Skip to main content

Tampering Localization in Digital Image Using First Two Digit Probability Features

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 435))

Abstract

In this paper, we have used the first digit probability distribution to identify inconsistency present in the tampered JPEG image. Our empirical analysis shows that, first two digits probabilities get significantly affected by tampering operations. Thus, prima facie tampering can be efficiently localized using this smaller feature set, effectively reducing localization time. We trained SVM classifier using the first two digit probabilities of single and double compressed images, which can be used to locate tampering present in the double compressed image. Comparison of the proposed algorithm with other state of the art techniques shows very promising results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Archana, V. M., Sanjay, B. D., Narendra., J. M. Prakash., D. P,: Factor Histogram based Forgery Localization in Double Compressed JPEG Images, Procedia Computer Science Journal, vol. 54(2015), pp. 690–696 (2015).

    Google Scholar 

  2. Zhouchen, L., Junfeng, H., Xiaoou, T., Chi-keung, T.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition, vol(42), pp. 2492–2501 (2009).

    Google Scholar 

  3. Tiziano, B., Alessandro, P.: Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps. IEEE Transactions on Information Forensics and Security, vol 7(2), pp. 842–848 (2012).

    Google Scholar 

  4. Rafael, C. G., Richard, E. W.: Digital Image Processing”, Prentice Hall, (2007).

    Google Scholar 

  5. Hanny, F.: Exposing digital forgeries from JPEG ghosts. IEEE Transactions on Information Forensics and Security, 2009, vol. 4(1), pp. 154–160, (2009).

    Google Scholar 

  6. Fan, Z., De Queiroz, R. L.: Identification of bitmap compression history: Jpeg detection and quantizer estimation. IEEE Transaction on Image Processing, vol 14(2), pp. 230–235 (2003).

    Google Scholar 

  7. Weiqi, L., Zhenhua, Q., Jiwu, H., Guoping, Q.: A novel method for detecting cropped and recompressed image block. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’07), Vol. 2, pp. II-217-II-220 (2007).

    Google Scholar 

  8. Dongdong, F., Yun, Q. S., Wei, S.: A generalized Benford’s law for JPEG coefficients and its applications in image forensics. SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, (2007).

    Google Scholar 

  9. Bin, L., Shi, Y. Q., Jiwu, H.: Detecting doubly compressed JPEG images by using mode based first digit features. IEEE International Workshop on Multimedia Signal Processing Cairns, Queensland, Australia, pp. 730–735, (2008).

    Google Scholar 

  10. Xiang, H., Yu, Q. Z., Miao L., Frank, Y. S., Yun, Q. S.: Detection of the tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190, (2012).

    Google Scholar 

  11. Irene, A., Rudy, B., Roberto C., Andrea, D. M.: Splicing Forgeries Localization through the Use of First Digit Features. proceedings of IEEE International Workshop on Information Forensics and Security (WIFS), (2014).

    Google Scholar 

  12. Feng, Z., Zhenhua, Y. U., Shenghong, L.: Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms. In International Conference on Multimedia Technology (ICMT), pp 1–4, (2010).

    Google Scholar 

  13. Benford,F.:The law of anomalous numbers. Proc. American Philosophical Society, vol. 78, pp. 551–572 (1938).

    Google Scholar 

  14. Gerald, S., Michal, S.: UCID - An Uncompressed Colour Image Database. Proc. SPIE 5307, Storage and Retrieval Methods and Applications for Multimedia 472 (2003).

    Google Scholar 

  15. P. Sallee, Matlab JPEG toolbox 1.4, [online], Available: http://dde.binghamton.edu/download/jpeg_toolbox.zip.

  16. Thomas, G., Rainer, B.: The Dresden Image Database for benchmarking digital image forensics. Proceedings of the 2010 ACM Symposium on Applied Computing, ser. SAC ’10. New York, NY, USA: ACM, 2010, pp. 1584–1590 (2010).

    Google Scholar 

  17. http://ufraw.sourceforge.net/Install.html.

  18. CASIA Tampered Image Detection Evaluation Database http://forensics.idealtest.org:8080/index_v2.htm.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Archana V. Mire .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Mire, A.V., Dhok, S.B., Mistry, N.J., Porey, P.D. (2016). Tampering Localization in Digital Image Using First Two Digit Probability Features. In: Satapathy, S., Mandal, J., Udgata, S., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 435. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2757-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2757-1_15

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2756-4

  • Online ISBN: 978-81-322-2757-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics