Abstract
In this work, we deal with the problem of re–compression based image forgery detection, where some regions of an image are modified illegitimately, hence giving rise to presence of dual compression characteristics within a single image. There have been some significant researches in this direction, in the last decade. However, almost all existing techniques fail to detect this form of forgery, when the first compression factor is greater than the second. We address this problem in re–compression based forgery detection, here Recently, Machine Learning techniques have started gaining a lot of importance in the domain of digital image forensics. In this work, we propose a Convolution Neural Network based deep learning architecture, which is capable of detecting the presence of re–compression based forgery in JPEG images. The proposed architecture works equally efficiently, even in cases where the first compression ratio is greater than the second. In this work, we also aim to localize the regions of image manipulation based on re–compression features, using the trained neural network. Our experimental results prove that the proposed method outperforms the state–of–the–art, with respect to forgery detection and localization accuracy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Conotter, V.: Active and passive multimedia forensics. Ph.D. thesis, University of Trento (2011)
Pennebaker, W.B., Mitchell, J.L.: JPEG: Still Image Data Compression Standard. Springer, Berlin (1992)
Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10(3), 226–245 (2013)
Wang, W., Dong, J., Tan, T.: Exploring DCT coefficient quantization effects for local tampering detection. IEEE Trans. Inf. Forensics Secur. 9(10), 1653–1666 (2014)
Cozzolino, D., Poggi, G., Verdoliva, L.: Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 159–164. ACM (2017)
Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6, December 2016. https://doi.org/10.1109/WIFS.2016.7823911
Bianchi, T., De Rosa, A., Piva, A.: Improved DCT coefficient analysis for forgery localization in JPEG images. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2444–2447. IEEE (2011)
Lin, Z., Wang, R., Tang, X., Shum, H.Y.: Detecting doctored images using camera response normality and consistency. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 1087–1092. IEEE (2005)
Popescu, A., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technology report TR2004-515, Department Computer Science, Dartmouth College (2004)
Lukáš, J., Fridrich, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. In: Electronic Imaging 2006, p. 60720Y. International Society for Optics and Photonics (2006)
Fu, D., Shi, Y.Q., Su, W.: A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 65051L. International Society for Optics and Photonics (2007)
Li, W., Yuan, Y., Yu, N.: Detecting copy-paste forgery of JPEG image via block artifact grid extraction. In: International Workshop on Local and Non-Local Approximation in Image Processing, pp. 1–6 (2008)
Mahdian, B., Saic, S.: Detecting double compressed JPEG images. In: 3rd International Conference on Crime Detection and Prevention (ICDP 2009), pp. 1–6. IET (2009)
Malviya, P., Naskar, R.: Digital forensic technique for double compression based JPEG image forgery detection. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 437–447. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-13841-1_25
Fridrich, A.J., Soukal, B.D., Lukáš, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop. Citeseer (2003)
Gopi, E., Lakshmanan, N., Gokul, T., KumaraGanesh, S., et al.: Digital image forgery detection using artificial neural network and auto regressive coefficients. In: Canadian Conference on Electrical and Computer Engineering, (CCECE 2006), pp. 194–197. IEEE (2006)
Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 5–10. ACM (2016)
Barni, M., et al.: Aligned and non-aligned double JPEG detection using convolutional neural networks. J. Vis. Commun. Image Represent. 49, 153–163 (2017)
Schaefer, G., Stich, M.: UCID: an uncompressed color image database. In: Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472–481. International Society for Optics and Photonics (2003)
Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097–1105 (2012)
Acknowledgement
This work is partially funded by Board of Research in Nuclear Sciences (BRNS), Department of Atomic Energy (DAE), Govt. of India, Grant No. 34/20/22/2016-BRNS/34363, dated: 16/11/2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Bakas, J., Rawat, P., Kokkalla, K., Naskar, R. (2018). Re–compression Based JPEG Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor Dependency. In: Ganapathy, V., Jaeger, T., Shyamasundar, R. (eds) Information Systems Security. ICISS 2018. Lecture Notes in Computer Science(), vol 11281. Springer, Cham. https://doi.org/10.1007/978-3-030-05171-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-05171-6_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05170-9
Online ISBN: 978-3-030-05171-6
eBook Packages: Computer ScienceComputer Science (R0)