全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

An Overview on Image Forensics

DOI: 10.1155/2013/496701

Full-Text   Cite this paper   Add to My Lib

Abstract:

The aim of this survey is to provide a comprehensive overview of the state of the art in the area of image forensics. These techniques have been designed to identify the source of a digital image or to determine whether the content is authentic or modified, without the knowledge of any prior information about the image under analysis (and thus are defined as passive). All these tools work by detecting the presence, the absence, or the incongruence of some traces intrinsically tied to the digital image by the acquisition device and by any other operation after its creation. The paper has been organized by classifying the tools according to the position in the history of the digital image in which the relative footprint is left: acquisition-based methods, coding-based methods, and editing-based schemes. 1. Introduction Images, unlike text, represent an effective and natural communication media for humans, due to their immediacy and the easy way to understand the image content. Historically and traditionally, there has been confidence in the integrity of visual data, such that a picture printed in a newspaper is commonly accepted as a certification of the truthfulness of the news, or video surveillance recordings are proposed as probationary material in front of a court of law. With the rapid diffusion of inexpensive and easy to use devices that enable the acquisition of visual data, almost everybody has today the possibility of recording, storing, and sharing a large amount of digital images. At the same time, the large availability of image editing software tools makes extremely simple to alter the content of the images, or to create new ones, so that the possibility of tampering and counterfeiting visual content is no more restricted to experts. Finally, current software allows to create photorealistic computer graphics that viewers can find indistinguishable from photographic images [1, 2] or also generate hybrid generated visual content. In summary, today a visual digital object might go during its lifetime, from its acquisition to its fruition, through several processing stages, aimed at enhancing the quality, creating new content by mixing pre existing material, or even tampering with the content. As a consequence of all previous facts, doctored images are appearing with a growing frequency in different application fields, and thus today’s digital technology has begun to erode the trust on visual content, so that apparently “seeing is no longer believing” [3–5]. All these issues will get worse as processing tools become more and more sophisticated.

References

[1]  G. W. Meyer, H. E. Rushmeier, M. F. Cohen, D. P. Greenberg, and K. E. Torrance, “An experimental evaluation of computer graphics imagery,” ACM Transactions on Graphics, vol. 5, no. 1, pp. 30–50, 1986.
[2]  “Fake or foto,” 2012, http://area.autodesk.com/fakeorfoto.
[3]  H. Farid, “Digital doctoring: how to tell the real from the fake,” Significance, vol. 3, no. 4, pp. 162–166, 2006.
[4]  B. Zhu, M. Swanson, and A. Tewfik, “When seeing isn't believing [multimedia authentication technologies],” IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 40–49, 2004.
[5]  “Photo tampering throughout history,” 2012, http://www.fourandsix.com/photo-tampering-history/.
[6]  G. L. Friedman, “Trustworthy digital camera: restoring credibility to the photographic image,” IEEE Transactions on Consumer Electronics, vol. 39, no. 4, pp. 905–910, 1993.
[7]  P. Blythe and J. Fridrich, “Secure digital camera,” in Proceedings of the Digital Forensic Research Workshop (DFRWS '04), pp. 17–19, 2004.
[8]  I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann, 2001.
[9]  M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, Signal Processing and Communications, Marcel Dekker, 2004.
[10]  I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Water—Marking and Steganography, Morgan Kaufmann, San Francisco, Calif, USA, 2nd edition, 2008.
[11]  R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
[12]  A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography, CRC Press, Boca Raton, Fla, USA, 1st edition, 1996.
[13]  H. Farid, “Image forgery detection,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16–25, 2009.
[14]  T. Van Lanh, K. S. Chong, S. Emmanuel, and M. S. Kankanhalli, “A survey on digital camera image forensic methods,” in Proceedings of the IEEE International Conference onMultimedia and Expo (ICME '07), pp. 16–19, July 2007.
[15]  B. Mahdian and S. Saic, “A bibliography on blind methods for identifying image forgery,” Signal Processing: Image Communication, vol. 25, no. 6, pp. 389–399, 2010.
[16]  M. K. Johnson and H. Farid, “Exposing digital forgeries through chromatic aberration,” in Proceedings of the 8th workshop on Multimedia & Security, S. Voloshynovskiy, J. Dittmann, and J. J. Fridrich, Eds., pp. 48–55, ACM, Geneva, Switzerland, September 2006.
