IMAGE COMPOSITE DETECTION USING CUSTOMIZED

Similar documents
Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Introduction to Video Forgery Detection: Part I

IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES

Correlation Based Image Tampering Detection

IMAGE PROCESSING: AREA OPERATIONS (FILTERING)

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Image Forgery Detection Using Svm Classifier

Wavelet-based Image Splicing Forgery Detection

Forgery Detection using Noise Inconsistency: A Review

Exposing Digital Forgeries from JPEG Ghosts

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

Tampering and Copy-Move Forgery Detection Using Sift Feature

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Digital Image Forgery Identification Using Motion Blur Variations as Clue

Image Processing by Bilateral Filtering Method

An Efficient Noise Removing Technique Using Mdbut Filter in Images

Format Based Photo Forgery Image Detection S. Murali

Digital Image Processing

NON UNIFORM BACKGROUND REMOVAL FOR PARTICLE ANALYSIS BASED ON MORPHOLOGICAL STRUCTURING ELEMENT:

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

Neuro-Fuzzy based First Responder for Image forgery Identification

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

Tampering Detection Algorithms: A Comparative Study

Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

IMAGE SPLICING FORGERY DETECTION

Automation of JPEG Ghost Detection using Graph Based Segmentation

Image Manipulation Detection using Convolutional Neural Network

Lossy and Lossless Compression using Various Algorithms

Image Enhancement using Histogram Equalization and Spatial Filtering

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

Effective Pixel Interpolation for Image Super Resolution

Different-quality Re-demosaicing in Digital Image Forensics

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Preparing Remote Sensing Data for Natural Resources Mapping (image enhancement, rectifications )

Impeding Forgers at Photo Inception

Literature Survey on Image Manipulation Detection

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES

Evaluating the Gaps in Color Constancy Algorithms

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

Multimedia Forensics

The Lee Harvey Oswald backyard photos: real or fake?

Image Filtering. Median Filtering

Journal of mathematics and computer science 11 (2014),

Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION

Image Extraction using Image Mining Technique

Convolutional Neural Network-based Steganalysis on Spatial Domain

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

A Comparison of Histogram and Template Matching for Face Verification

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

A Spatial Mean and Median Filter For Noise Removal in Digital Images

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1

Fast and High-Quality Image Blending on Mobile Phones

Automatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Teaching Scheme. Credits Assigned (hrs/week) Theory Practical Tutorial Theory Oral & Tutorial Total

Exposing Photo Manipulation with Geometric Inconsistencies

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods

Table of contents. Vision industrielle 2002/2003. Local and semi-local smoothing. Linear noise filtering: example. Convolution: introduction

ELEC Dr Reji Mathew Electrical Engineering UNSW

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

A Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA)

A Review of Image Forgery Techniques

Images and Graphics. 4. Images and Graphics - Copyright Denis Hamelin - Ryerson University

Denoising and Effective Contrast Enhancement for Dynamic Range Mapping

AN EXPANDED-HAAR WAVELET TRANSFORM AND MORPHOLOGICAL DEAL BASED APPROACH FOR VEHICLE LICENSE PLATE LOCALIZATION IN INDIAN CONDITIONS

Interpolation of CFA Color Images with Hybrid Image Denoising

Lane Detection in Automotive

Analysis of Satellite Image Filter for RISAT: A Review

Copy-Move Image Forgery Detection using SVD

Image Smoothening and Sharpening using Frequency Domain Filtering Technique

OFFSET AND NOISE COMPENSATION

Information Forensics: An Overview of the First Decade

USE OF HISTOGRAM EQUALIZATION IN IMAGE PROCESSING FOR IMAGE ENHANCEMENT

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine

Camera identification from sensor fingerprints: why noise matters

Lane Detection in Automotive

Exposing Image Forgery with Blind Noise Estimation

Image Distortion Maps 1

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

COLOR CORRECTION METHOD USING GRAY GRADIENT BAR FOR MULTI-VIEW CAMERA SYSTEM. Jae-Il Jung and Yo-Sung Ho

Survey On Passive-Blind Image Forensics

Digital Image Processing

Demosaicing Algorithm for Color Filter Arrays Based on SVMs

CSE 564: Scientific Visualization

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Compression and Image Formats

