183 research outputs found

    Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks

    Full text link
    Due to the wide diffusion of JPEG coding standard, the image forensic community has devoted significant attention to the development of double JPEG (DJPEG) compression detectors through the years. The ability of detecting whether an image has been compressed twice provides paramount information toward image authenticity assessment. Given the trend recently gained by convolutional neural networks (CNN) in many computer vision tasks, in this paper we propose to use CNNs for aligned and non-aligned double JPEG compression detection. In particular, we explore the capability of CNNs to capture DJPEG artifacts directly from images. Results show that the proposed CNN-based detectors achieve good performance even with small size images (i.e., 64x64), outperforming state-of-the-art solutions, especially in the non-aligned case. Besides, good results are also achieved in the commonly-recognized challenging case in which the first quality factor is larger than the second one.Comment: Submitted to Journal of Visual Communication and Image Representation (first submission: March 20, 2017; second submission: August 2, 2017

    Review on passive approaches for detecting image tampering

    Get PDF
    This paper defines the presently used methods and approaches in the domain of digital image forgery detection. A survey of a recent study is explored including an examination of the current techniques and passive approaches in detecting image tampering. This area of research is relatively new and only a few sources exist that directly relate to the detection of image forgeries. Passive, or blind, approaches for detecting image tampering are regarded as a new direction of research. In recent years, there has been significant work performed in this highly active area of research. Passive approaches do not depend on hidden data to detect image forgeries, but only utilize the statistics and/or content of the image in question to verify its genuineness. The specific types of forgery detection techniques are discussed below

    Recent Advances in Digital Image and Video Forensics, Anti-forensics and Counter Anti-forensics

    Full text link
    Image and video forensics have recently gained increasing attention due to the proliferation of manipulated images and videos, especially on social media platforms, such as Twitter and Instagram, which spread disinformation and fake news. This survey explores image and video identification and forgery detection covering both manipulated digital media and generative media. However, media forgery detection techniques are susceptible to anti-forensics; on the other hand, such anti-forensics techniques can themselves be detected. We therefore further cover both anti-forensics and counter anti-forensics techniques in image and video. Finally, we conclude this survey by highlighting some open problems in this domain

    Forensic Technique for Detection of Image Forgery

    Full text link
    Todays digital image plays an important role in all areas such as baking, communication, business etc. Due to the availability of manipulation software it is very easy to manipulate the original image. The contents in an original image can be copy-paste to hide some information or to create tampering. The new area introduces to detect the forgery is an image forensic. In this paper proposes the new image forensic technique to detect the presence of forgery in the compressed images and in other format images. The proposed method is based on the no subsampled contoured transform (NSCT). The proposed method is made up of three parts as preprocessing, nsct transform and forgery detection. The proposed forensic method is flexible, multiscale, multidirectional, and image decomposition is shift invariant that can be efficiently implemented via the à trous algorithm. The proposed a design framework based on the mapping approach. This method allows for a fast implementation based on a lifting or ladder structure. The proposed method ensures that the frame elements are regular, symmetric, and the frame is close to a tight one. The NSCT compares with and dct method in this paper

    An Overview on Image Forensics

    Get PDF
    The aim of this survey is to provide a comprehensive overview of the state of the art in the area of image forensics. These techniques have been designed to identify the source of a digital image or to determine whether the content is authentic or modified, without the knowledge of any prior information about the image under analysis (and thus are defined as passive). All these tools work by detecting the presence, the absence, or the incongruence of some traces intrinsically tied to the digital image by the acquisition device and by any other operation after its creation. The paper has been organized by classifying the tools according to the position in the history of the digital image in which the relative footprint is left: acquisition-based methods, coding-based methods, and editing-based schemes

    Statistical Feature based Blind Classifier for JPEG Image Splice Detection

    Get PDF
    Digital imaging, image forgery and its forensics have become an established field of research now days. Digital imaging is used to enhance and restore images to make them more meaningful while image forgery is done to produce fake facts by tampering images. Digital forensics is then required to examine the questioned images and classify them as authentic or tampered. This paper aims to design and implement a blind classifier to classify original and spliced Joint Photographic Experts Group (JPEG) images. Classifier is based on statistical features obtained by exploiting image compression artifacts which are extracted as Blocking Artifact Characteristics Matrix. The experimental results have shown that the proposed classifier outperforms the existing one. It gives improved performance in terms of accuracy and area under curve while classifying images. It supports .bmp and .tiff file formats and is fairly robust to noise

    Re-compression Based JPEG Forgery Detection and Localization with Optimal Reconstruction

    Get PDF
    In today’s media–saturated society, digital images act as the primary carrier for majority of information that flows around us. However, because of the advent of highly sophisticated easy–to–use image processing tools, modifying images has become easy. Joint Photographic Experts Group (JPEG) is the most widely used format, prevalent today as a world–wide standard, for compression and storage of digital images. Almost all present–day digital cameras use the JPEG format for image acquisition and storage, due to its efficient compression features and optimal space requirement. In this propose work we aim to detect malicious tampering of JPEG images, and subsequently reconstruct the forged image optimally. We deal with lossy JPEG image format in this paper, which is more widely adopted compared to its lossless counter–part. The proposed technique is capable of detecting single as well as multiple forged regions in a JPEG image. We aim to achieve optimal reconstruction since the widely used JPEG being a lossy technique, under no condition would allow 100% reconstruction. The proposed reconstruction is optimal in the sense that we aim to obtain a form of the image, as close to its original form as possible, apart from eliminating the effects of forgery from the image. In this work, we exploit the inherent characteristics of JPEG compression and re–compression, for forgery detection and reconstruction of JPEG images. To prove the efficiency of our proposed technique we compare it with the other JPEG forensic techniques and using quality metric measures we assess the visual quality of the reconstructed image

    Detecting Image Brush Editing Using the Discarded Coefficients and Intentions

    Get PDF
    This paper describes a quick and simple method to detect brush editing in JPEG images. The novelty of the proposed method is based on detecting the discarded coefficients during the quantization of the image. Another novelty of this paper is the development of a subjective metric named intentions. The method directly analyzes the allegedly tampered image and generates a forgery mask indicating forgery evidence for each image block. The experiments show that our method works especially well in detecting brush strokes, and it works reasonably well with added captions and image splicing. However, the method is less effective detecting copy-moved and blurred regions. This means that our method can effectively contribute to implementing a complete imagetampering detection tool. The editing operations for which our method is less effective can be complemented with methods more adequate to detect them
    corecore