function w(m,n) with low-pass characteristics, and doing the downsampling after the convolution. The process can be described as G l ði,jþ¼ X2 X 2 m ¼ 2n ¼ 2 wðm,nþg l 1 ð2iþm,2jþnþ The window function w is also called the weight function or the generation kernel, whose size is usually chosen as 5 5. Here, the Gaussian pyramid decomposition can not only reduce the complexity of the detection algorithm, but also help to improve the detection result when there are some post-processing operation such as JPEG compression and noise contamination. The reason is that the features extracted from the Gaussian pyramid decomposed image are more robust against those operations Hu invariant moments Image moments (Flusser and Suk, 2006) have been widely used in image processing, computer vision and related fields. For a 2-D continuous function f(x,y), the moment (sometimes called ð2þ 3.1. Feature extraction Gaussian pyramid decomposition Gaussian pyramid (Fosyth and Ponce, 2000) is a common decomposition manner often used in image processing. The technique involves creating a series of images which are weighted Table 1 Performance comparison of different region duplication methods. Methods Robustness to post-processing computation complexity Popescu and Farid Middle High Fridrich et al. Middle High Luo et al. High Middle Fig. 3. The illustration of Gaussian pyramid decomposition. Fig. 2. Model of region-duplication forgery: (a) model with square block and (b) model with circle block.

4 1560 G. Liu et al. / Journal of Network and Computer Applications 34 (2011) raw moment ) of order (p+q) is defined as ZZ m pq ¼ x p y q f ðx,yþdxdy p,q ¼ 0,1,2... ð3þ scaling, translation and rotation. The seven moments are defined as f 1 ¼ y 20 þy 02 ð7þ Adapting this to gray image with pixel intensities I(x,y), the raw image s moments m ij are calculated by m ij ¼ X X x i y j Iðx,yÞ: ð4þ x y f 2 ¼ðy 20 þy 02 Þ 2 þ4y 2 11 f 3 ¼ðy 30 3y 12 Þ 2 þð3y 21 y 03 Þ 2 f 4 ¼ðy 30 þy 12 Þ 2 þðy 21 þy 03 Þ 2 ð8þ ð9þ ð10þ The zero-order moment denotes the mass of an image: ZZ m 00 ¼ f ðx,yþdxdy ð5þ f 5 ¼ðy 30 3y 12 Þðy 30 þy 12 Þ½ðy 30 þy 12 Þ 2 3ðy 21 þy 03 Þ 2 Š þð3y 21 y 03 Þðy 21 þy 03 Þ½3ðy 30 þy 12 Þ 2 ðy 21 þy 03 Þ 2 Š ð11þ The first-order moments (m 10,m 01 ) are commonly used to determine the centroid of an image by (x c,y c ): x c ¼m 10 /m 00, y c ¼m 01 /m 00. If the origin of the reference frame is moved to the centroid, the centralized moments can be obtained by ZZ u pq ¼ ðx x c Þ p ðy y c Þ q f ðx,yþdxdy p,q ¼ 0,1,2... ð6þ f 6 ¼ðy 20 y 02 Þ½ðy 30 þy 12 Þ 2 ðy 21 þy 03 Þ 2 Š þ4y 11 ðy 30 þy 12 Þðy 21 þy 03 Þ f 7 ¼ð3y 21 y 03 Þðy 30 þy 12 Þ½ðy 30 þy 12 Þ 2 3ðy 21 þy 03 Þ 2 Š þð3y 12 y 30 Þðy 21 þy 03 Þ½3ðy 30 þy 12 Þ 2 ðy 21 þy 03 Þ 2 Š ð12þ ð13þ The centralized moments have the characteristic of translation invariance. When the image is rotated or scaled the centralized moments will not change. Construction of moments with rotation, scaling and translation invariance is very important for many applications such as pattern recognition, multimedia searching and digital watermarking. For the goal, the normalized centralized moments are built up as y pq ¼ u pq =u r 00, r¼(p+q+2)/2, p+q¼2,3,y, which are invariant against scaling. Hu (1962) utilized the second and third order normalized centralized moments to construct seven invariant moments, which can hold invariant against In this paper, because of using circle blocks, the Hu moments is computed only in the circle region, as shown in Fig. 4(a). To evaluate the invariance of Hu moments, we perform an experiment: choose the circle block with radius equaling to 10, and perform many post-processing operations such as rotation 451, adding Gaussian noise, Gaussian blurring and so on. The seven Hu moments of the block and its neighboring circle block are computed as shown in Table 2. The original block is the block of image goldhill covering pixels (100:120,100:120), while the other block (pasted) covers pixels (105:125,105,125). In Table 2, Fig. 4. Circle block pattern: (a) circle region and (b) circle choosing in the image. Table 2 Invariance of Hu moments Moment absolute log value Original block Rotate 45 o Gaussian blurring Noise adding JPEG Compressing (quality¼70) Other block f f f f f f f