Objective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs

Assistant Lecturer Sama S. Samaan

Spatial Domain Processing and Image Enhancement

Filtering in the spatial domain (Spatial Filtering)

Analysis of infrared images in integrated-circuit techniques by mathematical filtering

Transcription:

IMAGE COMPOSITE DETECTION USING CUSTOMIZED Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad ssm@iiita.ac.in rctripathi@iiita.ac.in ABSTRACT The multimedia applications are rapidly increasing. It is essential to ensure the authenticity of multimedia components. The image is one of the integrated components of the multimedia. In this paper,we desing a model based on customized filter mask to ensure the authenticity of image that means the image forgery detection based on customized filter mask. We have satisfactory results for our dataset. KEYWORDS Customized Mask, Filter. Image composite, splicing, Image forgery 1. INTRODUCTION Widespread easy and low cost availability of digital cameras and the prevalence of photo sharing and management websites such as flicker, Picasa and other popular websites provide the photo sharing and management applications in one or other forms. Digital images are playing every important role in our daily life; the digital images are omnipresent right from the cover pages of journals, newspapers, magazines etc. to evidences in court rooms, teaching aids etc. Images are used everywhere either as a personal memory evidences or for official purposes. Recently, the low cost camera, sophisticated high end image processing, computer graphics software, made editing and manipulated images become easier, hence there is essential to detect the forgeries in the images. There are many types of forgeries such as morphing, copy move, compositing, retouching, etc. The image compositing is more popular one. 2. IMAGE COMPOSITE FORGERY Image compositing is most popular image forgery. The figure 1 shows the creation of image compositing. The photo compositing is the result of cutting and joining a two or more photographs with seamless transition without leaving any visual clues about the joining from other photographs. DOI : 10.5121/ijcga.2011.1301 1

3. RELATED WORKS Figure 1: Composite image creation model The image compositing is also known as photomontage and image splicing. The image compositing detection assumes that the image scene authenticity properties and conditions such as illuminations, object surface properties, shadow, noise, inter-reflections. Perspective and projective views etc. are rare and difficult match in a composite image. The image composite detection techniques are able to detect the above inconsistent properties in different parts of the same images, the image edges, boundaries and colors, and image qualities may be affected by image compositing. The image forgery can be identified by the specific patterns relating to image attributes which disturbed by the forgery operations. Particularly image composting is created by the two or more images sources, naturally all the different images are taken from the different devices and at different world view conditions. The host image conditions are expected to reflect in image portions of the altered images. The abrupt and unnatural luminance levels, colors and edges are able to detect the image forgeries. In this paper, we used customized filter masks method to detect the image forgeries. The image splicing is analyzed in a general way [1, 2, 9], using supervised approaches [2, 9], and using statistical methods [1] as seen in the literature. The pixel continuity is disturbed due to cut and joining of other images. This feature is exposed to detect the image splicing using support vector machine by Dong et al [9]. He further demonstrates that the correlation and coherency of pixels are not continued at the stitching points. In [5,7], proposed methods uses the camera response function to determine an image splicing, in [10,11], Yu-Feng Hsu and Shih-FuChang estimates the camera response function using geometric invariants, while [6,7] uses edge based profile. Zhouchen Lin et al [4] uses the inverse camera response function (CRF) using the analyzing the edges in different patches and verifies the consistency. Hany Farid and Mary J.Bravo [42] propose the several computational methods for detecting the inconsistencies in shadows and reflections. While Wei Zhang et al [1] detect the image compositing using the geometric and photometric constraints on shadows. Sandeep Gholap and P.K.Bora [12] estimate the illuminant color to expose the image splicing. 2

