An image forensic method based on coefficient-pair histogram of differential DCT coefficient was proposed.In the method, the image is firstly transformed by DCT, and then the differential DCT coefficient of four directions, such as horizontal direction, vertical direction, diagonal direction and the second diagonal direction are computed.After that, the coefficient-pair histogram for each differential DCT coefficient is calculated.Finally, support vector machine (SVM) is used to classify the authentic and spliced image through training the feature vectors of authentic and that of tampered image.The experimental results show that the proposed approach not only has low computing complexity, but also outperforms all the state-of-the-art methods in detection rate on the same test database.
杨富圣, 高铁杠. 一种基于差分DCT系数对直方图的图像取证方法[J]. 电子学报, 2016, 44(1): 8-13.
YANG Fu-sheng, GAO Tie-gang. An Image Forensic Algorithm Based on Differential Coefficient-Pair Histogram in DCT Domain. Chinese Journal of Electronics, 2016, 44(1): 8-13.
[1] Popescu A C, Farid H.Exposing Digital Forgeries by Detecting Duplicated Image Regions[R].Hanover:Dartmouth College Department of Computer Science Technical, 2004, TR2004-515.
[2] Amerini I, Ballan L, Caldelli R, et al.A sift-based forensic method for copy-move attack detection and transformation recovery[J].IEEE Transactions on Information Forensics and Security, 2011, 6(3):1099-1110.
[3] Pan X, Lyu S.Region duplication detection using image feature matching[J].IEEE Transactions on Information Forensics and Security, 2010, 5(4):857-867.
[4] Wu Q, Wang S, Zhang X.Log-polar based scheme for revealing duplicated regions in digital images[J].IEEE Signal Processing Letters, 2011, 18(10):559-562.
[5] Avidan S, Shamir A.Seam carving for content-aware image resizing[J].ACM Transactions on Graphics, 2007, 26(3):10.
[6] 王波, 孙璐璐, 孔祥维, 等.图像伪造中模糊操作的异常色调率取证技术[J].电子学报, 2006, 34(12A):2451-2454. Wang Bo, Sun Lu-lu, Kong Xiang-wei, et al.Image forensics technology using abnormity of local hue for blur detection[J].Acta Electronica Sinica, 2006, 34(12A):2451-2454.(in Chinese)
[7] 周琳娜, 王东明, 郭云彪, 等.基于数字图像边缘特性的形态学滤波取证技术[J].电子学报, 2008, 36(6):1047-1051. Zhou Lin-na, Wang Dong-ming, Guo Yun-biao, et al.Exposing digital forgeries by detecting image blurred mathematical morphology edge[J].Acta Electronica Sinica, 2008, 36(6):1047-1051.(in Chinese)
[8] Cao G, Zhao Y, Ni R, et al.Contrast enhancement-based forensics in digital images[J].IEEE Transactions on Information Forensics and Security, 2014, 9(3):515-525.
[9] Luo W, Huang J, Qiu G.JPEG error analysis and its applications to digital image forensics[J].IEEE Transactions on Information Forensics and Security, 2010, 5(3):480-491.
[10] Farid H.Detecting Digital Forgeries Using Bispectral Analysis[R]. Cambridge:Massachusetts Institute of technology, 1999, AIM-1657.
[11] Ng T T, Chang S F, Sun Q.A Data Set of Authentic and Spliced Image Blocks[R].Columbia:Columbia University, ADVENT Technical, 2004.203.
[12] Ng T T, Chang S F.Blinddetection of digital photomontage using higher order statistics[DB/OL].http://www.ee.columbia.edu/dvmm/, 2004-01.
[13] Fu D, Shi Y Q, Su W.Detection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition[A].Proceedings of the 5th International Workshop on Digital Watermarking[C].Berlin:Springer, 2006.177-187.
[14] Chen W, Shi Y Q, Su W.Imagesplicing detection using 2-D phase congruency and statistical moments of characteristic function[A].Proceedings of SPIE Electronic Imaging[C].California:SPIE, 2007.65050R-1.
[15] Shi Y Q, Chen C, Chen W.A natural image model approach to splicing detection[A].Proceedings of the 9th Workshop on Multimedia & Security[C].New York:ACM, 2007.51-62.
[16] Sutthiwan P, Shi Y Q, Dong J, et al.New developments in color image tampering detection[A].Proceedings of IEEE International Symposium on Circuits and Systems[C].New York:IEEE, 2010.3064-3067.
[17] He Z, Lu W, Sun W, et al.Digital image splicing detection based on Markov features in DCT and DWT domain[J].Pattern Recognition, 2012, 45(12):4292-4299.
[18] Saleh S Q, Hussain M, Muhammad G, et al.Evaluation ofimage forgery detection using multi-scale weber local descriptors[A].Proceedings of Advances in Visual Computing[C].Berlin:Springer, 2013.416-424.
[19] Shi Y Q, Chen C, Chen W.A markov process based approach to effective attacking JPEG steganography[A].Proceedings of the 8th Information Hiding Workshop[C].Berlin:Springer, 2006.249-264.
[20] Qian-Lan D.The blind detection of information hiding in color image[A].Proceedings of the 2nd International Conference on Computer Engineering and Technology[C].New York:IEEE, 2010.V7-346-V7-348.
[21] Shabanifard M, Shayesteh M G, Akhaee M A.Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram[J].IET Image Processing, 2013, 7(9):817-828.
[22] Jing Dong.CASIA tampered image detection evaluation database[DB/OL].http://forensics.idealtest.org, 2011.
[23] Chang C C, Lin C J.LIBSVM:a library for support vector machines[J].ACM Transactions on Intelligent Systems and Technology, 2011, 2(3):1-25.
[24] Qiu X, Li H, Luo W, et al.A universal image forensic strategy based on steganalytic model[A].Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security[C].New York:ACM, 2014.165-170.
[25] ARocha, A Piva, J Huang.Images corpus of the 1st IEEE IFS-TC image forensics challenge[DB/OL].http://ifc.recod.ic.unicamp.br/fc.website/index.py?sec=5, 2013-06.