Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Similar documents
Exposing Digital Forgeries from JPEG Ghosts

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Introduction to Video Forgery Detection: Part I

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Image Forgery Identification Using JPEG Intrinsic Fingerprints

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan 2 Prof. Ramayan Pratap Singh 3

Module 6 STILL IMAGE COMPRESSION STANDARDS

Chapter 9 Image Compression Standards

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

Image Forgery Detection Using Svm Classifier

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Forgery Detection using Noise Inconsistency: A Review

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

Photo Forensics from JPEG Dimples

International Journal of Advance Research in Computer Science and Management Studies

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION

Automation of JPEG Ghost Detection using Graph Based Segmentation

WITH the rapid development of image processing technology,

Correlation Based Image Tampering Detection

Assistant Lecturer Sama S. Samaan

Analysis of Different Footprints for JPEG Compression Detection

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Hybrid Coding (JPEG) Image Color Transform Preparation

A Lossless Image Compression Based On Hierarchical Prediction and Context Adaptive Coding

Ch. 3: Image Compression Multimedia Systems

Determination of the MTF of JPEG Compression Using the ISO Spatial Frequency Response Plug-in.

An Analytical Study on Comparison of Different Image Compression Formats

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Image Compression Using SVD ON Labview With Vision Module

Image Forgery Detection: Developing a Holistic Detection Tool

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

A New Representation of Image Through Numbering Pixel Combinations

THE popularization of imaging components equipped in

B.E, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India

Digital Media. Lecture 4: Bitmapped images: Compression & Convolution Georgia Gwinnett College School of Science and Technology Dr.

Lossy and Lossless Compression using Various Algorithms

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING

An Integrated Image Steganography System. with Improved Image Quality

Lossless Image Watermarking for HDR Images Using Tone Mapping

Copy-Move Image Forgery Detection using SVD

IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES

Analysis on Color Filter Array Image Compression Methods

Compression and Image Formats

Fundamentals of Multimedia

Practical Content-Adaptive Subsampling for Image and Video Compression

Format Based Photo Forgery Image Detection S. Murali

A Review of Image Forgery Techniques

Information Hiding: Steganography & Steganalysis

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Application of Histogram Examination for Image Steganography

What You ll Learn Today

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Tampering and Copy-Move Forgery Detection Using Sift Feature

Images and Graphics. 4. Images and Graphics - Copyright Denis Hamelin - Ryerson University

Direction-Adaptive Partitioned Block Transform for Color Image Coding

Camera identification from sensor fingerprints: why noise matters

ENEE408G Multimedia Signal Processing

Bitmap Image Formats

Subjective evaluation of image color damage based on JPEG compression

Journal of mathematics and computer science 11 (2014),

MLP for Adaptive Postprocessing Block-Coded Images

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

IMAGE COMPOSITE DETECTION USING CUSTOMIZED

Very High Speed JPEG Codec Library

Exposing Photo Manipulation with Geometric Inconsistencies

On the efficiency of luminance-based palette reordering of color-quantized images

The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.

Different-quality Re-demosaicing in Digital Image Forensics

Survey On Passive-Blind Image Forensics

Objective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Hiding Image in Image by Five Modulus Method for Image Steganography

An Implementation of LSB Steganography Using DWT Technique

Image Compression Supported By Encryption Using Unitary Transform

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution

A SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES

REVIEW OF IMAGE COMPRESSION TECHNIQUES FOR MULTIMEDIA IMAGES

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

CS101 Lecture 12: Digital Images. What You ll Learn Today

A Hybrid Technique for Image Compression

Literature Survey on Image Manipulation Detection

A COMPARATIVE ANALYSIS OF DCT AND DWT BASED FOR IMAGE COMPRESSION ON FPGA

AUTOMATIC FACE COLOR ENHANCEMENT

CGT 511. Image. Image. Digital Image. 2D intensity light function z=f(x,y) defined over a square 0 x,y 1. the value of z can be:

Tampering Detection Algorithms: A Comparative Study

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Getting Started With The MATLAB Image Processing Toolbox

S SNR 10log. peak peak MSE. 1 MSE I i j

Figures from Embedded System Design: A Unified Hardware/Software Introduction, Frank Vahid and Tony Givargis, New York, John Wiley, 2002