MicahK.Johnson and HanyFarid [5] estimated the direction of light from specular highlights that appears on the image eye to detect the image compositing by demonstrating the scene authenticity are differs in composite images. The researchers used a variety of methods to detect the image forgeries, however very few researchers such as Lukas used image processing methods such a filtering using standard Roberts, sobels and prewitts mask identify the image forgeries, we extend the Lukas concept by designing a customized mask. 4. PROPOSED METHOD 4.1 Detection of tampering based on customized filtering masks Several edge detectors based on sobel and prewitts masks are used to detect the image forgery by Lukas[13,14]. Image filtering is used as an effective tool in image analysis and understanding problems. Image filtering is useful in image sharpening, smoothing, noise removal, edge detection and many pre and post processing operations. Filtering can be performed in the spatial domain and frequency domain. Filtering provides the alternate view of an image and therefore uncovers small anomalies the image tampering creates anomalies. The customization of masks may prove vital information to uncover a forgery or providing further validations. In the spatial domain, a filter is defined by a mask or the kernel, which is a small array such a 33,55 etc, which is applied to each pixel and their neighbours within an image. The centre of the kernel is aligned with a current pixel and is square with an odd number (3,5,7 etc.) of elements in each dimension, this process is known as a convolution, This way of pixel grouping provides a way to show a trend in an image, such as brightness level across a particular area. The abstract representation pixel and their eight connected neighbours are shown below. i-1,j-1 i-1,j i-1,j+1 i,j-1 i,j i,j+1 i+1,j-1 i+1,j i+1,j+1 Let i, j be pixel at location i. j in image, the remaining pixels are eight way connected neighbour. The pixel value, which is integer is extracted and manipulated with mask (Kernel) Let the mask be 3

The filter s output pixel will be result of Convoluted Image pixels and the mask. The Filter s result will be mathematically represented as The result of the above operation emphasizes the trends in the image, particularly, abrupt pixel variability in the edges, more importantly at tampered regions. This is due to the averaged eight connected neighbor pixels that are used to determine new pixel value. To see more effective results an image is divided into blocks and convolution is performed on block bases. The smaller the block size will give better results. 5. EPERIMENT AND RESULTS Lukas analyzed the forgery detection based on filters [13]. He used the standard mask such as Sobel. Robert, Prewitt and Marr masks. These methods has a limited application and ability of forgery detection, However these masks provide the foundation for image filtering. We are extending the concept of filtering based on customized mask to tailor the filtering that is resulting in a better revelation of forgery traces. The concept of the kernel or filter mask and convolution are explained in section 4 We designed the customized masks by empirically, for example the first customized mask is Customized Mask 4

The Customized Mask is designed in such a way that the sum of all connected neighbours weight is equal to the centres pixels weight. This mask effectively filters out statistically similar areas in the image and only shows dissimilar regions or areas. These different dissimilar results are aroused from prominent edges or maybe from the forged regions of an image. The results provide the alternate way of viewing results on screen or in printouts. The results are dark, sometimes inverted results reveals the abnormalities. First we convert the image to grey scale image so that the statistical data of the original authentic image doesn t affect by convolution with a customized mask. The given figure 2 shows the test image and its result from customized mask figure 3 and the inverted result of customized result shown in figure 4. The inverted result clearly shows the traces of forgery. Figure 2: Test image Figure 3: Result of customized filter mask 5

Figure 4: inverted result of customized mask result Table 1: summary of forgery detection methods and image formats used Forgery detection method Customized Filter Mask Grey Scale image BMP RGB PNG JPEG We tabulate the results of customized filter tests on ten forged images at different levels of forgeries and the results and interpretation of results. The test image and their attributes Table 2: Summary of Customized filter results Forgery Inconclusive Signs of Tampering Possible Signs of Tampering (further tests or analysis is required) Definitive Signs of Tampering Test image 1 Test image 2 Test image 3 Test image 5 Test image 6 6