5 G. Liu et al. / Journal of Network and Computer Applications 34 (2011) we can see that Hu moments are robust against rotation, blurring, noise adding and JPEG compression, and they can be taken as features to stand for the block because the moments values are very different for two different regions. Thus, they are suitable features for checking block matching. With the consideration of decreasing the computational complexity, we choose the first four moments as the feature, F¼[f 1,f 2,f 3,f 4 ]. threshold T d is chosen as 12 to improve the performance of correct detection. As we know that when there are no larger flat areas in an image (such as sky, cloud), the similar regions will seldom occur. Luo et al. (2006) indicated that the area of the similar region is not less than 0.85% of the area of the whole image. Therefore, we choose the area threshold T a equal to 0.85% a(i) Forgery detection Sorting the component of F Let the size of image be X Y, after Gaussian pyramid decomposition, the low frequency part is X=2 y=2. After dividing the sub-image into 2r 2r square block, the neighboring blocks will have only one different column or row as shown in Fig. 4(b). Thus, we can get T ¼ð X=2 2r þ1þð Y=2 2r þ1þ circles from these blocks. For each circle, we compute the first four Hu moments to construct the feature F i, i¼1,y,t. To improve the search speed, we sort these features by the first component f 1, and store them into a matrix X, which has 4 T components. In the searching process, for the feature F i, we just need to search a given scope in X, which can debase the computational time. Here, we define the searching scope as L, for a given feature, only the left and right L columns in the matrix X are searched Thresholds setting In this method, there are three thresholds to be predetermined. They are the similarity threshold T s, the distance threshold T d and the area threshold T a, respectively. To measure the similarity, the Euclid distance between two feature vectors are computed by vffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ux 4 SIMðF 1,F 2 Þ¼t i ¼ 1 ðf 1 i f2 i Þ2 F 1 ¼½f 1 1,f1 2,f1 3,f1 4 Š, F 2 ¼½f 2 1,f2 2,f2 3,f2 4 Š ð14þ To determine the threshold, we perform an experiment. In the experiment, we firstly choose 500 images to make random forgery, with the size of tampered block as Then, the tampered images are processed by adding Gaussian white noises, JPEG compression with quality equal to 50, and Gaussian blurring, by computing the similarity defined by Eq. (14). Because we know which blocks are duplicated, we can calculate the similarity of the duplicated regions and obtain the average threshold. According to the experiment the threshold T s is chosen as 0.4. Because the neighboring blocks often have greater similarity, the distance Detection algorithm According to the above discussion, the whole forgery detection algorithm, shown in Fig. 5, can be described as follows: i) For the suspicious image I, perform Gaussian pyramid decomposition, extract the low frequency part G 1. ii) Divide G 1 into ð X=2 2r þ1þð Y=2 2r þ1þ overlapped square blocks with two neighboring blocks having only one pixel distance along horizontal or vertical direction, and get the corresponding circle region. iii) Calculate the feature F i for each circle, sort them by the first component of F i, f 1, to get a matrix X, and recode the coordinate of each feature as (x i,y i ), which equals to the center of each circle. Here the sort process is used to decrease the searching space. iv) Initialize a zero matrix J with the size equaling to G 1. In the matrix X, search similar blocks by the following algorithm, and record the search results into J. Search circle similar to the circle i for(k¼i L,koi+L,i++) { qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi if SIMðF i,f k ÞrT s & ðx i x k Þ 2 þðy i y k Þ 2 ZT d J(x i,y i )¼J(x k,y k )¼1; } v) Perform morphologic operations on J to fill the holes in the marked regions, and remove the small and isolated regions according to the area threshold T a. 4. Experiments and analysis In our algorithm, we choose gray images as examples. For color images, the detection can perform on the intension components. The size of images for testing is , and the radius of circle is chosen as 7. Fig. 5. Steps of the proposed forgery detection process.