JPEG Encoder Using Digital Image Processing

Computer Graphics. Si Lu. Fall er_graphics.htm 10/02/2015

Transcription:

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department of Information Technology, University of Transportation and Communications, VietNam Abstract Image forgery was often created by copy and paste of images of different origins. Because the image is used can be obtained from many sources in various formats, so image forgery is very diverse and plentiful. In this paper we present a method to detect forged images are created from the JPEG images or from a Bitmap image and a JPEG image. The method is based on the properties of quantization step in the JPEG compression schema, allow detection of regions forgery inserted in a host image. Keywords: Forensics, Image Forgeries, Image Tampering, JPEG compression, JPEG quantization, DCT. I. INTRODUCTION Image forgery very diverse and rich. There are many ways to create images forgery. Moreover, the image editing software are developed very powerful (such as Photoshop, GIMP) that a person does not need expert knowledge is also easy to create images forgery of their purpose. Here are some images forgery commonly in Fig. 1. With the commonly of image forgery, now there is much research on methods of detecting image forgery, many new methods are given, as well as improve the efficiency of the method existed. Such as cloning, splicing, re-sampling, color filter array aberrations, sensor noise pattern, lighting inconsistencies [1] [2], reflection [12]. Although this technique is highly effective in most cases, but only appropriately applied to images with relatively high quality. In this paper we propose a method based on the property of quantization in the JPEG compression process, the method does not depend on the characteristics of image quality and resolution. Recently, had a number of methods to detect image forgery based on JPEG compression format, as in [7] [8] proposed detection forgery method based on the irrational compression not entirely in the 8x8 blocks. In [3] [4] making method based on the periodic nature of the histogram of the image is JPEG double compression but on the actual application is very limited and difficult. In [9] develop methods to detect region forgery suffered double compression based on suport vector machine, this method needs a large image database for training. Our method was based on the properties information loss of quantization step in the JPEG compression schema, which is as advantages as effective methods existed and easily applied in practice. The next section of the paper are as follows: 2. Introduction Bitmap image and JPEG image, 3. Detecting images forgery based on the properties of quantization step, 4. Experience, and 5. Conclusion. In 1937. The image forgery (left), Joseph Goebbels was removed from the original image (right). 1614

In 1939. The image forgery (left), King George VI was removed from the original image (right). II. A. Bitmap image In 2010. The image forgery of president Kim Jong 2 with the army commanders. BITMAP IMAGE AND JPEG IMAGE Bitmap image format proposed by Microsoft, with extension BMP, this is kind of image transmission, widely used in computers and other electronic devices. Bitmap image is divided into three types: black and white image, grayscale images and color images. Black and white image: images that each pixel is only one of two states, 0 and 1 to represent the state of black or white pixels. Grayscale image: the image that each pixel is represented by a value and that the light intensity of the pixels. Color image: each pixel is represented by three RGB values, the quantity for each R, G, B will be a corresponding color values. The colors of image up to 256 3. But some real color of an image can be quite small. To save memory, the Fig. 1. Example of Images forgery. In 2011. The image forgery of Iran's missile tests image is less than 256 the number of colors, the colors of the pixels are stored as color palette. With the large number of colors, the image pixel color is not organized as the color palette, while the value of the pixel is the value of the color components R, G, B. With a number of large color images, depending on image quality, which determines the number of bits to represent each color is usually 24 bits or 32 bits. With 24 bits image, each color component is represented by a byte (8 bits). B. JPEG image JPEG format is the result of collaboration between the International Telecommunications Union (ITU), the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC). Its official name is "ISO / IEC 10918-1 Digital compression and coding of continuous-tone still images" or "ITU-T Recommendation T.81". 1615

