Tampering Localization in Digital Image Using First Two Digit Probability Features

  • Archana V. Mire
  • Sanjay B. Dhok
  • Narendra J. Mistry
  • Prakash D. Porey
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 435)


In this paper, we have used the first digit probability distribution to identify inconsistency present in the tampered JPEG image. Our empirical analysis shows that, first two digits probabilities get significantly affected by tampering operations. Thus, prima facie tampering can be efficiently localized using this smaller feature set, effectively reducing localization time. We trained SVM classifier using the first two digit probabilities of single and double compressed images, which can be used to locate tampering present in the double compressed image. Comparison of the proposed algorithm with other state of the art techniques shows very promising results.


Tamper Region Tamper Image Compression Quality Double Compression Digit Probability 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Archana, V. M., Sanjay, B. D., Narendra., J. M. Prakash., D. P,: Factor Histogram based Forgery Localization in Double Compressed JPEG Images, Procedia Computer Science Journal, vol. 54(2015), pp. 690–696 (2015).Google Scholar
  2. 2.
    Zhouchen, L., Junfeng, H., Xiaoou, T., Chi-keung, T.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition, vol(42), pp. 2492–2501 (2009).Google Scholar
  3. 3.
    Tiziano, B., Alessandro, P.: Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps. IEEE Transactions on Information Forensics and Security, vol 7(2), pp. 842–848 (2012).Google Scholar
  4. 4.
    Rafael, C. G., Richard, E. W.: Digital Image Processing”, Prentice Hall, (2007).Google Scholar
  5. 5.
    Hanny, F.: Exposing digital forgeries from JPEG ghosts. IEEE Transactions on Information Forensics and Security, 2009, vol. 4(1), pp. 154–160, (2009).Google Scholar
  6. 6.
    Fan, Z., De Queiroz, R. L.: Identification of bitmap compression history: Jpeg detection and quantizer estimation. IEEE Transaction on Image Processing, vol 14(2), pp. 230–235 (2003).Google Scholar
  7. 7.
    Weiqi, L., Zhenhua, Q., Jiwu, H., Guoping, Q.: A novel method for detecting cropped and recompressed image block. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’07), Vol. 2, pp. II-217-II-220 (2007).Google Scholar
  8. 8.
    Dongdong, F., Yun, Q. S., Wei, S.: A generalized Benford’s law for JPEG coefficients and its applications in image forensics. SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, (2007).Google Scholar
  9. 9.
    Bin, L., Shi, Y. Q., Jiwu, H.: Detecting doubly compressed JPEG images by using mode based first digit features. IEEE International Workshop on Multimedia Signal Processing Cairns, Queensland, Australia, pp. 730–735, (2008).Google Scholar
  10. 10.
    Xiang, H., Yu, Q. Z., Miao L., Frank, Y. S., Yun, Q. S.: Detection of the tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190, (2012).Google Scholar
  11. 11.
    Irene, A., Rudy, B., Roberto C., Andrea, D. M.: Splicing Forgeries Localization through the Use of First Digit Features. proceedings of IEEE International Workshop on Information Forensics and Security (WIFS), (2014).Google Scholar
  12. 12.
    Feng, Z., Zhenhua, Y. U., Shenghong, L.: Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms. In International Conference on Multimedia Technology (ICMT), pp 1–4, (2010).Google Scholar
  13. 13.
    Benford,F.:The law of anomalous numbers. Proc. American Philosophical Society, vol. 78, pp. 551–572 (1938).Google Scholar
  14. 14.
    Gerald, S., Michal, S.: UCID - An Uncompressed Colour Image Database. Proc. SPIE 5307, Storage and Retrieval Methods and Applications for Multimedia 472 (2003).Google Scholar
  15. 15.
    P. Sallee, Matlab JPEG toolbox 1.4, [online], Available: http://dde.binghamton.edu/download/jpeg_toolbox.zip.
  16. 16.
    Thomas, G., Rainer, B.: The Dresden Image Database for benchmarking digital image forensics. Proceedings of the 2010 ACM Symposium on Applied Computing, ser. SAC ’10. New York, NY, USA: ACM, 2010, pp. 1584–1590 (2010).Google Scholar
  17. 17.
  18. 18.
    CASIA Tampered Image Detection Evaluation Database http://forensics.idealtest.org:8080/index_v2.htm.

Copyright information

© Springer India 2016

Authors and Affiliations

  • Archana V. Mire
    • 1
  • Sanjay B. Dhok
    • 2
  • Narendra J. Mistry
    • 1
  • Prakash D. Porey
    • 1
  1. 1.Sardar Vallabhbhai National Institute of TechnologySuratIndia
  2. 2.Visvesvaraya National Institute of TechnologyNagpurIndia

Personalised recommendations