33 research outputs found

    Statistical Feature based Blind Classifier for JPEG Image Splice Detection

    Get PDF
    Digital imaging, image forgery and its forensics have become an established field of research now days. Digital imaging is used to enhance and restore images to make them more meaningful while image forgery is done to produce fake facts by tampering images. Digital forensics is then required to examine the questioned images and classify them as authentic or tampered. This paper aims to design and implement a blind classifier to classify original and spliced Joint Photographic Experts Group (JPEG) images. Classifier is based on statistical features obtained by exploiting image compression artifacts which are extracted as Blocking Artifact Characteristics Matrix. The experimental results have shown that the proposed classifier outperforms the existing one. It gives improved performance in terms of accuracy and area under curve while classifying images. It supports .bmp and .tiff file formats and is fairly robust to noise

    Forensic research on detecting seam carving in digital images

    Get PDF
    Digital images have been playing an important role in our daily life for the last several decades. Naturally, image editing technologies have been tremendously developed due to the increasing demands. As a result, digital images can be easily manipulated on a personal computer or even a cellphone for many purposes nowadays, so that the authenticity of digital images becomes an important issue. In this dissertation research, four machine learning based forensic methods are presented to detect one of the popular image editing techniques, called ‘seam carving’. To reveal seam carving applied to uncompressed images from the perspective of energy distribution change, an energy based statistical model is proposed as the first work in this dissertation. Features measured global energy of images, remaining optimal seams, and noise level are extracted from four local derivative pattern (LDP) domains instead of from the original pixel domain to heighten the energy change caused by seam carving. A support vector machine (SVM) based classifier is employed to determine whether an image has been seam carved or not. In the second work, an advanced feature model is presented for seam carving detection by investigating the statistical variation among neighboring pixels. Comprised with three types of statistical features, i.e., LDP features, Markov features, and SPAM features, the powerful feature model significantly improved the state-of-the-art accuracy in detecting low carving rate seam carving. After the feature selection by utilizing SVM based recursive feature elimination (SVM-RFE), with a small amount of features selected from the proposed model the overall performance is further improved. Combining above mentioned two works, a hybrid feature model is then proposed as the third work to further boost the accuracy in detecting seam carving at low carving rate. The proposed model consists of two sets of features, which capture energy change and neighboring relationship variation respectively, achieves remarkable performance on revealing seam carving, especially low carving rate seam carving, in digital images. Besides these three hand crafted feature models, a deep convolutional neural network is designed for seam carving detection. It is the first work that successfully utilizes deep learning technology to solve this forensic problem. The experimental works demonstrate their much more improved performance in the cases where the amount of seam carving is not serious. Although these four pieces of work move the seam carving detection ahead substantially, future research works with more advanced statistical model or deep neural network along this line are expected

    Digital image forensics via meta-learning and few-shot learning

    Get PDF
    Digital images are a substantial portion of the information conveyed by social media, the Internet, and television in our daily life. In recent years, digital images have become not only one of the public information carriers, but also a crucial piece of evidence. The widespread availability of low-cost, user-friendly, and potent image editing software and mobile phone applications facilitates altering images without professional expertise. Consequently, safeguarding the originality and integrity of digital images has become a difficulty. Forgers commonly use digital image manipulation to transmit misleading information. Digital image forensics investigates the irregular patterns that might result from image alteration. It is crucial to information security. Over the past several years, machine learning techniques have been effectively used to identify image forgeries. Convolutional Neural Networks(CNN) are a frequent machine learning approach. A standard CNN model could distinguish between original and manipulated images. In this dissertation, two CNN models are introduced to recognize seam carving and Gaussian filtering. Training a conventional CNN model for a new similar image forgery detection task, one must start from scratch. Additionally, many types of tampered image data are challenging to acquire or simulate. Meta-learning is an alternative learning paradigm in which a machine learning model gets experience across numerous related tasks and uses this expertise to improve its future learning performance. Few-shot learning is a method for acquiring knowledge from few data. It can classify images with as few as one or two examples per class. Inspired by meta-learning and few-shot learning, this dissertation proposed a prototypical networks model capable of resolving a collection of related image forgery detection problems. Unlike traditional CNN models, the proposed prototypical networks model does not need to be trained from scratch for a new task. Additionally, it drastically decreases the quantity of training images

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Sayısal görüntülerde piksel yolu çıkarma esaslı boyut değişikliği tespiti

