Abstract
Extraction of discriminative feature is crucial to machine learning approach of image tampering detection. The state-of-the-art Markov transition probability feature is extended in this paper. We show that correlation between adjacent elements on the difference array of block DCT coefficients can be theoretically calculated and provides little information to the classification problem. We propose to decorrelate the variables and use the marginal distribution as feature in image tampering detection. The framework is applied to 1st and 2nd order Markov transition probability feature. Our experiment result shows the new presentation of the feature has competitive performance and greatly reduced dimensionality.
This research work is funded by the National Science Foundation of China (61071152, 60702043), 973 Program (2010CB731403, 2010CB731406) of China, Shanghai Educational Development Foundation and Project of Beijing Key Laboratory of Communication and Information System of Beijing Jiaotong University.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Farid, H.: A Survey of Image Forgery Detection. IEEE Signal Processing Magazine 26(2), 16–25 (2009)
Ng, T.-T., Chang, S.-F.: A model for image splicing. In: IEEE International Conference on Image Processing (ICIP), Singapore (2004)
Ng, T.-T., Chang, S.-F., Sun, Q.: Blind Detection of Photomontage Using Higher Order Statistics. In: IEEE International Symposium on Circuits and Systems (ISCAS), Vancouver, Canada (2004)
Ng, T.-T., Chang, S.-F.: A Dataset of Authentic and Spliced Image Blocks, ADVENT Technical Report, #203-2004-3, Columbia University (2004)
Shi, Y.Q., Chen, C., Chen, W.: A Natural Image Model Approach to Splicing Detection. In: The 9th Workshop on Multimedia & Security, pp. 51–62. ACM, New York (2007)
Shi, Y.Q., Chen, C., Chen, W.: A Markov Process Based Approach to Effective Attacking JPEG Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)
Sutthiwan, P., et al.: New developments in color image tampering detection. In: IEEE International Symposium on Circuits and Systems (ISCAS), Paris, pp. 3064–3067 (2010)
Lin, J.-Q., Wang, X.-D., Zhong, S.-P.: Reduction of Markov Extended Features in JPEG Image Steganalysis. In: 2nd International Congress on Image and Signal Processing (CISP), pp. 1–5. IEEE, Tianjin (2009)
Unser, M.: Sum and difference histograms for texture classification. IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI-8(1), 118–125 (1986)
Pevny, T., Bas, P., Fridrich, J.: Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transactions on Information Forensics And Security 5(2), 215–224 (2010)
Wang, W., Dong, J., Tan, T.: Effective image splicing detection based on image chroma. In: 16th IEEE International Conference on Image Processing (ICIP), pp. 1257–1260. IEEE, Cairo (2009)
Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural Features for Image Classification. IEEE Transactions on Systems, Man, and Cybernetics SMC-3(6), 610–621 (1973)
Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2(3) (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, L., Wang, S., Li, S., Li, J. (2012). New Feature Presentation of Transition Probability Matrix for Image Tampering Detection. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-32205-1_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32204-4
Online ISBN: 978-3-642-32205-1
eBook Packages: Computer ScienceComputer Science (R0)