Skip to main content
Log in

A semi-feature learning approach for tampered region localization across multi-format images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In multimedia security, it is an important task to localize the tampered image regions. In this work, deep learning is used to solve this problem and the approach can be applied to multi-format images. Concretely, we use Stack Autoencoder to obtain the tampered image block features so that the forgery can be identified in a semi-automatic manner. Contextual information of image block is further integrated to improve the localization accuracy. The approach is tested on a benchmark dataset, with a 92.84% localization accuracy and a 0.9375 Area Under Curve (AUC) score. Compared to the state-of-the-art solutions for multi-format images, our solution has an over 40% AUC improvement and 5.7 times F1 improvement. The results also out-perform several approaches which are designed specifically for JPEG images by 41.12%∼63.08% in AUC and with a 4∼8 times better F1.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Corel image features data set. https://archive.ics.uci.edu/ml/datasets/corel+image+features/

  2. Bayram S, Sencar HT, Memon N (2008) Classification of digital camera-models based on demosaicing artifacts. Digit Investig 5(1–2):49–59

    Article  Google Scholar 

  3. Bengio Y (2009) Learning deep architectures for ai. Foundations and trendsⓇ, in Machine Learning 2(1):1–127

    Article  MATH  Google Scholar 

  4. Bengio Y, Lamblin P, Popovici D, Larochelle H et al. (2007) Greedy layer-wise training of deep networks. Adv. Neural Inf Proces Syst 19:153

    Google Scholar 

  5. Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans Inf Forensics Secur 7(3):1003–1017

    Article  Google Scholar 

  6. Bianchi T, De Rosa A, Piva A (2011) Improved dct coefficient analysis for forgery localization in jpeg images. In: IEEE international conference on acoustics, speech and signal processing, pp 2444–2447

  7. Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: A survey. Digit Investig 10(3):226–245

    Article  Google Scholar 

  8. Chengjie T u, Tran TD (2002) Context-based entropy coding of block transform coefficients for image compression. IEEE Trans Image Process 11(11):1271–1283

    Article  MathSciNet  Google Scholar 

  9. Chierchia G, Cozzolino D, Poggi G, Sansone C, Verdoliva L (2014) Guided filtering for prnu-based localization of small-size image forgeries. In: IEEE international conference on acoustics, speech and signal processing, pp 6231–6235

  10. Cozzolino D, Gragnaniello D, Verdoliva L (2013) A novel framework for image forgery localization. arXiv:1311.6932

  11. Dong J, Wang W (2011) Casia tampering detection dataset http://forensics.idealtest.org/

  12. Farid H, Lyu S (2003) Higher-order wavelet statistics and their application to digital forensics. In: Computer vision and pattern recognition workshop, vol 8, pp 94–94

  13. Felzenszwalb PF, Huttenlocher DP (2004) Efficient graph-based image segmentation. Int J Comput Vis 59(2):167–181

    Article  Google Scholar 

  14. Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of cfa artifacts. IEEE Trans Inf Forensics Secur 7(5):1566–1577

    Article  Google Scholar 

  15. Gaborini L, Bestagini P, Milani S, Tagliasacchi M, Tubaro S (2014) Multi-clue image tampering localization. In: IEEE international workshop on information forensics and security, pp 125–130

  16. Galvan F, Puglisi G, Bruna AR, Battiato S (2014) First quantization matrix estimation from double compressed jpeg images. IEEE Trans Inf Forensics Secur 9(8):1299–1310

    Article  Google Scholar 

  17. Gupta Dipalee, Choubey Siddhartha (2015) Discrete wavelet transform for image processing. International Journal of Emerging Technology and Advanced Engineering 4(3):598–602

    Google Scholar 

  18. Hinton GE, Salakhutdinov RR (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504–507

    Article  MathSciNet  MATH  Google Scholar 

  19. ImageMagick. https://www.imagemagick.org/script/index.php/

  20. Johnson MK, Farid H (2005) Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th workshop on multimedia and security, ACM, pp 1–10

  21. Kakar P, Sudha N, Ser W (2011) Exposing digital image forgeries by detecting discrepancies in motion blur. IEEE Trans Multimedia 13(3):443–452

    Article  Google Scholar 

  22. Ke Y, Zhang Q, Min W, Zhang S (2014) Detecting image forgery based on noise estimation. International Journal of Multimedia and Ubiquitous Engineering 9(1):325–336

    Article  Google Scholar 

  23. Kociołek M, Materka A, Strzelecki M, Szczypiński P (2001) Discrete wavelet transform-derived features for digital image texture analysis. In: International conference on signals and electronic systems, Łódź-Poland, pp 99–104