6 1562 G. Liu et al. / Journal of Network and Computer Applications 34 (2011) Robustness against JPEG compression and noise contamination We use Photoshop CS3 to make the region-duplication forgery. The original image is shown in Fig. 6(a), the tampered image is shown in Fig. 6(b). Without any post-processing, the detection result is shown in Fig. 6(c). Thus, our method can detect the multiple regionduplication forgery. For evaluating the robustness, we make a series of postprocessing such as noise contamination, JPEG compressing and Gaussian blurring. The experimental results are shown in Figs. 7 9, respectively. As can be seen, the proposed scheme is robust to the common signal processing operations Robustness against rotation The basic motivation of our scheme is to use the circle block and Hu moments to present the invariant features when the copy regions are rotated. The following experiments shown in Fig. 10 are designed to detect the duplicate region when it is rotated with different degrees Detection performance The performance of the algorithm can be described by the following two indices: P r ¼ i ð9c i \ Cu i 9þ9M i \ M 0 i P 9Þ i ð9c i9þ9m i 9Þ ð15þ P i w ¼ ð9c i [ Cu i 9þ9M i [ M 0 i P 9Þ i ð9c r i9þ9m i 9Þ ð16þ Here, C i is the copy region and M i is the tampered region. Correspondently, Cu i and Mu i are the detected copy region and the detected tampered region, respectively. The index r is the ratio of right detection (detection ratio), while w is the ratio of wrong detection (false ratio). Choose 500 images each with size equaling to , copy one block in an image, paste onto other unintersective region, and perform a series of post-processing including Gaussian blurring, JPEG compressing, adding Gaussian white noise. In the test, we use the four different tampering block size 0.853%(32 32), 1.92%(48 48), Fig. 6. Basic test: (a) original image, (b) tampered image and (c) detection result. Fig. 7. Test under AWGN: (a) SNR¼35, (b) SNR¼25 and (c) SNR¼15. Fig. 8. Test under JPEG compressing: (a) quality¼85, (b) quality¼65 and (c) quality¼45.

7 G. Liu et al. / Journal of Network and Computer Applications 34 (2011) Fig. 9. Test under Gaussian blurring:(a) d 2 ¼1, (b) d 2 ¼2 and (c) d 2 ¼3. Fig. 10. Test under region rotation: (a) original image, (b) copy region rotated by 201, (c) copy region rotated by 121, (d) detection result of (b), (e) detection result of (c), (f) original image, (g) copy region rotated 901, (h) copy region with horizontal flipping, (i) detection result of (g) and (j) detection result of (h).

8 1564 G. Liu et al. / Journal of Network and Computer Applications 34 (2011) %(64 64) and 5.333%(80 80). The detection ratio and false ratio under different operations are shown in Table 3, Figs. 11 and 12, respectively. From these results, we can see that the proposed method works well under different conditions. When the tampered region area becomes larger, the detection ratio also becomes larger, while the false ratio becomes smaller. It opens out that the larger the tampered region, the more accurate the detection algorithm. The paper makes the improvement both from the two directions. By using Gaussian pyramid decomposition, the dimension of search space is reduced to the 1/4 of its original amount. And only the first four Hu moments are used as the feature of a block, so the feature dimension does also decrease. For the gray image with size equaling to , Table 4 gives the comparison between our method and other methods. As can be seen, our method uses the least block amount and feature dimension Computational complexity The important problem in region-duplication detection is the computational complexity. There are some artifices that can be used to reduce the computational complexity, which can be classified into two types. One is to find a method to search in the low dimension space, such as the low frequency wavelet subimage, DCT coefficient matrix, etc. The other is to endeavor reducing the dimension of each block, e.g., those methods based on PCA or statistics features. 5. Conclusions The region-duplication forgery is a very common forgery manner. Some researchers have proposed several efficient methods to detect and locate the regions. But because the forger can carry out more complicated forgery during the process of copying and pasting, the more powerful method should be studied. In this paper, we consider the disturbance from the Table 3 The detection results under Gaussian blurring (n 1 ¼n 2 ¼5, d 2 ¼1). Tampering region r w Table 4 Computation complexity comparisons. Methods Extraction domain Block amount Feature dimension Popescu and Farid PCA Fridrich et al. DCT Luo et al. Spatial domain Our method Low frequency part r w SNR/db SNR/db Fig. 11. Performance under adding noise: (a) detection ratio under adding noise and (b) false ratio under adding noise r w Compression Factor Compression Factor Fig. 12. Performance under JPEG Compression: (a) detection ratio under JPEG compression and (b) false ratio under JPEG Compression.