Test image 7 Test image 9 We are summarizing the results of all the three methods on both unforged and forged images. We used the 25 unforged images and 20 forged images. The results are tabulated as below. 6. CONCLUSION AND DISCUSSIONS It is well known fact that there is no single technique to determine all the type of forgeries. This chapter introduced three simple and effective methods for detecting the image forgery, specifically for image compositing type of forgery. Each method focused on the image attributes, which are changed by the forgeries. For testing, we had small image dataset, however overall results were found satisfactory. It was realized that user of our technique will have to decide on his/her own discretion which method will suit which type of case. Need was also felt to extend the work for using technique of fusion to obtain most optimum results utilizing all the three methods to complement each other. REFERENCES [1] W.Zhang,,.Cao,J.Zhang,J.Zhu,P.Wang, Detecting photographic composites using shadows,in: IEEE International Conference on Multimedia and Expo,2009,pp.1042 1045. [2] W.Wang,J.Dong,T.Tan, Effective image splicing detection based on image chroma,in: IEEE International Conference on Image Processing,2009. [3] J.Lukas, Digital image authentication using image filtering techniques, in: Proceedings of ALGORITMY 2000, Conference on Scientific Computing,Podbanske,Slovakia,September2000, pp. 236 244. [4] Z.Lin,,J.He,.Tang,C.K.Tang, Fast, automatic and fine-grained tampered jpeg image detection via dct coefficient analysis,pattern Recognition 42(11)(2009)2492 2501. [5] M.Johnson.H.Farid,Exposing digital forgeries through specular highlights on the eye, in: 9 th International Workshop on Information Hiding,SaintMalo,France,2007. [6] Y.F.Hsu, S.-F.Chang, Detecting image splicing using geometry invariants and camera characteristics consistency, in: ICME,2006, pp. 549 552. [7] Y.F.Hsu, S.-F.Chang, Image splicing detections using camera response function consistency and automatics estimation, in: ICME, 2007, pp.28 31. [8] H.Farid.M.Bravo, Image forensic analyses that elude the human visual system,in: SPIE Symposium on Electronic Imaging, SanJose, CA, 2010. [9] J.Dong,W.Wang,T.Tan,Y.Shi, Run-length and edge statistics based approach for image splicing detection, in: Digital Water- marking, 7 th International Work shop, IWDW2008, Busan, Korea, November 10-12, 2008, pp.76 87. [10] E.S.Gopi, N.Lakshmanan, T.Gokul, S.Kumara Ganesh, P.R.Shah, Digital image forgery detection using artificial neural network and auto regressive coefficients,in: CCECE,2006, pp.194 197. 7

[11] H.A.Gou.Swaminathan, M.Wu, Noise features for image tampering detection and steganalysis, in :ICIP(6), IEEE, San Antonio, USA,2007,pp.97 100. [12] S.Gholap, P.K.Bora, Illuminant colour based image forensics, in: TENCON 2008,TENCON 2008. IEEE Region10 Conference, IEEE Computer Society, Hyderabad, India, November 2008, pp.1 5. [13] J.Lukas, Digital image authentication using image filtering techniques, in: Proceedings of ALGORITMY 2000, Conference on Scientific Computing, Podbanske, Slovakia,September2000, pp. 236 244. [14] J.Lukas, J.Fridrich, M.Goljan, Detecting digital image forgeries using sensor pattern noise, In SPIE Electronic Imaging, Photonics West 2006. Authors Short Biography Shrishail Math received his BE(Electronics and Communication Engineering), M.Tech( Computer Science and Engineering) from University of Mysore and Manipal University in year 1996 and 2001 respectively. currently,doctroal student at Indian Institute of Information Technolgy,Allahabad, his research interests are information assurance and security and multimedia forensics. R.C.Tripathi is Dean Student affair, Worked as senior director Ministry of Communication and Information Technology(MCIT),Govt.of India. He published three books and 70 research articles and papers in international and national journals. He worked as a cochairman of 1 st International conference on Intelligent Interactive Multimedia (IITM 2010 sponspored by ACM. 8