|
|
Digital Image Forensics Based on Local Energy Variance Properties |
QIAO Tong, QIAN Zhen-Xing, ZHANG Xin-Peng, WANG Wen-Wen |
School of Communication and Information Engineering,Shanghai University,Shanghai 200072 |
|
|
Abstract How to identify photographic images and computer graphics efficiently is more and more important in image forensics. An authentication algorithm for digital images is proposed using the correlations between photographic images and computer graphics. The calculated local energy dithering in the frequency domain is used to distinguish photographic images and computer-generated images. Moreover, compared with Gallagher’s method, the proposed method is still available when both kinds of images above are attacked by CFA interpolation or zooming operation. The experimental results show that the proposed algorithm identifies better with the capability of anti-forensics resistance.
|
Received: 05 May 2011
|
|
|
|
|
[1] Gloe T,Kirchner M,Winkler A,et al.Can We Trust Digital Image Forensics? // Proc of the 15th International Conference on Multimedia.Augsburg,Germany,2007: 78-86 [2] Kirchner M,Bhme R.Synthesis of Color Filter Array Pattern in Digital Images.Proc of SPIE,2009,7254: 0K-0L [3] Cao G,Zhao Y,Ni R R,et al.Anti-Forensics of Contrast Enhancement in Digital Images // Proc of the 12th ACM Workshop on Multimedia and Security.Rome,Italy,2010: 25-34 [4] Kirchner M,Bhme R.Tamper Hiding: Defeating Image Forensics // Proc of the 9th International Conference on Information Hiding.Berlin,Germany,2007: 326-341 [5] Kirchner M,Bhme R.Hiding Traces of Resampling in Digital Images.IEEE Trans on Information Forensics and Security,2008,3(4): 582-592 [6] Stamm M C,Tjoa S K,Lin W S,et al.Anti-Forensics of JPEG Compression // Proc of the IEEE International Conference of Acoustics,Speech and Signal Processing.Dallas,USA,2010: 1694-1697 [7] Stamm M C,Tjoa S K,Lin W S,et al.Undetectable Image Tampering through JPEG Compression Anti-Forensics // Proc of the IEEE International Conference on Image Processing.Hong Kong,China,2010: 2109-2112 [8] Stamm M C,Liu K J R.Wavelet-Based Image Compression Anti-Forensics // Proc of the IEEE International Conference on Image Processing.Hong Kong,China,2010: 1737-1740 [9] Ng T T,Chang S F,Sun Qibin.Blind Detection of Photomontage Using Higher Order Statistics // Proc of the IEEE International Symposium on Circuits and Systems.Vancouver,Canada,2004,V: 688-691 [10] Ng T T,Chang S F,Hsu J,et al.Physics-Motivated Features for Distinguishing Photographic Images and Computer Graphics // Proc of the 13th Annual ACM International Conference on Multimedia.Singapore,Singapore,2005: 239-248 [11] Bayram S,Sencar H T,Memon N.Source Camera Identification Based on CFA Interpolation // Proc of the IEEE International Conference on Image Processing.Genoa,Italy,2005: 69-72 [12] Gallagher A C.Detection of Linear and Cubic Interpolation in JPEG Compressed Images // Proc of the 2nd Canadian Conference on Computer and Robot Vision.Washington,USA,2005: 65-72 [13] Gallagher A C,Chen T H.Image Authentication by Detecting Traces of Demosaicing // Proc of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition.Alaska,USA,2008: 1-8 [14] Zhang L,Wu X L.Color Demosaicking via Directional Linear Minimum Mean Square-Error Estimation.IEEE Trans on Image Processing,2005,14(12): 2167-2178 |
|
|
|