9 G. Liu et al. / Journal of Network and Computer Applications 34 (2011) rotation. Features are extracted from the first four Hu moments of the circle blocks in low frequency part of Gaussian pyramid decomposition. Experiments and analysis prove that the proposed method have nice robustness to post-processing and copy-region rotation, and obtain efficient detection performance compared with existing works. It should be noted that in our scheme, Hu moments are only computed on the inscribed circle of the square. Discarding the pixels outside the inscribed circle will have a little effect on the false alarm of the detection algorithm. Hence in future work, the new rotation-invariant features should be constructed directly on the circle region. Additionally, for other intermediate-processing such as resizing, cropping etc., the corresponding robust detection method will be investigated. Acknowledgments This study was supported by the China Post Doctor Foundation of China (Grant no ), NSF of Jiangsu and Post Doctor Foundation of Jiangsu province (Grant no. BK ), Graduate Research, Innovation Project of Jiangsu Province (CX09B_100Z) and NUST Research Funding (Grant no. 2010ZYTS048). References Cao G, Zhao Y, Ni R. Statistical fusion of multiple cues for image tampering detection. Proceedings of International Conference on Multimedia and Expo 2009: Flusser J, Suk T. Rotation moment invariants for recognition of symmetric objects. IEEE Transaction on Image Processing 2006;15: Fosyth D, Ponce J. Computer vision: a modern approach. Prentice Hall; Fridrich J, Soukal D, Lukas J. Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop Hu MK. Visual pattern recognition by moment invariants. IEEE Transaction on Information Theory 1962;8: Johnson MK, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. Proceedings of ACM Multimedia Security Workshop 2005:1 9. Kirchner M. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. Proceedings of the ACM Workshop on Multimedia and Security 2008: Lian SG, Kanellopoulos D, Ruffo G. Recent advances in multimedia information system security. Informatica 2009;33:3 24. Lian SG, Zhang Y. Multimedia forensics for detecting forgeries. In: Stavroulakis Peter, Stamp Mark, editors. Handbook on communications and information security. Springer; Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor pattern noise. IEEE Transaction in Information Forensics and Security 2006;1: Luo WQ, Huang JW, Qiu GP. Robust detection of region-duplication forgery in digital image. Proceedings of International Conference on Pattern Recognition 2006: Luo WQ, Qu ZH, Huang JW, Qiu GP. A novel method for detecting cropped and recompressed image block. Proceedings of IEEE Conference on Acoustics. Speech, and Signal Processing 2007: Ng TT, Chang SF, Hsu J, Xie L, Tsui MP. Physics-motivated features for distinguishing photographic images and computer graphics. Proceedings of the ACM Multimedia 2005: Ng TT, Tsui M. Camera response function signature for digital forensics Part I: theory and data selection. Proceedings of IEEE Workshop on Information Forensics and Security 2009a: Ng TT, Tsui M Camera response function signature for digital forensics Part II: signature extraction. Proceedings of IEEE Workshop on Information Forensics and Security 2009b Ng TT, Chang SF. A model for image splicing. Proceedings of International Conferenence of Image Processing 2004: Popescu A, Farid H. Exposing digital forgeries by detecting duplicated image regions. USA: Dartmouth College; Popescu AC, Farid H. Exposing digital forgeries by detecting traces of re-sampling. IEEE Transaction in Signal Processing 2005a;53: Popescu AC, Farid H. Exposing digital forgeries in color filter array interpolated images. IEEE Transaction on Signal Processing 2005b;53: Wang JW, Liu GJ, Dai YW, Wang ZQ. Detecting JPEG image forgery based on double compression. Journal of Systems Engineering and Electronics 2009a;20: Wang JW, Liu GJ, Zhang Z, Dai YW, Wang ZQ. Fast and robust forensics for image region-duplication forgery. Acta Automatica Sinica 2009b;35: Zhang P, Kong XW. Detecting image tampering using feature fusion. Proceedings of International Conference on Availability, Reliability and Security 2009: Zhou LN, Wang DM, Guo YB, Zhang JF. Blur detection of digital forgery using mathematical morphology. Proceeding of KES AMSTA 2007:990 8.