Ảnh B. (R,G,B) Color components (Y, C b, C r ) Perform DCT Quantizer AC DC Zig-zag reordering Difference Encoding coding coding JPEG bit-stream Quantization Fig. 2. JPEG compression process baseline JPEG Image Bitmap Image Image Forgery Extract Insert Fig. 3. The process of creating image forgery type 1 JPEG Image JPEG Image Image Forgery Extract Insert Fig. 4. The process of creating images forgery type 2 With JPEG compression scheme baseline JPEG, an RGB image is first converted to luminance space / chrominace (YCbCr). Each channel is then divided into 8 * 8 pixel blocks. These values continue to be converted from unsigned integer [0,255] to the integer [-128,127]. Following each block is converted to frequency space using 2-D Discrete Cosine Transform (DCT). Call each DCT coefficient is C, C continues to be quantized by q values: Cˆ round( C / q) Here quantized value q depends on the frequency and channel. The larger the value of q higher compression ratio and image quality after compression is lower. After several quantized DCT coefficients will become 0 (especially for high-frequency region). Finally, these coefficients are compressed using method and Runlengh. JPEG compression process as described in the following diagram in Fig. 2. Similarly, to extract JPEG images taken steps backwards with JPEG compression process as above. 1616

III. DETECTING IMAGE FORGERY BASED ON THE PROPERTIES OF QUANTIZATION STEP The following, the paper presents method to detect image forgery: A. Image forgery Type 1: Bitmap image is forged. Regions forgery were inserted, which were taken from JPEG images ( Fig. 3). Type 2: JPEG image is forged. Regions forgery were inserted, which were taken from JPEG images, has compression quality other (Fig. 4). Comment: - The region is inserted can be extracted from JPEG images. - The JPEG image quality similar or different. B. Theoretical foundations The method is based on the properties of quantization step, in the following lemma: Lemma: Suppose the discrete cosine transform is performed exactly in the JPEG compression scheme (Figure 1), a JPEG image is double compressed with the same compression ratio, the value of R, G, B at each pixel does not change (image do not change). Prove the lemma: Some notation: Bitmap original is B. JPEG image obtained after compression B (first compression) is J1. Bitmap images obtained after decompression J1 is B1. JPEG image obtained after compression B1 (second compression) is J2. Bitmap images obtained after decompression J2 is B2. So, the lemma need to prove two bitmap images B1 and B2 are equal (the value of R, G, B are equal). The notation in the process of quantization and inverse quantization of the first and second compression is described as in the diagram below: Compress and extract at first Bitmap image B JPEG image J1 Bitmap image B1 of DCT : Y ij B, Cb ij B, B Compress and extract at second Quantization Q ij Value after quantization: Y J1 ij, Cb J1 ij, J1 Inv quantization Q ij of DCT: Y ij B1, Cb ij B1, B1 Bitmap image B1 JPEG image J2 Bitmap image B2 of DCT : Y ij B1, Cb ij B1, B1 Quantization Q ij Value after quantization: Y ij J2, Cb ij J2, J2 Inv quantization Q ij of DCT: Y ij B2, Cb ij B2, B2 It follows: Fig. 5. Compress and exact Bitmap image B, B1 Considering the value of the component Y, in the quantization step, Y ij J1 is calculated as follows: Y ij J1 =round(y ij B /Q ij ) Perform decompression JPEG image J1 obtained bitmap image B1, in inverse quantization step Y ij B1 is calculated as follows: Y ij B1 =Y ij J1 *Q ij Perform a second compression from bitmap image B1 obtained JPEG image J2, value Y ij J2 by : Y ij J2 =round(y ij B1 /Q ij ) Y ij J2 =round(y ij J1 *Q ij /Q ij )=Y ij J1 Perform decompression JPEG image J2 obtained bitmap image B2, in inverse quantization step Y ij B2 is calculated as follows: Y ij B2 =Y ij J2 *Q ij Because Y ij J2 = Y ij J1 so: Y ij B2 =Y ij J1 *Q ij = Y ij B1 Similar to the Cb and Cr components, so: Cb ij B1 =Cb ij B2 và B1 = B2 1617