[17]  L. T. Van, S. Emmanuel, and M. S. Kankanhalli, “Identifying source cell phone using chromatic aberration,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '07), pp. 883–886, Beijing, China, July 2007.
[18]  K. S. Choi, E. Y. Lam, and K. K. Y. Wong, “Automatic source camera identification using the intrinsic lens radial distortion,” Optics Express, vol. 14, pp. 11551–11565, 2006.
[19]  A. E. Dirik, H. T. Senear, and N. Memon, “Digital single lens reflex camera identification from traces of sensor dust,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 539–552, 2008.
[20]  I. Yerushalmy and H. Hel-Or, “Digital image forgery detection based on lens and sensor aberration,” International Journal of Computer Vision, vol. 92, no. 1, pp. 71–91, 2011.
[21]  J. Janesick, Scientific Charge-Coupled Devices, Spie Press Monograph, SPIE Press, 2001.
[22]  J. Fridrich, “Digital image forensic using sensor noise,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 26–37, 2009.
[23]  M. Chen, J. Fridrich, M. Goljan, and J. Luká?, “Determining image origin and integrity using sensor noise,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74–90, 2008.
[24]  I. Amerini, R. Caldelli, V. Cappellini, F. Picchioni, and A. Piva, “Estimate of PRNU noise based on different noise models for source camera Identification,” International Journal of Digital Crime and Forensics, vol. 2, no. 2, pp. 21–33, 2010.
[25]  K. Rosenfeld and H. T. Sencar, “A study of the robustness of PRNU-based camera identification,” in Proceedings of the Media Forensics and Security I, part of the IS&T-SPIE Electronic Imaging Symposium, vol. 7254 of Proceedings of SPIE, San Jose, Calif, USA, January 2009.
[26]  C.-T. Li and Y. Li, “Digital camera identification using colourdecoupled photo response non-uniformity noise pattern,” in Proceedings of the International Symposium on Circuits and Systems (ISCAS '10), pp. 3052–3055, IEEE, Paris, France, May 2010.
[27]  C.-T. Li and Y. Li, “Color-decoupled photo response non-uniformity for digital image forensics,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, pp. 260–271, 2012.
[28]  B.-B. Liu, Y. Hu, and H.-K. Lee, “Source camera identification from significant noise residual regions,” in Proceedings of the International Conference on Image Processing (ICIP '10), pp. 1749–1752, IEEE, Hong Kong, China, September 2010.
[29]  C.-T. Li, “Source camera identification using enahnced sensor pattern noise,” in Proceedings of the IEEE International Conference on Image Processing (ICIP '09), pp. 1509–1512, IEEE, Cairo, Egypt, November 2009.
[30]  C.-T. Li, “Source camera identification using enhanced sensor pattern noise,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 280–287, 2010.
[31]  T. Filler, J. Fridrich, and M. Goljan, “Using sensor pattern noise for camera model identification,” in Proceedings of the International Conference on Image Processing (ICIP '08), pp. 1296–1299, IEEE, San Diego, Calif, USA, October 2008.
[32]  M. Goljan, J. Fridrich, and T. Filler, “Managing a large database of camera fingerprints,” in Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp, Eds., vol. 7541 of Proceedings of SPIE, San Jose, Calif, USA, January 2010.
[33]  A. C. Popescu and H. Farid, “Exposing digital forgeries in color filter array interpolated images,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3948–3959, 2005.
[34]  A. C. Gallagher, “Detection of linear and cubic interpolation in JPEG compressed images,” in Proceedings of the Canadian Conference on Computer and Robot Vision, pp. 65–72, May 2005.
[35]  A. C. Gallagher and T. Chen, “Image authentication by detecting traces of demosaicing,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW '08), pp. 1–8, June 2008.
[36]  A. E. Dirik and N. Memon, “Image tamper detection based on demosaicing artifacts,” in Proceedings of the International Conference on Image Processing (ICIP '09), pp. 1497–1500, IEEE, Cairo, Egypt, November 2009.
[37]  S. Bayram, H. T. Sencar, N. Memon, and I. Avcibas, “Source camera identification based on CFA interpolation,” in Proceedings of the IEEE International Conference on Image Processing 2005 ( ICIP '05), pp. 69–72, September 2005.
[38]  A. Swaminathan, M. Wu, and K. J. R. Liu, “Nonintrusive component forensics of visual sensors using output images,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, pp. 91–105, 2007.
