15 research outputs found

    Forensic Technique for Detection of Image Forgery

    Full text link
    Todays digital image plays an important role in all areas such as baking, communication, business etc. Due to the availability of manipulation software it is very easy to manipulate the original image. The contents in an original image can be copy-paste to hide some information or to create tampering. The new area introduces to detect the forgery is an image forensic. In this paper proposes the new image forensic technique to detect the presence of forgery in the compressed images and in other format images. The proposed method is based on the no subsampled contoured transform (NSCT). The proposed method is made up of three parts as preprocessing, nsct transform and forgery detection. The proposed forensic method is flexible, multiscale, multidirectional, and image decomposition is shift invariant that can be efficiently implemented via the à trous algorithm. The proposed a design framework based on the mapping approach. This method allows for a fast implementation based on a lifting or ladder structure. The proposed method ensures that the frame elements are regular, symmetric, and the frame is close to a tight one. The NSCT compares with and dct method in this paper

    Feature aggregation and region-aware learning for detection of splicing forgery.

    Get PDF
    Detection of image splicing forgery become an increasingly difficult task due to the scale variations of the forged areas and the covered traces of manipulation from post-processing techniques. Most existing methods fail to jointly multi-scale local and global information and ignore the correlations between the tampered and real regions in inter-image, which affects the detection performance of multi-scale tampered regions. To tackle these challenges, in this paper, we propose a novel method based on feature aggregation and region-aware learning to detect the manipulated areas with varying scales. In specific, we first integrate multi-level adjacency features using a feature selection mechanism to improve feature representation. Second, a cross-domain correlation aggregation module is devised to perform correlation enhancement of local features from CNN and global representations from Transformer, allowing for a complementary fusion of dual-domain information. Third, a region-aware learning mechanism is designed to improve feature discrimination by comparing the similarities and differences of the features between different regions. Extensive evaluations on benchmark datasets indicate the effectiveness in detecting multi-scale spliced tampered regions

    Метод виявлення зображень, перезбережених у формат без втрат з формату з втратами

    No full text
    Несанкціоновані зміни цифрового зображення (ЦЗ) вимагають його наступного збереження в деякому форматі, можливо відмінному від вхідного. Виявлення результатів перезбереження ЦЗ з одного формату в іншій є непрямим покажчиком на порушення його цілісності. У роботі на основі нового підходу до проблеми виявлення порушення цілісності зображення, заснованого на аналізі нормованого вектора сингулярних чисел і лівого (правого) сингулярних векторів, що відповідають максимальному сингулярному числу, блоків його матриці, розроблений метод відділення ЦЗ, спочатку збережених у форматі без втрат, від зображень, перезбережених у формат без втрат з формату із втратами, що перевершує по ефективності сучасні аналоги. Розроблений метод може бути використаний самостійно, а також як складова частина процесу стеганоаналізу ЦЗ.Unauthorized changes of the digital image require its subsequent saving in some file format which may be different from the original one. The detection of the re-saving image from one format to another is an indirect indication of its integrity violation. The method of separating digital images that originally saved in lossless format from images that were re-saved in lossless from lossy format was developed. The proposed method based on analysis of the normalized vector of singular values and left (right) singular vectors, corresponding to the maximal singular value, of blocks of image matrix. The developed method can be used independently as well as an integral part of the steganalysis process

    Метод виявлення зображень, перезбережених у формат без втрат з формату з втратами

    Get PDF
    Unauthorized changes of the digital image require its subsequent saving in some file format which may be different from the original one. The detection of the re-saving image from one format to another is an indirect indication of its in­tegrity violation. The method of separating digital images that originally sa­ved in lossless format from images that were re-saved in lossless from lossy for­mat was developed. The proposed method based on analysis of the normali­zed vector of singular values and left (right) singular vectors, corresponding to the maximal singular value, of blocks of image matrix. The developed method can be used independently as well as an integral part of the steganalysis process.Несанкціоновані зміни цифрового зображення (ЦЗ) вимагають його наступного збереження в деякому форматі, можливо відмінному від вхідного. Виявлення результатів перезбереження ЦЗ з одного формату в іншій є непрямим покажчиком на порушення його цілісності. У роботі на основі нового підходу до проблеми виявлення порушення цілісності зображення, заснованого на аналізі нормованого вектора сингулярних чисел і лівого (правого) сингулярних векторів, що відповідають максимальному сингулярному числу, блоків його матриці, розроблений метод відділення ЦЗ, спочатку збережених у форматі без втрат, від зображень, перезбережених у формат без втрат з формату із втратами, що перевершує по ефективності сучасні аналоги. Розроблений метод може бути використаний самостійно, а також як складова частина процесу стеганоаналізу Ц

    Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps

    Get PDF
    In this paper, a simple yet reliable algorithm to detect the presence of nonaligned double JPEG compression (NA-JPEG) in compressed images is proposed. The method evaluates a single feature based on the integer periodicity of the blockwise discrete cosine transform (DCT) coefficients when the DCT is computed according to the grid of the previous JPEG compression. Even if the proposed feature is computed relying only on DC coefficient statistics, a simple threshold detector can classify NA-JPEG images with improved accuracy with respect to existing methods and on smaller image sizes, without resorting to a properly trained classifier. Moreover, the proposed scheme is able to accurately estimate the grid shift and the quantization step of the DC coefficient of the primary JPEG compression, allowing one to perform a more detailed analysis of possibly forged image

    Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks

    Full text link
    Due to the wide diffusion of JPEG coding standard, the image forensic community has devoted significant attention to the development of double JPEG (DJPEG) compression detectors through the years. The ability of detecting whether an image has been compressed twice provides paramount information toward image authenticity assessment. Given the trend recently gained by convolutional neural networks (CNN) in many computer vision tasks, in this paper we propose to use CNNs for aligned and non-aligned double JPEG compression detection. In particular, we explore the capability of CNNs to capture DJPEG artifacts directly from images. Results show that the proposed CNN-based detectors achieve good performance even with small size images (i.e., 64x64), outperforming state-of-the-art solutions, especially in the non-aligned case. Besides, good results are also achieved in the commonly-recognized challenging case in which the first quality factor is larger than the second one.Comment: Submitted to Journal of Visual Communication and Image Representation (first submission: March 20, 2017; second submission: August 2, 2017
    corecore