Skip to main content

New Feature Presentation of Transition Probability Matrix for Image Tampering Detection

  • Conference paper
Book cover Digital Forensics and Watermarking (IWDW 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7128))

Included in the following conference series:

  • 2527 Accesses

Abstract

Extraction of discriminative feature is crucial to machine learning approach of image tampering detection. The state-of-the-art Markov transition probability feature is extended in this paper. We show that correlation between adjacent elements on the difference array of block DCT coefficients can be theoretically calculated and provides little information to the classification problem. We propose to decorrelate the variables and use the marginal distribution as feature in image tampering detection. The framework is applied to 1st and 2nd order Markov transition probability feature. Our experiment result shows the new presentation of the feature has competitive performance and greatly reduced dimensionality.

This research work is funded by the National Science Foundation of China (61071152, 60702043), 973 Program (2010CB731403, 2010CB731406) of China, Shanghai Educational Development Foundation and Project of Beijing Key Laboratory of Communication and Information System of Beijing Jiaotong University.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Farid, H.: A Survey of Image Forgery Detection. IEEE Signal Processing Magazine 26(2), 16–25 (2009)

    Article  Google Scholar 

  2. Ng, T.-T., Chang, S.-F.: A model for image splicing. In: IEEE International Conference on Image Processing (ICIP), Singapore (2004)

    Google Scholar 

  3. Ng, T.-T., Chang, S.-F., Sun, Q.: Blind Detection of Photomontage Using Higher Order Statistics. In: IEEE International Symposium on Circuits and Systems (ISCAS), Vancouver, Canada (2004)

    Google Scholar 

  4. Ng, T.-T., Chang, S.-F.: A Dataset of Authentic and Spliced Image Blocks, ADVENT Technical Report, #203-2004-3, Columbia University (2004)

    Google Scholar 

  5. Shi, Y.Q., Chen, C., Chen, W.: A Natural Image Model Approach to Splicing Detection. In: The 9th Workshop on Multimedia & Security, pp. 51–62. ACM, New York (2007)

    Chapter  Google Scholar 

  6. Shi, Y.Q., Chen, C., Chen, W.: A Markov Process Based Approach to Effective Attacking JPEG Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Sutthiwan, P., et al.: New developments in color image tampering detection. In: IEEE International Symposium on Circuits and Systems (ISCAS), Paris, pp. 3064–3067 (2010)

    Google Scholar 

  8. Lin, J.-Q., Wang, X.-D., Zhong, S.-P.: Reduction of Markov Extended Features in JPEG Image Steganalysis. In: 2nd International Congress on Image and Signal Processing (CISP), pp. 1–5. IEEE, Tianjin (2009)

    Google Scholar 

  9. Unser, M.: Sum and difference histograms for texture classification. IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI-8(1), 118–125 (1986)

    Article  Google Scholar 

  10. Pevny, T., Bas, P., Fridrich, J.: Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transactions on Information Forensics And Security 5(2), 215–224 (2010)

    Article  Google Scholar 

  11. Wang, W., Dong, J., Tan, T.: Effective image splicing detection based on image chroma. In: 16th IEEE International Conference on Image Processing (ICIP), pp. 1257–1260. IEEE, Cairo (2009)

    Chapter  Google Scholar 

  12. Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural Features for Image Classification. IEEE Transactions on Systems, Man, and Cybernetics SMC-3(6), 610–621 (1973)

    Article  Google Scholar 

  13. Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2(3) (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, L., Wang, S., Li, S., Li, J. (2012). New Feature Presentation of Transition Probability Matrix for Image Tampering Detection. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics