Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
skip to main content
10.1145/1631081.1631092acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

A new approach for JPEG resize and image splicing detection

Published: 23 October 2009 Publication History
  • Get Citation Alerts
  • Abstract

    Today's ubiquitous digital media are easily tampered by, e.g., removing or adding objects from or into images without leaving any obvious clues. JPEG is a most widely used standard in digital images and it can be easily doctored. It is therefore necessary to have reliable methods to detect forgery in JPEG images for applications in law enforcement, forensics, etc. In this paper, based on the correlation of neighboring Discrete Cosine Transform (DCT) coefficients, we propose a method to detect resized JPEG images and spliced images, which are widely used in image forgery. In detail, the neighboring joint density features of the DCT coefficients are extracted; then Support Vector Machines (SVM) are applied to the features for detection. To improve the evaluation of JPEG resized detection, we utilize the shape parameter of generalized Gaussian distribution (GGD) of DCT coefficients to measure the image complexity.
    The study shows that our method is highly effective in detecting JPEG images resizing and splicing forgery. In the detection of resized JPEG image, the performance is related to both image complexity and resize scale factor. At the same scale factor, the detection performance in high image complexity is, as can be expected, lower than that in low image complexity.

    References

    [1]
    Chen W, Shi YQ and Su W (2007). Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. Proc. SPIE, Vol. 6505, 65050R (2007);
    [2]
    Cho D and Bui T (2005). Multivariate statistical modeling for image denoising using wavelet transforms. Signal Processing: Image Communication, 20:77--89.
    [3]
    Farid H (1999). Detecting digital forgeries using bispectral analysis. AI Lab, Massachusetts Institute of Technology, Tech. Rep. AIM-1657, 1999.
    [4]
    Farid H (2009). Image forgery detection, a survey. IEEE Signal Processing Magazine, March 2009, 16--25.
    [5]
    Gallagher AC (2005). Detection of linear and cubic interpolation in jpeg compressed images. Proc. 2nd Canadian Conf. Computer and Robot Vision, vol. 171, pp. 65--72.
    [6]
    Hsu YF and Chang SF (2007). Image splicing detection using camera response function consistency and automatic segmentation. Proc. 2007 IEEE International Conference on Multimedia and Expo, pp. 28--31.
    [7]
    Kirchner M (2008). Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. Proc. 10th ACM Multimedia and Security Workshop, pp. 11--20.
    [8]
    Liu Q and Sung AH (2007). Feature mining and nuero-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. Proc. of 20th International Joint Conference on Artificial Intelligence, pp. 2808--2813, 2007.
    [9]
    Liu Q, Sung AH, Chen Z and Xu J (2008). Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognition, 41(1): 56--66.
    [10]
    Liu Q, Sung AH, Ribeiro B, Wei M, Chen Z and Xu J (2008). Image complexity and feature mining for steganalysis of least significant bit matching steganography. Information Sciences, 178(1): 21--36.
    [11]
    Liu Q, Sung AH, and Qiao M (2009). Improved detection and evaluation for JPEG steganalysis. ACM-MM 2009, Bejing, China. October 19--24, 2009.
    [12]
    Mahdian B and Saic S (2008). Blind authentication using periodic properties of interpolation. IEEE Trans. Inform. Forensics Security 3(3): 529--538.
    [13]
    Ng TT and Chang SF (2004). A model for image splicing. Proc. 2004 International Conference on Image Processing, vol. 2, pp. 1169--1172.
    [14]
    Ng TT and Chang SF (2004). A data set of authentic and spliced image blocks, ADVENT Technical Report #203-2004-3 Columbia University, June 2004. Available at: http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm
    [15]
    Popescu AC and Farid H (2005). Exposing digital forgeries by detecting traces of re-sampling. IEEE Trans. Signal Processing 53(2): 758--767.
    [16]
    Prasad S and Ramakrishnan KR (2006). On resampling detection and its application to image tampering. Proc. IEEE Int. Conf. Multimedia and Exposition 2006, pp. 1325--1328.
    [17]
    Sharifi K and Garcia AL (1995). Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video. IEEE Trans. Circuits Syst. Video Technol. 5: 52--56.
    [18]
    Shi YQ, Chen C and Chen W (2007). A natural image model approach to splicing detection. Proc. 9th workshop on Multimedia&Security, pp. 51--62.
    [19]
    Vapnik VN (1998). Statistical Learning Theory. John Wiley and Sons, New York.