Because, suppose the discrete cosine transformation is performed exactly in the JPEG compression scheme, so the value of R, G, B of Bitmap image B1 and B2 are equal. Thus the lemma is proven! In the process of quantization step has differences, so it follows properties: Properties 1: A double compressed JPEG with different compression ratio, the image will be changed. Properties 2: A bitmap image is compressed with JPEG compression schema will also be changed. C. Algorithm for detecting forgery images The algorithm is based on the lemma and the properties in section III.B, the algorithm uses the quantization table Q α (α=1,,100), and a value d {1,2,,10} as the threshold to determine the forgery (discrete cosine transform with the inaccuracy). The method is implemented as follows: Input: Image F, size mxn (F could be the image original or image forgery type 1 or 2). Output: region forgery of image were inserted. Step 1. Selected α=1 Step 2. Q=Q α Step 3. Image compression with quantization table Q received F. Step 4. Determine the subtract of the two image: G=F F G ij (R)= F ij (R) F ij (R) G ij (G)= F ij (G)-F ij (G) G ij (B)= F ij (B)-F ij (B) Step 5. Selected d, determine union: Wd={(i,j) G ij (R)+G ij (G)+G ij (B) d} - If Wd is exist then Wd is the region forgery (the Wd correspond to the inter-domain and sizes greater threshold value) => end of the algorithm. - Case else switch to step 6. Step 6: α=α+1 - If α 100, Image is original => end of the algorithm. - If α<100, goto step 2. The correctness of the algorithm: Suppose the image F has at least one region W with compression quantization table Q 0 be inserted. According to the lemma and the properties when the algorithm is run with Q = Q 0 then obtained Wd equivalent approximately W accord threshold d. IV. EXPERIENCE We have programmed algorithm and use photo editing software Photoshop to create some image forgery, also use this software to compress JPEG images forgery with different compression ratio. Then proceed to subtract the pixel values of the image is compressed JPEG with image forged obtained a pixel matrix, show the matrix pixel is obtained. With the same compression rate, some area will appear black, which is the forgery region. Here is an illustrative example, images forgery are created from JPEG images as follows in Fig. 6. Test results of the algorithm with the image forgery at compression various ratios, subtraction of image forgery with compressed images at various ratios to show up in the form of multi-level gray, at compression ratio 40 medium, the region fogery almost entirely black, as shown below in Fig. 7. Fig. 6. Images forgery are created from JPEG images 1618

V. CONCLUSION With the development of the Internet has helped the process of distribution and dissemination of images becomes easy and fast. In recent years, image forgery has affected science, law, politics, the media and business. A number of cases have created a national and international events. Therefore, detecting images forgery becomes increasingly urgent and difficult. Based on the research process of JPEG compression and properties of quantization step. We present a method to detect images forgery. The method does not depend on the characteristics of image quality and resolution of the image. To apply the method in practice, also need to build the library of quantization tables from photo editing software, cameras, etc... to determine whether the image is compressed by devices or the application software corresponds to the quantization process. Fig. 7. Results of the algorithm with the image forgery at compression various ratios REFERENCES [1] H. Farid (2011), Digital image forensics, Lecture Notes, Darmouth college, 2011. [2] H. Farid (2009), A survey of image forgery detection, IEEE Signal Processing Magazine, vol. 2, no. 26, pp. 16 25. [3] A.C. Popescu (2005), Statistical tools for digital forensics, Phd Thesis, Darmouth College. [4] B. Mahdian and S. Saic (2009), Detecting double compressed JPEG images, In International Conference on Imaging for Crime Detection and Prevention. [5] J. Fridrich (2009). Digital image forensic using sensor noise. IEEE Signal Processing Magazine, 26(2):26-37. [6] J. Fridrich, D. Soukal, and J. Lukas (2003), Detection of copy-move forgery in digital images, in Proceedings of Digital Forensic Research Workshop. [7] S. Ye, Q. Sun, and E. Chang (2007), Detecting digital image forgeries by measuring inconsistencies of blocking artifact, in 2007 IEEE International Conference on Multimedia and Expo, pp. 12 15. [8] W. Luo, Z. Qu, J. Huang, and G. Qiu (2007), A novel method for detecting cropped and recompressed image block, in IEEE Conference on Acoustics, Speech and Signal Processing, pp. 217 220. [9] J. He, Z. Lin, L. Wang, and X. Tang (2006), Detecting doctored JPEG images via DCT coefficient analysis, in European Conference on Computer Vision, Graz, Austria. [10] ISO/IEC JTC1 (1991), Digital compression and coding of continuous-tone still images, Part 1: Requirements and guidelines, Draft International Standard 10918-1. [11] G. Wallace (1991), The JPEG still picture compression standard, IEEE Transactions on Consumer Electronics, vol. 34, no. 4, pp. 30 44. [12] J. O Brien and H. Farid (2012 in press), Exposing Photo Manipulation with Inconsistent Reflections, ACM Transactions on Graphics. 1619