On the reliability of forensic schemes using resampling for image copy-move forgery

被引:0
作者
Kang, Xiaobing [1 ]
Lin, Guangfeng [1 ]
Zhang, Erhu [1 ]
Chen, Yajun [1 ]
机构
[1] Xian Univ Technol, Fac Printing & Packaging Engn, Dept Informat Sci, Xian 710048, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
multimedia security; digital image forensics; copy-move forgery; resampling; reliability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of image forgery detection in multimedia security and forensics is to find a clue of image manipulation and prove the inauthenticity of digital images. The presence of the original and its duplicated regions in an image is regarded as a fingerprint for copy-move forgery. The problem investigated here concerns the situation when resampling process is employed in the pre-processing stage of detecting image copy-move forgery. In several detection techniques of copy-move forgery in digital images, resampling is utilised to lower the spatial resolution of an image, further improving the efficiency and the speed of image forensics. However, the reliability of detection methods has not been examined in detail. In this paper, we take a view of some recently-proposed forensic techniques using resampling and analyse the reliability of detecting copy-move forgery, by modelling copy-move forgery process and detection problem. Based on theoretical analysis and experimental validation it is concluded from this study that a correct detection of image copy-move tampering may be impeded by resampling operation under certain conditions and it is more difficult to reveal the forgery than previously thought.
引用
收藏
页码:270 / 287
页数:18
相关论文
共 26 条
  • [1] Alessandro P., 2013, ISRN SIGNAL PROCESSI, V2013
  • [2] A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery
    Amerini, Irene
    Ballan, Lamberto
    Caldelli, Roberto
    Del Bimbo, Alberto
    Serra, Giuseppe
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 1099 - 1110
  • [3] Anderson R., 2011, ACM COMPUT SURV, V43
  • [4] AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY
    Bayram, Sevinc
    Sencar, Husrev Taha
    Memon, Nasir
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 1053 - +
  • [5] Caldelli R., 2012, INT S COMM CONTR SIG
  • [6] Ellison J., 1995, GODD C SPAC APPL ART, P163
  • [7] Fridrich AJ, 2003, P DIG FOR RES WORKSH, DOI DOI 10.1109/PACIIA.2008.240
  • [8] Ghorbani M., 2011, 2011 18 INT C SYST S, P1
  • [9] Khan Saiqa, 2010, 2010 International Conference on Signal and Image Processing (ICSIP 2010), P69, DOI 10.1109/ICSIP.2010.5697444
  • [10] Khan S., 2010, INT J COMPUTER SCI E, V2, P1801