Detection of Seam Carving in JPEG Images

被引:0
作者
Chang, Wen-Lung [1 ]
Shih, Timothy K. [1 ]
Hsu, Hui-Huang
机构
[1] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan Country 32001, Taiwan
来源
2013 INTERNATIONAL JOINT CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY & UBI-MEDIA COMPUTING (ICAST-UMEDIA) | 2013年
关键词
Image forensics; Seam carving; Seam insertion; Steganalysis features; Tamper detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The content-aware image retargeting algorithm is used for modifying the image size into the suitable size in different device. "Seam carving" is a kind of content aware image retargeting algorithm. In this paper, based on the blocking artifact characteristics matrix (BACM), we propose a method to detect seam carving in natural images without knowledge of the original image. In detail, for the original JPEG images, the BACM exhibits regular symmetrical shapes; for the images that are damaged, the regular symmetrical property of the BACM is destroyed. After found BACM from images, we define 18 features to detect the damage from BACM to train a support vector machine (SVM) classifier for recognizing whether an image is an original or it has been modified by seam-carving. We show that BACM is useful for detect the damage by seam-carving in JPEG format images.
引用
收藏
页码:632 / +
页数:2
相关论文
共 13 条
  • [1] Seam carving for content-aware image resizing
    Avidan, Shai
    Shamir, Ariel
    [J]. ACM TRANSACTIONS ON GRAPHICS, 2007, 26 (03):
  • [2] Identification of bitmap compression history: JPEG detection and quantizer estimation
    Fan, ZG
    de Queiroz, RL
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) : 230 - 235
  • [3] Farid H., 2009, IEEE SIGNAL PROCESSI
  • [4] Fridrich A.J., 2003, P DIGITAL FORENSIC R
  • [5] Detection of linear and cubic interpolation in JPEG compressed images
    Gallagher, AC
    [J]. 2nd Canadian Conference on Computer and Robot Vision, Proceedings, 2005, : 65 - 72
  • [6] Kirchner M, 2008, MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, P11, DOI 10.1145/1411328.1411333
  • [7] Luo WQ, 2007, INT CONF ACOUST SPEE, P217
  • [8] Popescu A.C., 2004, Exposing digital forgeries by detecting duplicated image regions
  • [9] Popescu AC, 2004, LECT NOTES COMPUT SC, V3200, P128
  • [10] Exposing digital forgeries by detecting traces of resampling
    Popescu, AC
    Farid, H
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) : 758 - 767