    Get PDF
    06.03.2018 tarihli ve 30352 sayılı Resmi Gazetede yayımlanan “Yükseköğretim Kanunu İle Bazı Kanun Ve Kanun Hükmünde Kararnamelerde Değişiklik Yapılması Hakkında Kanun” ile 18.06.2018 tarihli “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” gereğince tam metin erişime açılmıştır.Piksel yolu çıkarma (seam carving), günümüzde en çok uygulanan içeriğe duyarlı görüntü boyutlandırma yöntemlerinden biridir. Piksel yolu çıkarmanın sebep olduğu bozukluklar çok yüksek oranlarda ölçekleme yapılmadıkça insan gözü tarafından algılanamaz. Bu görsel başarının sebebi görüntüdeki piksellerin önem değerlerine göre değerlendiriliyor olmasıdır. Görüntünün optimal seam'i, görüntü genelinde toplamda en az enerji (önem) değerine sahip piksel yoludur. Tek piksel genişliğindeki önemsiz bu piksel yolları birer azaltılarak her iterasyonda görüntünün genişliği ya da yüksekliği bir azaltılır. Anlamsal olarak önemli olan ön plan nesnelerine mümkün olduğunca dokunulmaz. Görüntünün içeriğinin bu denli korunduğu bir ölçekleme yaklaşımı kötü niyetli olarak da kullanılabileceğinden, bu şekilde ölçeklenmiş görüntülerin tespiti büyük önem arz etmektedir. Piksel yolu çıkarma tabanlı ölçeklemenin tespiti diğer ölçekleme yöntemlerine göre oldukça zordur. çünkü görüntülerin geometrik açıdan ele alınması yetmez, anlamsal bir değerlendirme içeren detaylı bir analiz yapılması gerekmektedir. Bu çalışmada, piksel yolu çıkarılarak boyutları değiştirilmiş görüntülerin tespiti, görüntülerden özellik çıkarılması ve çıkarılan özelliklerle Destek Vektör Makinesi'nin eğitilmesi şeklinde gerçekleştirilmektedir. Çıkarılan özellikler piksel yolu çıkarma algoritmasının uygulanışı ile alakalı özelliklerdir. Ayrıca, yöntemin başarımını artırmak amacıyla, özellik çıkarımı öncesinde görüntülere Yerel İkili Örüntüler dönüşümü uygulanmış ve piksel yolu çıkarmanın sebep olabileceği yerel bozukluklar belirginleştirilmiştir. Tüm bunlara ek olarak, piksel yolu çıkarmanın görüntülerin farklı parçalarındaki etkileri de incelenmiştir. Bu amaçla görüntüler şeritlere ayrılarak her bir şerit seam özellikleri bakımından değerlendirilmiş ve tespit doğrulukları bu şekilde oldukça artırılmıştır. Geliştirilen yöntem ile piksel yolu çıkarma tabanlı ölçekleme %30 ölçeklenmiş görüntülerde %99,9'lara kadar tespit edilebilmiştir. Performans literatürdeki diğer yöntemlere göre ortalamada %20'den fazla artırılmıştır. Tespit performansı özellikle tespit edilmesi daha zor olan %3, %6 gibi küçük ölçekleme oranlarında %26 geliştirilmiştir.Seam carving is one of the mostly applied content-aware image resizing methods today. The deteriorations caused by seam carving are mostly unnoticeable for human eyes unless the scaling ratio is very high. The reason of this visual success comes from evaluating the pixels according to their importance values. Optimal seam of an image is a pixel path which contains the least energy (importance) throughout the image. Image width or height is decreased by one in each iteration by removing those unimportant, one-pixel width pixel paths. The semantically important foreground objects remain untouched as far as possible. Since such a scaling approach which perfectly preserves the image content can be used malevolently, the detection of the images that are scaled in this manner becomes more of an issue. The detection of seam carving is more difficult than the other scaling methods since evaluating the images geometrically is not sufficient, but a detailed analysis investigating the semantical concept is required. In this study, the detection of the images scaled by seam carving is realized by feature extraction and training a Support Vector Machine with those features. The extracted features are related to the seam carving process. In addition, Local Binary Patterns transform is applied to the images before feature extraction to reveal the local artifacts caused by seam carving. Besides, the effect of seam carving in sub parts of the images is investigated. For this purpose, the images are divided into several stripes and each and every stripe is evaluated in terms of seam features. This evaluation has been improved the detection accuracies. Seam carving based resizing has been detected up to 99,9% in 30%scaled images by the developed method. The detection performance has been improved 20% on the average when compared with other methods in the literature. The detection performance is improved 26% in low scaling ratios like 3% and 6% which are harder to detect

    Tamper detection of qur'anic text watermarking scheme based on vowel letters with Kashida using exclusive-or and queueing technique

    Get PDF
    The most sensitive Arabic text available online is the digital Holy Qur’an. This sacred Islamic religious book is recited by all Muslims worldwide including the non-Arabs as part of their worship needs. It should be protected from any kind of tampering to keep its invaluable meaning intact. Different characteristics of the Arabic letters like the vowels ( أ . و . ي ), Kashida (extended letters), and other symbols in the Holy Qur’an must be secured from alterations. The cover text of the al-Qur’an and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), Embedding Ratio (ER), and Normalized Cross-Correlation (NCC), thus the location for tamper detection gets low accuracy. Watermarking technique with enhanced attributes must therefore be designed for the Qur’an text using Arabic vowel letters with Kashida. Most of the existing detection methods that tried to achieve accurate results related to the tampered Qur’an text often show various limitations like diacritics, alif mad surah, double space, separate shapes of Arabic letters, and Kashida. The gap addressed by this research is to improve the security of Arabic text in the Holy Qur’an by using vowel letters with Kashida. The purpose of this research is to enhance Quran text watermarking scheme based on exclusive-or and reversing with queueing techniques. The methodology consists of four phases. The first phase is pre-processing followed by the embedding process phase to hide the data after the vowel letters wherein if the secret bit is ‘1’, insert the Kashida but do not insert it if the bit is ‘0’. The third phase is extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR (for the imperceptibility), ER (for the capacity), and NCC (for the security of the watermarking). The experimental results revealed the improvement of the NCC by 1.77 %, PSNR by 9.6 %, and ER by 8.6 % compared to available current schemes. Hence, it can be concluded that the proposed scheme has the ability to detect the location of tampering accurately for attacks of insertion, deletion, and reordering
    corecore