Advertisement

A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images

  • Jingyu YeEmail author
  • Yuxi Shi
  • Guanshuo Xu
  • Yun-Qing Shi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11378)

Abstract

Revealing the processing history that a given digital image has gone through is an important topic in digital image forensics. Detection of seam carving, a content-aware image scaling algorithm commonly implemented in commercial image-editing software, has been studied by forensic experts in recent years. In this paper, a convolutional neural network (CNN) architecture is proposed for seam carving detection. Unlike the existing forensic works in detecting seam carving, where the feature selection and the pattern classification are two separated procedures, the proposed CNN-based deep learning architecture learns and then uses more effective features via joint optimization of feature extraction and pattern classification. Experimental results conducted on a large dataset have demonstrated that, compared with the current state-of-the-art, the proposed CNN based deep learning scheme can largely boost the classification rates as the seam carving rate is rather low.

Keywords

Seam carving detection Digital image forensics Content-aware image scaling Convolutional neural network Deep learning 

References

  1. 1.
    Piva, A.: An overview on image forensics. ISRN Sig. Process. 2013 (2013). Article ID 496701Google Scholar
  2. 2.
    Avidan, S., Shamir, A.: Seam carving for content-aware image resizing. ACM Trans. Graphics, 26(3) (2007)CrossRefGoogle Scholar
  3. 3.
    Sarkar, A., Nataraj, L., Manjunath, B.S.: Detection of seam carving and localization of seam insertions in digital images. In: Proceedings of 11th ACM Workshop on Multimedia and Security, MM&Sec 2009, New York, NY, USA, pp. 107–116 (2009)Google Scholar
  4. 4.
    Fillion, C., Sharma, G.: Detecting content adaptive scaling of images for forensic applications. In: Media Forensics and Security, SPIE Proceedings, p. 75410. SPIE (2010)Google Scholar
  5. 5.
    Lu, W., Wu, M.: Seam carving estimation using forensic hash. In: Proceedings of 13th ACM multimedia workshop on Multimedia and Security, MM&Sec 2011, New York, NY, USA, pp. 9–14 (2011)Google Scholar
  6. 6.
    Chang, W., Shih, T.K., Hsu, H.: Detection of seam carving in JPEG images. In: Proceedings of iCAST-UMEDIA (2013)Google Scholar
  7. 7.
    Wattanachote, K., Shih, T.K., Chang, W., Chang, H.: Tamper detection of JPEG image due to seam modification. IEEE Trans. Inf. Forensics Secur. 10(12), 2477–2491 (2015)CrossRefGoogle Scholar
  8. 8.
    Liu, Q., Chen, Z.: Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images. ACM Trans. Intell. Syst. Technol. 5(4) (2014)Google Scholar
  9. 9.
    Liu, Q.: Exposing seam carving forgery under recompression attacks by hybrid large feature mining. In: 23rd International Conference on Pattern Recognition (ICPR), pp. 1036–1041 (2016)Google Scholar
  10. 10.
    Liu, Q.: An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics. Patt. Recogn. 65, 35–46 (2016)CrossRefGoogle Scholar
  11. 11.
    Ryu, S., Lee, H., Lee, H.: Detecting trace of seam carving for forensic analysis. IEICE Trans. Inf. Syst. E97-D(5), 1304–1311 (2014)CrossRefGoogle Scholar
  12. 12.
    Wei, J., Lin, Y., Wu, Y.: A patch analysis method to detect seam carved images. Patt. Recogn. Lett. 36, 100–106 (2014)CrossRefGoogle Scholar
  13. 13.
    Yin, T., Yang, G., Li, L., Zhang, D., Sun, X.: Detecting seam carving based image resizing using local binary patterns. Comput. Secur. 55, 130–141 (2015)CrossRefGoogle Scholar
  14. 14.
    Ye, J., Shi, Y.Q.: A local derivative pattern based image forensic framework for seam carving detection. In: Proceedings of 15th International Workshop on Digital Watermarking, pp. 172–184 (2016)CrossRefGoogle Scholar
  15. 15.
    Ye, J., Shi, Y.Q.: An effective method to detect seam carving. J. Inf. Secur. Appl. 35, 13–22 (2017)Google Scholar
  16. 16.
    Ye, J., Shi, Y.Q.: A hybrid feature model for seam carving detection. In: Proceedings of 16th International Workshop on Digital Watermarking, pp. 77–89 (2017)CrossRefGoogle Scholar
  17. 17.
    Zhang, D., Yin, T., Yang, G., Xia, M., Li, L., Sun, X.: Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies. J. Vis. Commun. Image Represent. 48, 281–291 (2017)CrossRefGoogle Scholar
  18. 18.
    Krizhevsky, A., Sutskever, I., Hinton, G.: ImageNet classification with deep convolutional neural networks. In: Proceedings of Advances in Neural Information Processing Systems, pp. 1106–1114 (2012)Google Scholar
  19. 19.
    Szegedy, C., et al.: Going deeper with convolutions. In: Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 1–9 (2015)Google Scholar
  20. 20.
    Russakovsky, O.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115, 211–252 (2015)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Xu, G., Wu, H., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708–712 (2016)CrossRefGoogle Scholar
  22. 22.
    Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. (2012)Google Scholar
  23. 23.
    Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift (2015)Google Scholar
  24. 24.
    Glorot, X., Bordes, A., Bengio, Y.: Deep sparse rectifier neural networks (2011)Google Scholar
  25. 25.
    Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-24178-9_5CrossRefGoogle Scholar
  26. 26.
    Jia, Y.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of ACM International Conference on Multimedia, pp. 675–678 (2014)Google Scholar
  27. 27.
    Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 1–27 (2011)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Jingyu Ye
    • 1
    Email author
  • Yuxi Shi
    • 1
  • Guanshuo Xu
    • 1
  • Yun-Qing Shi
    • 1
  1. 1.Department of Electrical and Computer EngineeringNew Jersey Institute of TechnologyNewarkUSA

Personalised recommendations