[39]  A. Swaminathan, M. Wu, and K. J. R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 101–117, 2008.
[40]  S. Bayram, H. T. Sencar, and N. Memon, “Classification of digital camera-models based on demosaicing artifacts,” Digital Investigation, vol. 5, no. 1-2, pp. 49–59, 2008.
[41]  C. McKay, A. Swaminathan, H. Gou, and M. Wu, “Image acquisition forensics: forensic analysis to identify imaging source,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '08), pp. 1657–1660, IEEE, Las Vegas, Nev, USA, March-April 2008.
[42]  H. Cao and A. C. Kot, “Accurate detection of demosaicing regularity from output images,” in Proceedings of the International Symposium on Circuits and Systems (ISCAS '09), pp. 497–500, IEEE, 2009.
[43]  H. Cao and A. C. Kot, “Accurate detection of demosaicing regularity for digital image forensics,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 899–910, 2009.
[44]  N. Fan, C. Jin, and Y. Huang, “A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation,” in Proceedings of the 11th ACM Workshop on Multimedia Security (MM&Sec '09), pp. 125–129, September 2009.
[45]  M. Kirchner, “Efficient estimation of cfa pattern configuration in digital camera images,” in Proceedings of the Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp, Eds., vol. 7541 of Proceedings of SPIE, San Jose, Calif, USA, January 2010, 754111.
[46]  P. Ferrara, T. Bianchi, A. de Rosa, and A. Piva, “Image forgery localization via fine-grained analysis of cfa artifacts,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 5, pp. 1566–1577, 2012.
[47]  S. Lin and L. Zhang, “Determining the radiometric response function from a single grayscale image,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '05), vol. 2, pp. 66–73, June 2005.
[48]  T. T. Ng, S. F. Chang, and M. P. Tsui, “Using geometry invariants for camera response function estimation,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '07), pp. 1–8, Minneapolis, Minn, USA, June 2007.
[49]  T.-T. Ng, S.-F. Chang, J. Hsu, L. Xie, and M.-P. Tsui, “Physics-motivated features for distinguishing photographic images and computer graphics,” in Proceedings of the 13th Annual ACM International Conference on Multimedia, H. Zhang, T.-S. Chua, R. Steinmetz, M. S. Kankanhalli, and L. Wilcox, Eds., pp. 239–248, ACM, 2005.
[50]  Y. F. Hsu and S. F. Chang, “Camera response functions for image forensics: an automatic algorithm for splicing detection,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 816–825, 2010.
[51]  H. Cao and A. C. Kot, “Identification of recaptured photographs on lcd screens,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1790–1793, IEEE, Dallas, Tex, USA, March 2010.
[52]  H. Yu, T.-T. Ng, and Q. Sun, “Recaptured photo detection using specularity distribution,” in Proceedings of the International Conference on Image Processing (ICIP '08), pp. 3140–3143, IEEE, San Diego, Calif, USA, October 2008.
[53]  X. Gao, T.-T. Ng, B. Qiu, and S. F. Chang, “Single-view recaptured image detection based on physics-based features,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '10), pp. 1469–1474, IEEE, July 2010.
[54]  M. Goljan, J. Fridrich, and J. Luká?, “Camera identification from printed images,” in Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, E. J. Delp III, P. W. Wong, J. Dittmann, and N. D. Memon, Eds., vol. 6819 of Proceedings SPIE, San Jose, Calif, USA, January 2008.
[55]  X. Gao, B. Qiu, J. Shen, T. T. Ng, and Y. Q. Shi, “A smart phone image database for single image recapture detection,” in Proceedings of the 9th International Workshop on Digital Watermarking (IWDW '10), H.-J. Kim, Y. Q. Shi, and M. Barni, Eds., vol. 6526 of Lecture Notes in Computer Science, Springer, Seoul, Korea, October 2010.
[56]  H. Gou, A. Swaminathan, and M. Wu, “Intrinsic sensor noise features for forensic analysis on scanners and scanned images,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 476–491, 2009.
[57]  C.-H. Choi, M.-J. Lee, and H.-K. Lee, “Scanner identification using spectral noise in the frequency domain,” in Proceedings of the International Conference on Image Processing (ICIP '10), pp. 2121–2124, IEEE, Hong Kong, China, September 2010.
[58]  N. Khanna and E. J. Delp, “Intrinsic signatures for scanned documents forensics: effect of font shape and size,” in Proceedings of the International Symposium on Circuits and Systems (ISCAS '10), pp. 3060–3063, IEEE, Paris, France, May-June 2010.
[59]  A. E. Dirik, H. T. Sencar, and N. Memon, “Flatbed scanner identification based on dust and scratches over scanner platen,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '09), pp. 1385–1388, IEEE, Taipei, Taiwan, April 2009.
[60]  S. Dehnie, T. Sencar, and N. Memon, “Digital image forensics for identifying computer generated and digital camera images,” in Proceedings of the IEEE International Conference on Image Processing I(CIP '06), pp. 2313–2316, IEEE, October 2006.
[61]  W. Li, T. Zhang, E. Zheng, and X. Ping, “Identifying photorealistic computer graphics using second-order difference statistics,” in Proceedings of the International Conference on Fuzzy Systems and Knowledge Discovery (FSKD '10), M. Li, Q. Liang, L. Wang, and Y. Song, Eds., pp. 2316–2319, IEEE, 2010.
[62]  A. E. Dirik, S. Bayram, H. T. Sencar, and N. D. Memon, “New features to identify computer generated images,” in Proceedings of the IEEE International Conference on Image Processing (ICIP '07), vol. 4, pp. 433–436, IEEE, 2007.
[63]  F. Pan and J. Huang, “Discriminating computer graphics images and natural images using hidden markov tree model,” in Proceedings of the 9th International Workshop on Digital Watermarking (IWDW '10), H.-J. Kim, Y. Q. Shi, and M. Barni, Eds., vol. 6526 of Lecture Notes in Computer Science, pp. 23–28, Springer, Seoul, Korea, October 2010.
[64]  G. K. Wallace, “The JPEG still picture compression standard,” IEEE Transactions on Consumer Electronics, vol. 38, no. 1, 1992.
[65]  Z. Fan and R. de Queiroz, “Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history,” in Proceedings of the International Conference on Image Processing (ICIP '00), pp. 948–951, September 2000.
[66]  Z. Fan and R. L. de Queiroz, “Identification of bitmap compression history: JPEG detection and quantizer estimation,” IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 230–235, 2003.
[67]  Z. Wang, A. C. Bovik, and B. L. Evans, “Blind measurement of blocking artifacts in images,” in Proceedings of the International Conference on Image Processing (ICIP '00), vol. 3, pp. 981–984, 2000.
[68]  H. Liu and I. Heynderickx, “A no-reference perceptual blockiness metric,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '08), pp. 865–868, March- April 2008.
[69]  S. Tjoa, W. S. Lin, H. V. Zhao, and K. J. R. Liu, “Block size forensic analysis in digital images,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '07), pp. I633–I636, April 2007.
[70]  W. Luo, J. Huang, and G. Qiu, “JPEG error analysis and its applications to digital image forensics,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 480–491, 2010.
[71]  W. S. Lin, S. K. Tjoa, H. V. Zhao, and K. J. R. Liu, “Digital image source coder forensics via intrinsic fingerprints,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 460–475, 2009.
[72]  S. Ye, Q. Sun, and E. C. Chang, “Detecting digital image forgeries by measuring inconsistencies of blocking artifact,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '07), pp. 12–15, IEEE, Beijing, China, July 2007.
[73]  R. Neelamani, R. de Queiroz, Z. Fan, S. Dash, and R. G. Baraniuk, “JPEG compression history estimation for color images,” IEEE Transactions on Image Processing, vol. 15, no. 6, pp. 1365–1378, 2006.
[74]  F. Benford, “The law of anomalous numbers,” Proceedings of the American Philosophical Society, vol. 78, no. 4, pp. 551–572, 1938.
[75]  D. Fu, Y. Q. Shi, and W. Su, “A generalized Benford's law for JPEG coefficients and its applications in image forensics,” in Proceedings of the 9th Security, Forensics, Steganography, and Watermarking of Multimedia Contents, vol. 6505 of Proceedings SPIE, pp. 1–11, San Jose, Calif, USA, January 2007.
[76]  B. Li, Y. Q. Shi, and J. Huang, “Detecting doubly compressed JPEG images by using mode based first digit features,” in Proceedings of the IEEE 10th Workshop on Multimedia Signal Processing (MMSP '08), pp. 730–735, October 2008.
[77]  X. Feng and G. Do?rr, “JPEG recompression detection,” in Media Forensics and Security II, vol. 7541 of Proceedings of the SPIE, January 2010, 75410J.
[78]  T. Pevny and J. Fridrich, “Detection of double-compression for applications in steganography,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 247–258, 2008.
[79]  J. Luká? and J. Fridrich, “Estimation of primary quantization matrix in double compressed JPEG images,” in Proceedings of the Digital Forensics Research Conference (DFRWS '03), 2003.
[80]  A. C. Popescu and H. Farid, “Statistical tools for digital forensics,” in Proceedings of the 6th International Workshop on Information Hiding, pp. 128–147, Springer, Berlin, Germany, 2004.
[81]  J. He, Z. Lin, L. Wang, and X. Tang, “Detecting doctored JPEG images via DCT coefficient analysis,” Lecture Notes in Computer Science, vol. 3953, pp. 423–435, 2006.
[82]  T. Pevny and J. Fridrich, “Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images,” in Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819 of Proceedings of SPIE, January 2008, 681911.
[83]  Z. Lin, J. He, X. Tang, and C. K. Tang, “Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis,” Pattern Recognition, vol. 42, no. 11, pp. 2492–2501, 2009.
[84]  T. Bianchi, A. D. Rosa, and A. Piva, “Improved DCT coefficient analysis for forgery localization in JPEG images,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '11), pp. 2444–2447, May 2011.
[85]  H. Farid, “Exposing digital forgeries from JPEG ghosts,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 154–160, 2009.
[86]  W. Luo, Z. Qu, J. Huang, and G. Qiu, “A novel method for detecting cropped and recompressed image block,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '07), vol. 2, pp. 217–220, April 2007.
[87]  M. Barni, A. Costanzo, and L. Sabatini, “Identification of cut & paste tampering by means of double-JPEG detection and image segmentation,” in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '10), pp. 1687–1690, IEEE, Paris, France, May-June 2010.
[88]  Y. L. Chen and C. T. Hsu, “Image tampering detection by blocking periodicity analysis in JPEG compressed images,” in Proceedings of the IEEE 10th Workshop on Multimedia Signal Processing (MMSP '08), pp. 803–808, October 2008.
[89]  Z. Qu, W. Luo, and J. Huang, “A convolutive mixing model for shifted double JPEG compression with application to passive image authentication,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '08), pp. 1661–1664, IEEE, Las Vegas, Nev, USA, March-April 2008.
[90]  T. Bianchi and A. Piva, “Detection of non-aligned double jpeg compression with estimation of primary compression parameters,” in Proceedings of the 18th IEEE International Conference on Image Processing (ICIP '11), pp. 1929–11932, September 2011.
[91]  T. Bianchi and A. Piva, “Detection of nonaligned double jpeg compression based on integer periodicity maps,” IEEE Transactions on Information Forensics and Security, vol. 7, pp. 842–848, 2012.
[92]  T. Bianchi and A. Piva, “Analysis of non-aligned double jpeg artifacts for the localization of image forgeries,” in Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '11), pp. 1–6, November-December 2011.
[93]  M. Xian-zhe, N. Shao-zhang, and Z. Jian-chen, “Tamper detection for shifted double jpeg compression,” in Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '10), pp. 434–437, October 2010.
[94]  Y. L. Chen and C. T. Hsu, “Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 396–406, 2011.
[95]  T. Bianchi and A. Piva, “Image forgery localization via block-grained analysis of jpeg artifacts,” IEEE Transactions on Information Forensics and Security, vol. 7, pp. 1003–1017, 2012.
[96]  A. J. Fridrich, B. D. Soukal, and A. J. Luká?, “Detection of copymove forgery in digital images,” in Proceedings of the Digital Forensic Research Workshop, 2003.
[97]  W. Q. Luo, J. W. Huang, and G. P. Qiu, “Robust detection of regionduplication forgery in digital image,” in Proceedings of the International Conference on Pattern Recognition (ICPR '06), pp. 746–749, 2006.
[98]  A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Tech. Rep. TR2004-515, Dartmouth College, Computer Science, Hanover, NH, USA, 2004.
[99]  S. Bayram, H. T. Sencar, and N. Memon, “An efficient and robust method for detecting copy-move forgery,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '09), pp. 1053–1056, IEEE, Taipei, Taiwan, April 2009.