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department

More information

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in

More information

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian

More information

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Feature Based Analysis of Copy-Paste Image Tampering

More information

Camera identification from sensor fingerprints: why noise matters

Camera identification from sensor fingerprints: why noise matters Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS

More information

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,

More information

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area

More information

Exposing Digital Forgeries from JPEG Ghosts

Exposing Digital Forgeries from JPEG Ghosts 1 Exposing Digital Forgeries from JPEG Ghosts Hany Farid, Member, IEEE Abstract When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

Image Forgery Identification Using JPEG Intrinsic Fingerprints

Image Forgery Identification Using JPEG Intrinsic Fingerprints 1 Image Forgery Identification Using JPEG Intrinsic Fingerprints A. Garg, A. Hailu, and R. Sridharan Abstract In this paper a novel method for image forgery detection is presented. he method exploits the

More information

Forgery Detection using Noise Inconsistency: A Review

Forgery Detection using Noise Inconsistency: A Review Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by

More information

Tampering and Copy-Move Forgery Detection Using Sift Feature

Tampering and Copy-Move Forgery Detection Using Sift Feature Tampering and Copy-Move Forgery Detection Using Sift Feature N.Anantharaj 1 M-TECH (IT) Final Year, Department of IT, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India 1 ABSTRACT:

More information

A Novel Approach for Detection of Copy Move Forgery using Completed Robust Local Binary Pattern

A Novel Approach for Detection of Copy Move Forgery using Completed Robust Local Binary Pattern Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 2, March 2015 A Novel Approach for Detection of Copy Move Forgery using Completed

More information

Correlation Based Image Tampering Detection

Correlation Based Image Tampering Detection Correlation Based Image Tampering Detection Priya Singh M. Tech. Scholar CSE Dept. MIET Meerut, India Abstract-The current era of digitization has made it easy to manipulate the contents of an image. Easy

More information

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX 77341,

More information

Copy-Move Image Forgery Detection using SVD

Copy-Move Image Forgery Detection using SVD Copy-Move Image Forgery Detection using SVD Mr. Soumen K. Patra 1, Mr. Abhijit D. Bijwe 2 1M. Tech in Communication, Department of Electronics & Communication, Priyadarshini Institute of Engineering &

More information

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot 24 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY Khosro Bahrami and Alex C. Kot School of Electrical and

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.

More information

Automation of JPEG Ghost Detection using Graph Based Segmentation

Automation of JPEG Ghost Detection using Graph Based Segmentation International Journal Of Computational Engineering Research (ijceronline.com) Vol. Issue. 2 Automation of JPEG Ghost Detection using Graph Based Segmentation Archana V Mire, Dr S B Dhok 2, Dr P D Porey,

More information

Different-quality Re-demosaicing in Digital Image Forensics

Different-quality Re-demosaicing in Digital Image Forensics Different-quality Re-demosaicing in Digital Image Forensics 1 Bo Wang, 2 Xiangwei Kong, 3 Lanying Wu *1,2,3 School of Information and Communication Engineering, Dalian University of Technology E-mail:

More information

Image De-Noising Using a Fast Non-Local Averaging Algorithm

Image De-Noising Using a Fast Non-Local Averaging Algorithm Image De-Noising Using a Fast Non-Local Averaging Algorithm RADU CIPRIAN BILCU 1, MARKKU VEHVILAINEN 2 1,2 Multimedia Technologies Laboratory, Nokia Research Center Visiokatu 1, FIN-33720, Tampere FINLAND

More information

Tampering Detection Algorithms: A Comparative Study

Tampering Detection Algorithms: A Comparative Study International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study

More information

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif

More information

PRIOR IMAGE JPEG-COMPRESSION DETECTION

PRIOR IMAGE JPEG-COMPRESSION DETECTION Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION

More information

A new seal verification for Chinese color seal

A new seal verification for Chinese color seal Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

Detection of Rail Fastener Based on Wavelet Decomposition and PCA Ben-yu XIAO 1, Yong-zhi MIN 1,* and Hong-feng MA 2

Detection of Rail Fastener Based on Wavelet Decomposition and PCA Ben-yu XIAO 1, Yong-zhi MIN 1,* and Hong-feng MA 2 2017 2nd International Conference on Information Technology and Management Engineering (ITME 2017) ISBN: 978-1-60595-415-8 Detection of Rail Fastener Based on Wavelet Decomposition and PCA Ben-yu XIAO

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,

More information

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies International Journal of Computer and Communication Engineering, Vol. 4, No., January 25 Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies Bo Liu and Chi-Man Pun Noise patterns

More information

Exposing Image Forgery with Blind Noise Estimation

Exposing Image Forgery with Blind Noise Estimation Exposing Image Forgery with Blind Noise Estimation Xunyu Pan Computer Science Department University at Albany, SUNY Albany, NY 12222, USA xypan@cs.albany.edu Xing Zhang Computer Science Department University

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

Multiresolution Analysis of Connectivity

Multiresolution Analysis of Connectivity Multiresolution Analysis of Connectivity Atul Sajjanhar 1, Guojun Lu 2, Dengsheng Zhang 2, Tian Qi 3 1 School of Information Technology Deakin University 221 Burwood Highway Burwood, VIC 3125 Australia

