Abstract
In this paper, we have used the first digit probability distribution to identify inconsistency present in the tampered JPEG image. Our empirical analysis shows that, first two digits probabilities get significantly affected by tampering operations. Thus, prima facie tampering can be efficiently localized using this smaller feature set, effectively reducing localization time. We trained SVM classifier using the first two digit probabilities of single and double compressed images, which can be used to locate tampering present in the double compressed image. Comparison of the proposed algorithm with other state of the art techniques shows very promising results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Archana, V. M., Sanjay, B. D., Narendra., J. M. Prakash., D. P,: Factor Histogram based Forgery Localization in Double Compressed JPEG Images, Procedia Computer Science Journal, vol. 54(2015), pp. 690–696 (2015).
Zhouchen, L., Junfeng, H., Xiaoou, T., Chi-keung, T.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition, vol(42), pp. 2492–2501 (2009).
Tiziano, B., Alessandro, P.: Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps. IEEE Transactions on Information Forensics and Security, vol 7(2), pp. 842–848 (2012).
Rafael, C. G., Richard, E. W.: Digital Image Processing”, Prentice Hall, (2007).
Hanny, F.: Exposing digital forgeries from JPEG ghosts. IEEE Transactions on Information Forensics and Security, 2009, vol. 4(1), pp. 154–160, (2009).
Fan, Z., De Queiroz, R. L.: Identification of bitmap compression history: Jpeg detection and quantizer estimation. IEEE Transaction on Image Processing, vol 14(2), pp. 230–235 (2003).
Weiqi, L., Zhenhua, Q., Jiwu, H., Guoping, Q.: A novel method for detecting cropped and recompressed image block. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’07), Vol. 2, pp. II-217-II-220 (2007).
Dongdong, F., Yun, Q. S., Wei, S.: A generalized Benford’s law for JPEG coefficients and its applications in image forensics. SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, (2007).
Bin, L., Shi, Y. Q., Jiwu, H.: Detecting doubly compressed JPEG images by using mode based first digit features. IEEE International Workshop on Multimedia Signal Processing Cairns, Queensland, Australia, pp. 730–735, (2008).
Xiang, H., Yu, Q. Z., Miao L., Frank, Y. S., Yun, Q. S.: Detection of the tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190, (2012).
Irene, A., Rudy, B., Roberto C., Andrea, D. M.: Splicing Forgeries Localization through the Use of First Digit Features. proceedings of IEEE International Workshop on Information Forensics and Security (WIFS), (2014).
Feng, Z., Zhenhua, Y. U., Shenghong, L.: Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms. In International Conference on Multimedia Technology (ICMT), pp 1–4, (2010).
Benford,F.:The law of anomalous numbers. Proc. American Philosophical Society, vol. 78, pp. 551–572 (1938).
Gerald, S., Michal, S.: UCID - An Uncompressed Colour Image Database. Proc. SPIE 5307, Storage and Retrieval Methods and Applications for Multimedia 472 (2003).
P. Sallee, Matlab JPEG toolbox 1.4, [online], Available: http://dde.binghamton.edu/download/jpeg_toolbox.zip.
Thomas, G., Rainer, B.: The Dresden Image Database for benchmarking digital image forensics. Proceedings of the 2010 ACM Symposium on Applied Computing, ser. SAC ’10. New York, NY, USA: ACM, 2010, pp. 1584–1590 (2010).
CASIA Tampered Image Detection Evaluation Database http://forensics.idealtest.org:8080/index_v2.htm.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Mire, A.V., Dhok, S.B., Mistry, N.J., Porey, P.D. (2016). Tampering Localization in Digital Image Using First Two Digit Probability Features. In: Satapathy, S., Mandal, J., Udgata, S., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 435. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2757-1_15
Download citation
DOI: https://doi.org/10.1007/978-81-322-2757-1_15
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2756-4
Online ISBN: 978-81-322-2757-1
eBook Packages: EngineeringEngineering (R0)