[100]  Q. Wu, S. Wang, and X. Zhang, “Detection of image regionduplication with rotation and scaling tolerance,” in Proceedings of the International Conference on Computer and Computational Intelligence (ICCCI '10), J.-S. Pan, S.-M. Chen, and N. T. Nguyen, Eds., vol. 6421 of Lecture Notes in Computer Science, pp. 100–108, 2010.
[101]  H. Hailing, G. Weiqiang, and Z. Yu, “Detection of copy-move forgery in digital images using sift algorithm,” in Proceedings of the Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA '08), vol. 2 of IEEE Computer Society, pp. 272–276, Wuhan, China, December 2008.
[102]  D. G. Lowe, “Object recognition from local scale-invariant features,” in Proceedings of the International Conference on Computer Vision (ICCV '99), pp. 1150–1157, 1999.
[103]  I. Amerini, L. Ballan, R. Caldelli, A. del Bimbo, and G. Serra, “Geometric tampering estimation by means of a sift-based forensic analysis,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1702–1705, IEEE, Dallas, Tex, USA, March 2010.
[104]  X. Pan and S. Lyu, “Detecting image region duplication using sift features,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1706–1709, IEEE, Dallas, Tex, USA, March 2010.
[105]  A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758–767, 2005.
[106]  M. Kirchner, “Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue,” in Proceedings of the 10th ACM Workshop on Multimedia and Security (MM&Sec '08), A. D. Ker, J. Dittmann, and J. J. Fridrich, Eds., pp. 11–20, ACM, September 2008.
[107]  M. Kirchner and T. Gloe, “On resampling detection in re-compressed images,” in Proceedings of the 1st IEEE International Workshop on Information Forensics and Security (WIFS '09), pp. 21–25, December 2009.
[108]  M. Kirchner, “On the detectability of local resampling in digital images,” in Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, E. J. Delp, P. W. Wong, J. Dittmann, and N. Memon, Eds., vol. 6819 of Proceedings of SPIE, February 2008.
[109]  M. Kirchner, “Linear row and column predictors for the analysis of resized images,” in Proceedings of the 12th ACM Multimedia Security Workshop (MM&Sec '10), pp. 13–18, September 2010.
[110]  S. Prasad and K. R. Ramakrishnan, “On resampling detection and its application to detect image tampering,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '06), pp. 1325–1328, July 2006.
[111]  B. Mahdian and S. Saic, “On periodic properties of interpolation and their application to image authentication,” in Proceedings of the International Symposium on Information Assurance and Security, pp. 439–446, 2007.
[112]  W. Weimin, W. Shuozhong, and T. Zhenjun, “Estimation of rescaling factor and detection of image splicing,” in Proceedings of the 11th IEEE International Conference on Communication Technology (ICCT '08), pp. 676–679, November 2008.
[113]  N. Dalgaard, C. Mosquera, and F. Pérez-González, “On the role of differentiation for resampling detection,” in Proceedings of the International Conference on Image Processing (ICIP '10), pp. 1753–1756, The Institute of Electrical and Electronics Engineers, Hong Kong, China, September 2010.
[114]  G. S. Song, Y. I. Yun, and W. H. Lee, “A new estimation approach of resampling factors using threshold-based peak detection,” in Proceedings of the IEEE International Conference on Consumer Electronics (ICCE '11), pp. 731–732, January 2011.
[115]  B. Mahdian and S. Saic, “Blind authentication using periodic properties of interpolation,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 529–538, 2008.
[116]  B. Mahdian and S. Saic, “A cyclostationarity analysis applied to image forensics,” in Proceedings of the Workshop on Applications of Computer Vision (WACV '09), pp. 1–6, December 2009.
[117]  D. Vazquez-Padín, C. Mosquera, and F. Pérez-González, “Two-dimensional statistical test for the presence of almost cyclostationarity on images,” in Proceedings of the 17th IEEE International Conference on Image Processing (ICIP '10), pp. 1745–1748, September 2010.
[118]  D. Vazquez-Padín and F. Pérez-González, “Prefilter design for forensic resampling estimation,” in Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '11), November-December 2011.
[119]  M. Kirchner and J. J. Fridrich, “On detection of median filtering in digital images,” in Memon et al,” in Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp, Eds., vol. 7541 of Proceedings of SPIE, San Jose, Calif, USA, January 2010, 754110.
