Identification of Various Image Operations Using Residual-Based Features

被引:120
作者
Li, Haodong [1 ]
Luo, Weiqi [2 ]
Qiu, Xiaoqing [2 ]
Huang, Jiwu [3 ]
机构
[1] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangdong Key Lab Informat Secur Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangdong Key Lab Informat Secur Technol, Guangzhou 510006, Guangdong, Peoples R China
[3] Shenzhen Univ, Coll Informat Engn, Shenzhen Key Lab Media Secur, Shenzhen 518052, Peoples R China
基金
中国国家自然科学基金;
关键词
Countering anti-forensics; image forensics; image operation detection; image residuals; EXPOSING DIGITAL FORGERIES; CONTRAST ENHANCEMENT; SPLICING DETECTION; ANTI-FORENSICS; STEGANALYSIS; TRACES;
D O I
10.1109/TCSVT.2016.2599849
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Image forensics has attracted wide attention during the past decade. However, most existing works aim at detecting a certain operation, which means that their proposed features usually depend on the investigated image operation and they consider only binary classification. This usually leads to misleading results if irrelevant features and/or classifiers are used. For instance, a JPEG decompressed image would be classified as an original or median filtered image if it was fed into a median filtering detector. Hence, it is important to develop forensic methods and universal features that can simultaneously identify multiple image operations. Based on extensive experiments and analysis, we find that any image operation, including existing anti-forensics operations, will inevitably modify a large number of pixel values in the original images. Thus, some common inherent statistics such as the correlations among adjacent pixels cannot be preserved well. To detect such modifications, we try to analyze the properties of local pixels within the image in the residual domain rather than the spatial domain considering the complexity of the image contents. Inspired by image steganalytic methods, we propose a very compact universal feature set and then design a multiclass classification scheme for identifying many common image operations. In our experiments, we tested the proposed features as well as several existing features on 11 typical image processing operations and four kinds of anti-forensic methods. The experimental results show that the proposed strategy significantly outperforms the existing forensic methods in terms of both effectiveness and universality.
引用
收藏
页码:31 / 45
页数:15
相关论文
共 58 条
[1]  
[Anonymous], 2012, P IEEE SOPO, DOI DOI 10.1186/1687- 6180-2012-110
[2]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[3]   Color- and texture-based image segmentation using EM and its application to content-based image retrieval [J].
Belongie, S ;
Carson, C ;
Greenspan, H ;
Malik, J .
SIXTH INTERNATIONAL CONFERENCE ON COMPUTER VISION, 1998, :675-682
[4]   Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps [J].
Bianchi, Tiziano ;
Piva, Alessandro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :842-848
[5]  
Bohme R., 2012, DIGITAL IMAGE FORENS, P327, DOI [DOI 10.1007/978-1-4614-0757-712, 10.1007/978-1-4614-0757-7_12, DOI 10.1007/978-1-4614-0757-7_12]
[6]   Contrast Enhancement-Based Forensics in Digital Images [J].
Cao, Gang ;
Zhao, Yao ;
Ni, Rongrong ;
Li, Xuelong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (03) :515-525
[7]   Forensic identification of resampling operators: A semi non-intrusive approach [J].
Cao, Gang ;
Zhao, Yao ;
Ni, Rongrong .
FORENSIC SCIENCE INTERNATIONAL, 2012, 216 (1-3) :29-36
[8]  
Cao G, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P25
[9]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[10]   Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach [J].
Chen, Chenglong ;
Ni, Jiangqun ;
Huang, Jiwu .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013, 22 (12) :4699-4710