Detection and localization of forgery using statistics of DCT and Fourier components

被引:20
作者
Dua, Shilpa [1 ]
Singh, Jyotsna [1 ]
Parthasarathy, Harish [1 ]
机构
[1] Netaji Subhas Inst Technol, Div Elect & Commun Engn, Multimedia Res Lab, New Delhi, India
关键词
Discrete cosine transform; Doubly stochastic model; Image forgery detection; JPEG compression; Phase congruency; DIGITAL IMAGES; PHASE; STEGANALYSIS; FEATURES; WAVELET; MODEL;
D O I
10.1016/j.image.2020.115778
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we present a comprehensive approach for investigating JPEG compressed test images, suspected of being tampered either by splicing or copy-move forgery (cmf). In JPEG compression, the image plane is divided into non-overlapping blocks of size 8 x 8 pixels. A unified approach based on block-processing of JPEG image is proposed to identify whether the image is authentic/forged and subsequently localize the tampered region in forged images. In the initial step, doubly stochastic model (dsm) of block-wise quantized discrete cosine transform (DCT) coefficients is exploited to segregate authentic and forged JPEG images from a standard dataset (CASIA). The scheme is capable of identifying both the types of forged images, spliced as well as copy-moved. Once the presence of tampering is detected, the next step is to localize the forged region according to the type of forgery. In case of spliced JPEG images, the tampered region is localized using block-wise correlation maps of dequantized DCT coefficients and its recompressed version at different quality factors. The scheme is able to identify the spliced region in images tampered by pasting uncompressed or JPEG image patch on a JPEG image or vice versa, with all possible combinations of quality factors. Alternatively, in the case of copy-move forgery, the duplication regions are identified using highly localized phase congruency features of each block. Experimental results are presented to consolidate the theoretical concept of the proposed technique and the performance is compared with the already existing state of art methods.
引用
收藏
页数:18
相关论文
共 40 条
  • [1] Passive detection of image forgery using DCT and local binary pattern
    Alahmadi, Amani
    Hussain, Muhammad
    Aboalsamh, Hatim
    Muhammad, Ghulam
    Bebis, George
    Mathkour, Hassan
    [J]. SIGNAL IMAGE AND VIDEO PROCESSING, 2017, 11 (01) : 81 - 88
  • [2] Detection of copy-move image forgery based on discrete cosine transform
    Alkawaz, Mohammed Hazim
    Sulong, Ghazali
    Saba, Tanzila
    Rehman, Amjad
    [J]. NEURAL COMPUTING & APPLICATIONS, 2018, 30 (01) : 183 - 192
  • [3] A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery
    Amerini, Irene
    Ballan, Lamberto
    Caldelli, Roberto
    Del Bimbo, Alberto
    Serra, Giuseppe
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 1099 - 1110
  • [4] [Anonymous], 2001, ELEMENTS STAT LEARNI
  • [5] Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
    Bianchi, Tiziano
    Piva, Alessandro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1003 - 1017
  • [6] Bianchi Tiziano, 2011, 2011 IEEE INT WORKSH, P1, DOI DOI 10.1109/WIFS.2011.6123159
  • [7] ON CENTRAL LIMIT THEOREM FOR CORRELATED RANDOM VARIABLES
    BLUM, M
    [J]. PROCEEDINGS OF THE IEEE, 1964, 52 (03) : 308 - &
  • [8] Tampering Detection and Localization through Clustering of Camera-Based CNN Features
    Bondi, Luca
    Lameri, Silvia
    Guera, David
    Bestagini, Paolo
    Delp, Edward J.
    Tubaro, Stefano
    [J]. 2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2017, : 1855 - 1864
  • [9] Detection and Localization of Image Forgeries using Resampling Features and Deep Learning
    Bunk, Jason
    Bappy, Jawadul H.
    Mohammed, Tajuddin Manhar
    Nataraj, Lakshmanan
    Flenner, Arjuna
    Manjunath, B. S.
    Chandrasekaran, Shivkumar
    Roy-Chowdhury, Amit K.
    Peterson, Lawrence
    [J]. 2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2017, : 1881 - 1889
  • [10] Image splicing detection using 2-D phase congruency and statistical moments of characteristic function
    Chen, Wen
    Shi, Yun Q.
    Su, Wei
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505