  24. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097–1105

  25. Lin Z, He J, Tang X, Tang C-K (2009) Fast, automatic and fine-grained tampered jpeg image detection via dct coefficient analysis. Pattern Recogn 42(11):2492–2501

    Article  MATH  Google Scholar 

  26. Lukáš J, Fridrich J (2003) Estimation of primary quantization matrix in double compressed jpeg images. In: Digital forensic research workshop, pp 5–8

  27. Lukáš J, Fridrich J, Goljan M (2006) Detecting digital image forgeries using sensor pattern noise. In: Electronic imaging, pp 60720Y–60720Y

  28. Mobahi H, Rao SR, Yang AY, Sastry SS, Ma Y (2011) Segmentation of natural images by texture and boundary compression. Int J Comput Vis 95(1):86–98

    Article  Google Scholar 

  29. Mori G (2005) Guiding model search using segmentation. In: IEEE international conference on computer vision, IEEE, vol 2, pp 1417–1423

  30. Ngiam J, Coates A, Lahiri A, Prochnow B, Le Quoc V, Ng AY (2011) On optimization methods for deep learning. In: Proceedings of the 28th international conference on machine learning (ICML-11), pp 265–272

  31. Piva A (2013) An overview on image forensics. ISRN Signal Processing 2013

  32. Redi JA, Taktak W, Dugelay J-L (2011) Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1):133–162

    Article  Google Scholar 

  33. Saravanan N, Ramachandran KI (2010) Incipient gear box fault diagnosis using discrete wavelet transform (dwt) for feature extraction and classification using artificial neural network (ann). Expert Systems with Applications 37(6):4168–4181

    Article  Google Scholar 

  34. Satiyan M, Hariharan M, Nagarajan R (2010) Comparison of performance using daubechies wavelet family for facial expression recognition. In: 2010 6th international colloquium on signal processing its applications, pp 1–5

  35. Shi J, Malik J (2000) Normalized cuts and image segmentation. IEEE Trans Pattern Anal Mach Intell 22(8):888–905

    Article  Google Scholar 

  36. Simoncelli EP (1999) Modeling the joint statistics of images in the wavelet domain. In: SPIE’s international symposium on optical science, engineering, and instrumentation, pp 188–195. International Society for Optics and Photonics

  37. Taigman Y, Yang M, Marc’Aurelio R, Wolf L (2014) Deepface: Closing the gap to human-level performance in face verification. In: IEEE conference on computer vision and pattern recognition, pp 1701–1708

  38. Thing VLL, Chen Y, Cheh C (2012) An improved double compression detection method for jpeg image forensics. In: IEEE international symposium on multimedia, pp 290–297

  39. Tralic D, Grgic S, Sun X, Rosin PL (2016) Combining cellular automata and local binary patterns for copy-move forgery detection. Multimedia Tools and Applications 75(24):16881–16903

    Article  MATH  Google Scholar 

  40. Verdoliva L, Cozzolino D, Poggi G (2014) A feature-based approach for image tampering detection and localization. In: IEEE international workshop on information forensics and security, pp 149–154

  41. Yang Q, Peng F, Li J-T, Long M (2016) Image tamper detection based on noise estimation and lacunarity texture. Multimedia Tools and Applications 75 (17):10201–10211

    Article  Google Scholar 

  42. Ye S, Sun Q, Chang EC (2007) Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: International conference on multimedia and expo, pp 12–15

  43. Ye Z, Shen X, Chen H (2016) Copy-move forgery detection based on scaled orb. Multimedia Tools and Applications 75(6):3221–3233

    Article  Google Scholar 

  44. Yu L, Qi H, Niu X (2016) Feature point-based copy-move forgery detection: covering the non-textured areas. Multimedia Tools and Applications 75(2):1159–1176

    Article  Google Scholar 

  45. Zhang Y, Goh J, Win LL, Thing V (2016) Image region forgery detection: A deep learning approach. In: Proceedings of the Singapore cyber-security conference: cyber-security by design, vol 14, p 1

Download references

Acknowledgments

This material is based on research work supported by the Singapore National Research Foundation under NCR Award No. NRF2014NCR-NCR001-034.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ying Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Thing, V.L.L. A semi-feature learning approach for tampered region localization across multi-format images. Multimed Tools Appl 77, 25027–25052 (2018). https://doi.org/10.1007/s11042-018-5756-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5756-4

Keywords

Navigation