[120]  T. Pevny, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Transactions on Information Forensics and Security, vol. 5, pp. 215–2224, 2010.
[121]  H.-D. Yuan, “Blind forensics of median filtering in digital images,” IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1335–11345, 2011.
[122]  M. C. Stamm and K. J. R. Liu, “Blind forensics of contrast enhancement in digital images,” in Proceedings of the International Conference on Image Processing (ICIP '08), pp. 3112–3115, IEEE, San Diego, Calif, USA, October 2008.
[123]  M. C. Stamm and K. J. R. Liu, “Forensic estimation and reconstruction of a contrast enhancement mapping,” in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1698–1701, IEEE, Dallas, Tex, USA, March 2010.
[124]  M. C. Stamm and K. J. R. Liu, “Forensic detection of image manipulation using statistical intrinsic fingerprints,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 492–506, 2010.
[125]  S. Avidan and A. Shamir, “Seam carving for content-aware image resizing,” ACM Transactions on Graphics, vol. 26, no. 3, article 10, 2007.
[126]  A. Sarkar, L. Nataraj, and B. S. Manjunath, “Detection of seam carving and localization of seam insertions in digital images,” in Proceedings of the 11th ACM Multimedia Security Workshop (MM&Sec '09), pp. 107–116, September 2009.
[127]  C. Fillion and G. Sharma, “Detecting content adaptive scaling of images for forensic applications,” in Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp, Eds., vol. 7541 of Proceedings of SPIE, San Jose, Calif, USA, January 2010, 75410.
[128]  I. Avcibas, S. Bayram, N. Memon, M. Ramkumar, and B. Sankur, “A classifier design for detecting image manipulations,” in Proceedings of the International Conference on Image Processing (ICIP '04), pp. 2645–2648, October 2004.
[129]  W. Chen, Y. Q. Shi, and W. Su, “Image splicing detection using 2-D phase congruency and statistical moments of characteristic function,” in Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, February 2007.
[130]  Y. Q. Shi, C. Chen, and W. Chen, “A natural image model approach to splicing detection,” in Proceedings of the ACM Workshop on Multimedia Security (MM&Sec '07), D. Kundur, B. Prabhakaran, J. Dittmann, and J. J. Fridrich, Eds., pp. 51–62, ACM, 2007.
[131]  M. K. Johnson and H. Farid, “Exposing digital forgeries by detecting inconsistencies in lighting,” in Proceedings of the ACM Workshop on Multimedia and Security, pp. 1–10, 2005.
[132]  M. K. Johnson and H. Farid, “Exposing digital forgeries through specular highlights on the eye,” in Proceedings of the 9th International Conference on Information Hiding, T. Furon, F. Cayre, G. J. Do?rr, and P. Bas, Eds., vol. 4567 of Lecture Notes in Computer Science, pp. 311–325, Springer, 2007.
[133]  M. K. Johnson and H. Farid, “Exposing digital forgeries in complex lighting environments,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 450–461, 2007.
[134]  C. Riess and E. Angelopoulou, “Scene illumination as an indicator of image manipulation,” in Proceedings of the International Conference on Information Hiding, pp. 66–80, 2010.
[135]  W. Zhang, X. Cao, J. Zhang, J. Zhu, and P. Wang, “Detecting photographic composites using shadows,” in Proceedings of the IEEE International Conference on Multimedia and Expo, pp. 1042–1045, IEEE, 2009.
[136]  Q. Liu, X. Cao, C. Deng, and X. Guo, “Identifying image composites through shadow matte consistency,” IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1111–1122, 2011.
[137]  H. Farid and J. Kosecka, “Estimating planar surface orientation using bispectral analysis,” IEEE Transactions on Image Processing, vol. 16, no. 8, pp. 2154–2160, 2007.
[138]  M. K. Johnson and H. Farid, “Detecting photographic composites of people,” in Proceedings of the International Workshop on Digital Watermarking, pp. 19–33, 2007.
[139]  V. Conotter and G. Boato, “Detecting photo manipulation on signs and billboards,” in Proceedings of the International Conference on Image Processing (ICIP '10), pp. 1741–1744, IEEE, Hong Kong, China, September 2010.
[140]  P. Kakar, N. Sudha, and W. Ser, “Exposing digital image forgeries by detecting discrepancies in motion blur,” IEEE Transactions on Multimedia, vol. 13, no. 3, pp. 443–452, 2011.