    Cited By

    View all
    • (2024)Detection of Forged Images Using a Combination of Passive Methods Based on Neural NetworksFuture Internet10.3390/fi1603009716:3(97)Online publication date: 14-Mar-2024
    • (2024)Image splicing forgery detection: A reviewMultimedia Tools and Applications10.1007/s11042-024-18801-zOnline publication date: 16-Mar-2024
    • (2023)Digital Image Forgery Detection with Focus on a Copy-Move Forgery Detection: A Survey2023 International Conference on Cyberworlds (CW)10.1109/CW58918.2023.00042(240-247)Online publication date: 3-Oct-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    MiFor '09: Proceedings of the First ACM workshop on Multimedia in forensics
    October 2009
    74 pages
    ISBN:9781605587554
    DOI:10.1145/1631081
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 October 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. JPEG
    2. SVM
    3. forgery detection
    4. generalized gaussian distribution
    5. image resize
    6. joint density
    7. splicing

    Qualifiers

    • Research-article

    Conference

    MM09
    Sponsor:
    MM09: ACM Multimedia Conference
    October 23, 2009
    Beijing, China

    Upcoming Conference

    MM '24
    The 32nd ACM International Conference on Multimedia
    October 28 - November 1, 2024
    Melbourne , VIC , Australia

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)2

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Detection of Forged Images Using a Combination of Passive Methods Based on Neural NetworksFuture Internet10.3390/fi1603009716:3(97)Online publication date: 14-Mar-2024
    • (2024)Image splicing forgery detection: A reviewMultimedia Tools and Applications10.1007/s11042-024-18801-zOnline publication date: 16-Mar-2024
    • (2023)Digital Image Forgery Detection with Focus on a Copy-Move Forgery Detection: A Survey2023 International Conference on Cyberworlds (CW)10.1109/CW58918.2023.00042(240-247)Online publication date: 3-Oct-2023
    • (2023)RGB No More: Minimally-Decoded JPEG Vision Transformers2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)10.1109/CVPR52729.2023.02139(22334-22346)Online publication date: Jun-2023
    • (2023)Image splicing detection with principal component analysis generated low-dimensional homogeneous feature set based on local binary pattern and support vector machineMultimedia Tools and Applications10.1007/s11042-023-14658-w82:17(25847-25864)Online publication date: 9-Mar-2023
    • (2022)Image Splicing Detection based on Deep Convolutional Neural Network and Transfer Learning2022 IEEE 19th India Council International Conference (INDICON)10.1109/INDICON56171.2022.10039789(1-6)Online publication date: 24-Nov-2022
    • (2022)Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluationMultimedia Tools and Applications10.1007/s11042-022-13808-w82:12(18117-18150)Online publication date: 1-Oct-2022
    • (2022)A comprehensive survey on image authentication for tamper detection with localizationMultimedia Tools and Applications10.1007/s11042-022-13312-182:2(1873-1904)Online publication date: 14-Jun-2022
    • (2021)Strategizing secured image storing and efficient image retrieval through a new cloud frameworkJournal of Network and Computer Applications10.1016/j.jnca.2021.103167192:COnline publication date: 15-Oct-2021
    • (2017)Forgery detection in digital images via discrete wavelet and discrete cosine transformsComputers and Electrical Engineering10.1016/j.compeleceng.2017.03.01362:C(448-458)Online publication date: 1-Aug-2017
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media