More information

Background Pixel Classification for Motion Detection in Video Image Sequences

Background Pixel Classification for Motion Detection in Video Image Sequences Background Pixel Classification for Motion Detection in Video Image Sequences P. Gil-Jiménez, S. Maldonado-Bascón, R. Gil-Pita, and H. Gómez-Moreno Dpto. de Teoría de la señal y Comunicaciones. Universidad

More information

S SNR 10log. peak peak MSE. 1 MSE I i j

S SNR 10log. peak peak MSE. 1 MSE I i j Noise Estimation Using Filtering and SVD for Image Tampering Detection U. M. Gokhale, Y.V.Joshi G.H.Raisoni Institute of Engineering and Technology for women, Nagpur Walchand College of Engineering, Sangli

More information

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): 2321-0613 High-Quality Jpeg Compression using LDN Comparison and Quantization Noise Analysis S.Sasikumar

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

Impeding Forgers at Photo Inception

Impeding Forgers at Photo Inception Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth

More information

Image Manipulation Detection using Convolutional Neural Network

Image Manipulation Detection using Convolutional Neural Network Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National

More information

Detail preserving impulsive noise removal

Detail preserving impulsive noise removal Signal Processing: Image Communication 19 (24) 993 13 www.elsevier.com/locate/image Detail preserving impulsive noise removal Naif Alajlan a,, Mohamed Kamel a, Ed Jernigan b a PAMI Lab, Electrical and

More information

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models

More information

MLP for Adaptive Postprocessing Block-Coded Images

MLP for Adaptive Postprocessing Block-Coded Images 1450 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 10, NO. 8, DECEMBER 2000 MLP for Adaptive Postprocessing Block-Coded Images Guoping Qiu, Member, IEEE Abstract A new technique

More information

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ A REVIEW OF TRENDS IN DIGITAL IMAGE PROCESSING FOR FORENSIC CONSIDERATION Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ Department of Forensic Science Sam Higginbottom Institute of agriculture Technology

More information

A Geometric Correction Method of Plane Image Based on OpenCV

A Geometric Correction Method of Plane Image Based on OpenCV Sensors & Transducers 204 by IFSA Publishing, S. L. http://www.sensorsportal.com A Geometric orrection Method of Plane Image ased on OpenV Li Xiaopeng, Sun Leilei, 2 Lou aiying, Liu Yonghong ollege of

More information

Fragile Sensor Fingerprint Camera Identification

Fragile Sensor Fingerprint Camera Identification Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera

More information

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic

More information

PoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2

PoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2 Based on Cepstral Mixed Features 12 School of Information and Communication Engineering,Dalian University of Technology,Dalian, 116024, Liaoning, P.R. China E-mail:zww110221@163.com Xiangwei Kong, Xingang

More information

Digital Image Forgery Identification Using Motion Blur Variations as Clue

Digital Image Forgery Identification Using Motion Blur Variations as Clue Digital Image Forgery Identification Using Motion Blur Variations as Clue P. M. Birajdar*, N. G. Dharashive** Abstract: Fake images have become common in society today. In all forms of media one can easily

More information

Retrieval of Large Scale Images and Camera Identification via Random Projections

Retrieval of Large Scale Images and Camera Identification via Random Projections Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management

More information

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

Interpolation of CFA Color Images with Hybrid Image Denoising

Interpolation of CFA Color Images with Hybrid Image Denoising 2014 Sixth International Conference on Computational Intelligence and Communication Networks Interpolation of CFA Color Images with Hybrid Image Denoising Sasikala S Computer Science and Engineering, Vasireddy

More information

Literature Survey on Image Manipulation Detection

Literature Survey on Image Manipulation Detection Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,

More information

Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2, b, Ma Hui2, c

Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2, b, Ma Hui2, c 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2,

More information

WITH the availability of powerful image editing tools,

WITH the availability of powerful image editing tools, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 507 Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection

More information

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11, FPGA IMPLEMENTATION OF LSB REPLACEMENT STEGANOGRAPHY USING DWT M.Sathya 1, S.Chitra 2 Assistant Professor, Prince Dr. K.Vasudevan College of Engineering and Technology ABSTRACT An enhancement of data protection

More information

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Mo Chen, Jessica Fridrich, Jan Lukáš, and Miroslav Goljan Dept. of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000,

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform

More information

CS534 Introduction to Computer Vision. Linear Filters. Ahmed Elgammal Dept. of Computer Science Rutgers University