[141]  H. Yao, S. Wang, Y. Zhao, and X. Zhang, “Detecting image forgery using perspective constraints,” IEEE Signal Processing Letters, vol. 19, pp. 123–1126, 2012.
[142]  M. Kirchner and R. B?hme, “Tamper hiding: defeating image forensics,” in Proceedings of the 9th International Conference on Information Hiding, T. Furon, F. Cayre, G. Doerr, and P. Bas, Eds., pp. 326–341, 2007.
[143]  M. Kirchner and R. B?hme, “Hiding traces of resampling in digital images,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, pp. 582–592, 2008.
[144]  T. Gloe, M. Kirchner, A. Winkler, and R. B?hme, “Can we trust digital image forensics?” in Proceedings of the 15th international Conference on Multimedia, pp. 78–86, 2007.
[145]  M. Goljan, J. Fridrich, and M. Chen, “Defending against fingerprint-copy attack in sensor-based camera identification,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 227–236, 2011.
[146]  R. Caldelli, I. Amerini, and A. Novi, “An analysis on attacker actions in fingerprint-copy attack in source camera identification,” in Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '11), pp. 1–6, November-December 2011.
[147]  M. Kirchner and R. B?hme, “Synthesis of color filter array pattern in digital images,” in Media Forensics and Security, E. J. Delp, J. Dittmann, N. Memon, and P. W. Wong, Eds., vol. 7254 of Proceedings of SPIE, 2009.
[148]  M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, “Anti-forensics of JPEG compression,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1694–1697, March 2010.
[149]  M. Stamm and K. J. R. Liu, “Anti-forensics of digital image compression,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1050–1065, 2011.
[150]  G. Valenzise, M. Tagliasacchi, and S. Tubaro, “The cost of jpeg compression anti-forensics,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '11), pp. 1884–1887, May 2011.
[151]  G. Valenzise, V. Nobile, M. Tagliasacchi, and S. Tubaro, “Countering jpeg anti-forensics,” in Proceedings of the 18th IEEE International Conference on Image Processing (ICIP '11), pp. 1949–1952, September 2011.
[152]  S. Lai and R. B?hme, “Countering counter-forensics: the case of jpeg compression,” in Proceedings of the 13th International Conference on Information Hiding (IH '11), pp. 285–298, Springer, Berlin, Heidelberg, 2011.
[153]  M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, “Undetectable image tampering through JPEG compression anti-forensics,” in Proceedings of the 17th IEEE International Conference on Image Processing (ICIP '10), pp. 2109–2112, September 2010.
[154]  M. Barni, M. Fontani, and B. Tondi, “A universal technique to hide traces of histogram-based image manipulations,” in Proceedings of the 14th ACM Workshop on Multimedia and Security (MM&SEC '12), September 2012.
[155]  M. Barni, “A game theoretic approach to source identification with known statistics,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '12), pp. 1745–1748, March 2012.
[156]  M. C. Stamm, W. S. Lin, and K. J. R. Liu, “Forensics versus anti-forensics: a decision and game theoretic framework,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '12), pp. 1749–1752, March 2012.
[157]  O. Celiktutan, B. Sankur, and I. Avcibas, “Blind identification of source cell-phone model,” IEEE Transactions on Information Foren- Sics and Security, vol. 3, no. 3, pp. 553–566, 2008.
[158]  M. Kharrazi, H. T. Sencar, and N. D. Memon, “Improving steganalysis by fusion techniques: a case study with image steganography,” Transactions on Data Hiding and Multimedia Security, vol. 4300, pp. 123–137, 2006.
[159]  S. Bayram, I. Avciba?, B. Sankur, and N. Memon, “Image manipulation detection,” Journal of Electronic Imaging, vol. 15, no. 4, Article ID 041102, 2006.
[160]  M. Fontani, T. Bianchi, A. de Rosa, A. Piva, and M. Barni, “A dempster-shafer framework for decision fusion in image forensics,” in Proceedings of the IEEE International Workshop on Forensics and Security (WIFS '11), pp. 1–6, November-December 2011.
[161]  G. Shafer, A Mathematical Theory of Evidence, Princeton University Press, Princeton, NJ, USA, 1976.
[162]  M. Barni and A. Costanzo, “A fuzzy approach to deal with uncertainty in image forensics,” Signal Processing: Image Communication, vol. 27, no. 9, pp. 998–1010, 2012.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133