Morphological Filter Detector for Image Forensics Applications

被引:14
作者
Boato, Giulia [1 ,2 ]
Duc-Tien Dang-Nguyen [3 ]
De Natale, Francesco G. B. [1 ,2 ]
机构
[1] Univ Trento, Dept Informat Engn & Comp Sci DISI, I-38122 Trento, Italy
[2] Italian Consortium Telecommun CNIT, I-43100 Parma, Italy
[3] Univ Bergen, Dept Informat Sci & Media Studies Infomedia, N-5007 Bergen, Norway
关键词
Digital Image Forensics; media authentication; morphological filter detection; TRACES;
D O I
10.1109/ACCESS.2020.2965745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mathematical morphology provides a large set of powerful non-linear image operators, widely used for feature extraction, noise removal or image enhancement. Although morphological filters might be used to remove artifacts produced by image manipulations, both on binary and graylevel documents, little effort has been spent towards their forensic identification. In this paper we propose a non-trivial extension of a deterministic approach originally detecting erosion and dilation of binary images. The proposed approach operates on grayscale images and is robust to image compression and other typical attacks. When the image is attacked the method looses its deterministic nature and uses a properly trained SVM classifier, using the original detector as a feature extractor. Extensive tests demonstrate that the proposed method guarantees very high accuracy in filtering detection, providing 100 & x0025; accuracy in discriminating the presence and the type of morphological filter in raw images of three different datasets. The achieved accuracy is also good after JPEG compression, equal or above 76.8 & x0025; on all datasets for quality factors above 80. The proposed approach is also able to determine the adopted structuring element for moderate compression factors. Finally, it is robust against noise addition and it can distinguish morphological filter from other filters.
引用
收藏
页码:13549 / 13560
页数:12
相关论文
共 43 条
[1]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[2]  
[Anonymous], ANN MINES
[3]  
[Anonymous], IEEE T INF FORENSICS
[4]  
[Anonymous], BRIT J SCI
[5]  
[Anonymous], P SPIE EL IM MED FOR
[6]  
[Anonymous], 2015, Handbook of Digital Forensics of Multimedia Data and Devices
[7]  
[Anonymous], TR590 U MAR COLL COM
[8]  
[Anonymous], P IEEE INT C IM PROC
[9]  
[Anonymous], P IEEE INT C AC SPEE
[10]   Copy-Move Forgery Detection by Matching Triangles of Keypoints [J].
Ardizzone, Edoardo ;
Bruno, Alessandro ;
Mazzola, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) :2084-2094