Contrast Enhancement-Based Forensics in Digital Images

被引:177
作者
Cao, Gang [1 ]
Zhao, Yao [1 ,2 ]
Ni, Rongrong [1 ,3 ]
Li, Xuelong [4 ]
机构
[1] Beijing Jiaotong Univ, Inst Informat Sci, Beijing 100044, Peoples R China
[2] State Key Lab Rail Traff Control & Safety, Beijing 100044, Peoples R China
[3] Beijing Key Lab Adv Informat Sci & Network Techno, Beijing 100044, Peoples R China
[4] Chinese Acad Sci, Xian Inst Opt & Precis Mech, State Key Lab Transient Opt & Photon, OPT IMagery Anal & Learning OPTIMAL, Xian 710119, Peoples R China
基金
中国国家自然科学基金;
关键词
Computer vision; digital forensics; image forgery; contrast enhancement; composite image; FORGERY DETECTION;
D O I
10.1109/TIFS.2014.2300937
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a retouching manipulation, contrast enhancement is typically used to adjust the global brightness and contrast of digital images. Malicious users may also perform contrast enhancement locally for creating a realistic composite image. As such it is significant to detect contrast enhancement blindly for verifying the originality and authenticity of the digital images. In this paper, we propose two novel algorithms to detect the contrast enhancement involved manipulations in digital images. First, we focus on the detection of global contrast enhancement applied to the previously JPEG-compressed images, which are widespread in real applications. The histogram peak/gap artifacts incurred by the JPEG compression and pixel value mappings are analyzed theoretically, and distinguished by identifying the zero-height gap fingerprints. Second, we propose to identify the composite image created by enforcing contrast adjustment on either one or both source regions. The positions of detected blockwise peak/gap bins are clustered for recognizing the contrast enhancement mappings applied to different source regions. The consistency between regional artifacts is checked for discovering the image forgeries and locating the composition boundary. Extensive experiments have verified the effectiveness and efficacy of the proposed techniques.
引用
收藏
页码:515 / 525
页数:11
相关论文
共 26 条
[21]   Exposing digital forgeries by detecting traces of resampling [J].
Popescu, AC ;
Farid, H .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) :758-767
[22]   UCID - An uncompressed colour image database [J].
Schaefer, G ;
Stich, M .
STORAGE AND RETRIEVAL METHODS AND APPLICATIONS FOR MULTIMEDIA 2004, 2004, 5307 :472-480
[23]   FORENSIC ESTIMATION AND RECONSTRUCTION OF A CONTRAST ENHANCEMENT MAPPING [J].
Stamm, Matthew C. ;
Liu, K. J. Ray .
2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, :1698-1701
[24]   Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints [J].
Stamm, Matthew C. ;
Liu, K. J. Ray .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (03) :492-506
[25]   Digital image forensics via intrinsic fingerprints [J].
Swaminathan, Ashwin ;
Wu, Min ;
Liu, K. J. Ray .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) :101-117
[26]   Digital Image Forgery Detection Based on Lens and Sensor Aberration [J].
Yerushalmy, Ido ;
Hel-Or, Hagit .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2011, 92 (01) :71-91