CS534 Introduction to Computer Vision. Linear Filters. Ahmed Elgammal Dept. of Computer Science Rutgers University CS534 Introduction to Computer Vision Linear Filters Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines What are Filters Linear Filters Convolution operation Properties of Linear Filters

More information

FPGA implementation of DWT for Audio Watermarking Application

FPGA implementation of DWT for Audio Watermarking Application FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade

More information

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence

More information

An Adaptive Kernel-Growing Median Filter for High Noise Images. Jacob Laurel. Birmingham, AL, USA. Birmingham, AL, USA

An Adaptive Kernel-Growing Median Filter for High Noise Images. Jacob Laurel. Birmingham, AL, USA. Birmingham, AL, USA An Adaptive Kernel-Growing Median Filter for High Noise Images Jacob Laurel Department of Electrical and Computer Engineering, University of Alabama at Birmingham, Birmingham, AL, USA Electrical and Computer

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens

A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens Kai Wang Univ. Grenoble Alpes, CNRS, Grenoble INP, GIPSA-lab, 38000 Grenoble, France Abstract It is

More information

Tan-Hsu Tan Dept. of Electrical Engineering National Taipei University of Technology Taipei, Taiwan (ROC)

Tan-Hsu Tan Dept. of Electrical Engineering National Taipei University of Technology Taipei, Taiwan (ROC) Munkhjargal Gochoo, Damdinsuren Bayanduuren, Uyangaa Khuchit, Galbadrakh Battur School of Information and Communications Technology, Mongolian University of Science and Technology Ulaanbaatar, Mongolia

More information

Multimodal Face Recognition using Hybrid Correlation Filters

Multimodal Face Recognition using Hybrid Correlation Filters Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com

More information

Countering Anti-Forensics of Lateral Chromatic Aberration

Countering Anti-Forensics of Lateral Chromatic Aberration IH&MMSec 7, June -, 7, Philadelphia, PA, USA Countering Anti-Forensics of Lateral Chromatic Aberration Owen Mayer Drexel University Department of Electrical and Computer Engineering Philadelphia, PA, USA

More information

A Novel Multi-diagonal Matrix Filter for Binary Image Denoising

A Novel Multi-diagonal Matrix Filter for Binary Image Denoising Columbia International Publishing Journal of Advanced Electrical and Computer Engineering (2014) Vol. 1 No. 1 pp. 14-21 Research Article A Novel Multi-diagonal Matrix Filter for Binary Image Denoising

More information

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Chiew K.T., et al. (Eds.): PGRES 2017, Kuala Lumpur: Eastin Hotel, FCSIT, 2017: pp 35-42 IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Thamarai Subramaniam and Hamid

More information

Hiding Image in Image by Five Modulus Method for Image Steganography

Hiding Image in Image by Five Modulus Method for Image Steganography Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another

More information

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008 Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright

More information

Image Forgery Detection: Developing a Holistic Detection Tool

Image Forgery Detection: Developing a Holistic Detection Tool Image Forgery Detection: Developing a Holistic Detection Tool Andrew Levandoski and Jonathan Lobo I. INTRODUCTION In a media environment saturated with deceiving news, the threat of fake and altered images

More information

Multimedia Forensics

Multimedia Forensics Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012 A Tailored Anti-Forensic Approach for Digital Image Compression S.Manimurugan, Athira B.Kaimal Abstract- The influence of digital images on modern society is incredible; image processing has now become

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

Color Image Segmentation in RGB Color Space Based on Color Saliency

Color Image Segmentation in RGB Color Space Based on Color Saliency Color Image Segmentation in RGB Color Space Based on Color Saliency Chen Zhang 1, Wenzhu Yang 1,*, Zhaohai Liu 1, Daoliang Li 2, Yingyi Chen 2, and Zhenbo Li 2 1 College of Mathematics and Computer Science,

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

Demosaicing Algorithm for Color Filter Arrays Based on SVMs

Demosaicing Algorithm for Color Filter Arrays Based on SVMs www.ijcsi.org 212 Demosaicing Algorithm for Color Filter Arrays Based on SVMs Xiao-fen JIA, Bai-ting Zhao School of Electrical and Information Engineering, Anhui University of Science & Technology Huainan

More information

Open Access Research of Dielectric Loss Measurement with Sparse Representation

Open Access Research of Dielectric Loss Measurement with Sparse Representation Send Orders for Reprints to reprints@benthamscience.ae 698 The Open Automation and Control Systems Journal, 2, 7, 698-73 Open Access Research of Dielectric Loss Measurement with Sparse Representation Zheng

