Benford's Law for Detecting Contrast Enhancement

被引:0
作者
Moin, Syeda Shira [1 ]
Islam, Saiful [1 ]
机构
[1] Aligarh Muslim Univ, Zakir Hussain Coll Engn & Technol, Dept Comp Engn, Aligarh 202002, Uttar Pradesh, India
来源
2017 FOURTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP) | 2017年
关键词
image tampering; contrast enhancement; anti-forensics;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Detection of contrast enhancement operations is a quite researched topic in the field of Digital Image Forensics as the forgers often use it to conceal the visual traces left by some malicious altering of the image, such as cut-and-paste. Benford's law is an important concept from the field of statistics and it has been found to be followed by a large number of natural phenomena. In this paper, a possibility of using Benford's law for the detection of contrast enhancement has been analysed and it is found that Benford's law based features show promising capability in differentiating between contrast enhanced images and unaltered images. Further, results demonstrate that it also withstands an existing anti-forensic technique used to hide the artifacts introduced by contrast enhancement operation.
引用
收藏
页码:234 / 237
页数:4
相关论文
共 19 条
[1]  
Acebo E., 2005, P 1 EUROGRAPHICS C C, P169
[2]  
Agrawal Neha, 2016, 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), P743, DOI 10.1109/SPIN.2016.7566796
[3]   JPEG steganography detection with Benford's Law [J].
Andriotis, Panagiotis ;
Oikonomou, George ;
Tryfonas, Theo .
DIGITAL INVESTIGATION, 2013, 9 (3-4) :246-257
[4]  
[Anonymous], APSIPA T SIGNAL INFO
[5]  
[Anonymous], SCI CHINA INF SCI, DOI [10.1007/s11432-013-4928-0, DOI 10.1007/S11432-013-4928-0]
[6]  
[Anonymous], 2011, P INT WORKSH DIG WAT
[7]  
[Anonymous], ELECT IMAGING 2007
[8]  
Benford Frank, 1938, Proc. Am. Philos. Soc., P551, DOI DOI 10.2307/984802
[9]   Contrast Enhancement-Based Forensics in Digital Images [J].
Cao, Gang ;
Zhao, Yao ;
Ni, Rongrong ;
Li, Xuelong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (03) :515-525
[10]   An Evaluation of Popular Copy-Move Forgery Detection Approaches [J].
Christlein, Vincent ;
Riess, Christian ;
Jordan, Johannes ;
Riess, Corinna ;
Angelopoulou, Elli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1841-1854