FORENSIC DETECTION OF MEDIAN FILTERING IN DIGITAL IMAGES

被引:111
作者
Cao, Gang [1 ]
Zhao, Yao [1 ]
Ni, Rongrong [1 ]
Yu, Lifang [1 ]
Tian, Huawei [1 ]
机构
[1] Beijing Jiaotong Univ, Inst Informat Sci, Beijing 100044, Peoples R China
来源
2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010) | 2010年
关键词
Image Forensics; Median Filtering; Image Difference; FORGERIES; TRACES;
D O I
10.1109/ICME.2010.5583869
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In digital image forensics, prior works are prone to the detection of malicious tampering. However, there is also a need for developing techniques to identify general content-preserved manipulations, which are employed to conceal tampering trails frequently. In this paper, we propose a blind forensic algorithm to detect median filtering (MF), which is applied extensively for signal denoising and digital image enhancement. The probability of zero values on the first order difference map in texture regions can serve as MF statistical fingerprint, which distinguishes MF from other operations. Since anti-forensic techniques enjoy utilizing MF to attack the linearity assumption of existing forensics algorithms, blind detection of the non-linear MF becomes especially significant. Both theoretically reasoning and experimental results verify the effectiveness of our proposed MF forensics scheme.
引用
收藏
页码:89 / 94
页数:6
相关论文
共 16 条
  • [1] [Anonymous], P SPIE STORAGE RETRI
  • [2] Bayram S., 2009, INT C AC SPEECH SIGN
  • [3] Image manipulation detection
    Bayram, Sevinc
    Avcibas, Ismail
    Sankur, Bulent
    Memon, Nasir
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [4] Cao G., 2010, Journal of Information Hiding and Multimedia Signal Processing, V1, P20
  • [5] CAO G, 2009, INT C P MULT EXP NEW
  • [6] CHEN W, 2007, SPIE ELECT IMAGING S
  • [7] CHUANG WH, 2009, INT C P AC SPEECH SI
  • [8] DIRIK AE, 2009, INT C P IM PROC CAIR
  • [9] Exposing Digital Forgeries From JPEG Ghosts
    Farid, Hany
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) : 154 - 160
  • [10] Hsiao D.-Y., 2005, 1 INT WORKSH SYST AP