52 research outputs found

    Forensic Technique for Detection of Image Forgery

    Full text link
    Todays digital image plays an important role in all areas such as baking, communication, business etc. Due to the availability of manipulation software it is very easy to manipulate the original image. The contents in an original image can be copy-paste to hide some information or to create tampering. The new area introduces to detect the forgery is an image forensic. In this paper proposes the new image forensic technique to detect the presence of forgery in the compressed images and in other format images. The proposed method is based on the no subsampled contoured transform (NSCT). The proposed method is made up of three parts as preprocessing, nsct transform and forgery detection. The proposed forensic method is flexible, multiscale, multidirectional, and image decomposition is shift invariant that can be efficiently implemented via the à trous algorithm. The proposed a design framework based on the mapping approach. This method allows for a fast implementation based on a lifting or ladder structure. The proposed method ensures that the frame elements are regular, symmetric, and the frame is close to a tight one. The NSCT compares with and dct method in this paper

    Reverse engineering of double compressed images in the presence of contrast enhancement

    Get PDF
    Abstract-A comparison between two forensic techniques for the reverse engineering of a chain composed by a double JPEG compression interleaved by a linear contrast enhancement is presented here. The first approach is based on the well known peak-to-valley behavior of the histogram of double-quantized DCT coefficients, while the second approach is based on the distribution of the first digit of DCT coefficients. These methods have been extended to the study of the considered processing chain, for both the chain detection and the estimation of its parameters. More specifically, the proposed approaches provide an estimation of the quality factor of the previous JPEG compression and the amount of linear contrast enhancement

    Feature aggregation and region-aware learning for detection of splicing forgery.

    Get PDF
    Detection of image splicing forgery become an increasingly difficult task due to the scale variations of the forged areas and the covered traces of manipulation from post-processing techniques. Most existing methods fail to jointly multi-scale local and global information and ignore the correlations between the tampered and real regions in inter-image, which affects the detection performance of multi-scale tampered regions. To tackle these challenges, in this paper, we propose a novel method based on feature aggregation and region-aware learning to detect the manipulated areas with varying scales. In specific, we first integrate multi-level adjacency features using a feature selection mechanism to improve feature representation. Second, a cross-domain correlation aggregation module is devised to perform correlation enhancement of local features from CNN and global representations from Transformer, allowing for a complementary fusion of dual-domain information. Third, a region-aware learning mechanism is designed to improve feature discrimination by comparing the similarities and differences of the features between different regions. Extensive evaluations on benchmark datasets indicate the effectiveness in detecting multi-scale spliced tampered regions

    Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps

    Get PDF
    In this paper, a simple yet reliable algorithm to detect the presence of nonaligned double JPEG compression (NA-JPEG) in compressed images is proposed. The method evaluates a single feature based on the integer periodicity of the blockwise discrete cosine transform (DCT) coefficients when the DCT is computed according to the grid of the previous JPEG compression. Even if the proposed feature is computed relying only on DC coefficient statistics, a simple threshold detector can classify NA-JPEG images with improved accuracy with respect to existing methods and on smaller image sizes, without resorting to a properly trained classifier. Moreover, the proposed scheme is able to accurately estimate the grid shift and the quantization step of the DC coefficient of the primary JPEG compression, allowing one to perform a more detailed analysis of possibly forged image

    Spotting the difference: Context retrieval and analysis for improved forgery detection and localization

    Get PDF
    As image tampering becomes ever more sophisticated and commonplace, the need for image forensics algorithms that can accurately and quickly detect forgeries grows. In this paper, we revisit the ideas of image querying and retrieval to provide clues to better localize forgeries. We propose a method to perform large-scale image forensics on the order of one million images using the help of an image search algorithm and database to gather contextual clues as to where tampering may have taken place. In this vein, we introduce five new strongly invariant image comparison methods and test their effectiveness under heavy noise, rotation, and color space changes. Lastly, we show the effectiveness of these methods compared to passive image forensics using Nimble [1], a new, state-of-the-art dataset from the National Institute of Standards and Technology (NIST)

    A Feature-Based Forensic Procedure for Splicing Forgeries Detection

    Get PDF
    Nowadays, determining if an image appeared somewhere on the web or in a magazine or is authentic or not has become crucial. Image forensics methods based on features have demonstrated so far to be very effective in detecting forgeries in which a portion of an image is cloned somewhere else onto the same image. Anyway such techniques cannot be adopted to deal with splicing attack, that is, when the image portion comes from another picture that then, usually, is not available anymore for an operation of feature match. In this paper, a procedure in which these techniques could also be employed will be shown to get rid of splicing attack by resorting to the use of some repositories of images available on the Internet like Google Images or TinEye Reverse Image Search. Experimental results are presented on some real case images retrieved on the Internet to demonstrate the capacity of the proposed procedure
    • …
    corecore