More information

Efficient Estimation of CFA Pattern Configuration in Digital Camera Images

Efficient Estimation of CFA Pattern Configuration in Digital Camera Images Faculty of Computer Science Institute of Systems Architecture, Privacy and Data Security esearch roup Efficient Estimation of CFA Pattern Configuration in Digital Camera Images Electronic Imaging 2010

More information

ROBUST HASHING FOR IMAGE AUTHENTICATION USING ZERNIKE MOMENTS, GABOR WAVELETS AND HISTOGRAM FEATURES

ROBUST HASHING FOR IMAGE AUTHENTICATION USING ZERNIKE MOMENTS, GABOR WAVELETS AND HISTOGRAM FEATURES ROBUST HASHING FOR IMAGE AUTHENTICATION USING ZERNIKE MOMENTS, GABOR WAVELETS AND HISTOGRAM FEATURES Bini Babu 1, Keerthi A. S. Pillai 2 1,2 Computer Science & Engineering, Kerala University, (India) ABSTRACT

More information

Stamp detection in scanned documents

Stamp detection in scanned documents Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,

More information

Coding and Analysis of Cracked Road Image Using Radon Transform and Turbo codes

Coding and Analysis of Cracked Road Image Using Radon Transform and Turbo codes Coding and Analysis of Cracked Road Image Using Radon Transform and Turbo codes G.Bhaskar 1, G.V.Sridhar 2 1 Post Graduate student, Al Ameer College Of Engineering, Visakhapatnam, A.P, India 2 Associate

More information

Sensors and Sensing Cameras and Camera Calibration

Sensors and Sensing Cameras and Camera Calibration Sensors and Sensing Cameras and Camera Calibration Todor Stoyanov Mobile Robotics and Olfaction Lab Center for Applied Autonomous Sensor Systems Örebro University, Sweden todor.stoyanov@oru.se 20.11.2014

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

IMAGE SPLICING FORGERY DETECTION

IMAGE SPLICING FORGERY DETECTION IMAGE SPLICING FORGERY DETECTION 1 SIDDHI GAUR, 2 SHAMIK TIWARI 1 M.Tech, 2 Assistant Professor, Dept of CSE, Mody University of Science and Technology, Sikar,India E-mail: 1 siddhi.gaur14@gmail.com, 2

More information

Image Enhancement using Histogram Equalization and Spatial Filtering

Image Enhancement using Histogram Equalization and Spatial Filtering Image Enhancement using Histogram Equalization and Spatial Filtering Fari Muhammad Abubakar 1 1 Department of Electronics Engineering Tianjin University of Technology and Education (TUTE) Tianjin, P.R.

More information

Digital Watermarking for Forgery Detection in Printed Materials

Digital Watermarking for Forgery Detection in Printed Materials Lecture Notes in Computer Science 1 Digital Watermarking for Forgery Detection in Printed Materials Y.J.Song, R.Z.Liu, T.N.Tan National Lab of Pattern Recognition Institute of Automation, Chinese Academy

More information

IMAGE COMPOSITE DETECTION USING CUSTOMIZED

IMAGE COMPOSITE DETECTION USING CUSTOMIZED IMAGE COMPOSITE DETECTION USING CUSTOMIZED Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad ssm@iiita.ac.in rctripathi@iiita.ac.in ABSTRACT The multimedia applications

More information

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye

More information

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method Journal of Information Hiding and Multimedia Signal Processing c 015 ISSN 073-41 Ubiquitous International Volume 6, Number 3, May 015 Color PNG Image Authentication Scheme Based on Rehashing and Secret

More information

Comparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression

Comparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression Comparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression Muhammad SAFDAR, 1 Ming Ronnier LUO, 1,2 Xiaoyu LIU 1, 3 1 State Key Laboratory of Modern Optical Instrumentation, Zhejiang

More information

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris Recognition using Hamming Distance and Fragile Bit Distance IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik

More information

A Review of Image Forgery Techniques

A Review of Image Forgery Techniques A Review of Image Forgery Techniques Hardish Kaur, Geetanjali Babbar Assistant professor, CGC Landran, India. ABSTRACT: Image forgery refer to copying and pasting contents from one image into another image.

More information

Efficient Construction of SIFT Multi-Scale Image Pyramids for Embedded Robot Vision

Efficient Construction of SIFT Multi-Scale Image Pyramids for Embedded Robot Vision Efficient Construction of SIFT Multi-Scale Image Pyramids for Embedded Robot Vision Peter Andreas Entschev and Hugo Vieira Neto Graduate School of Electrical Engineering and Applied Computer Science Federal

More information