SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
13
IMAGE QUALITY FEATURE BASED DETECTION
ALGORITHM FOR FORGERY IN IMAGES
Shrishail Math1
and R.C.Tripathi2
Indian Institute of Information Technology, Allahabad, India,211012
1
ssm@iiita.ac.in 2
rctripathi@iiita.ac.in
ABSTRACT
The verifying of authenticity and integrity of images is a serious research issue. There are various types of
techniques to create forged images for various intentions. In this paper, Attempt is made to verify the
authenticity of image using the image quality features like markov and moment based features. They are
found to have their best results in case of forgery involving splicing.
KEYWORDS
Image forgery, image quality, moments, Multiblock cosine transforms
1. INTRODUCTION
Once photographs are known for their authenticity and considered as a evidences. However today
any one with basic knowledge of computer and image editing softwares like photoshop, GIMP etc
maybe able to manipulate photographs easily.
The Advances in image processing and photo realistic softwares, higher capable digital camera,
and other handheld portable image acquisition devices, high speed internet and social networking
and image photo managing and sharing softwares like picasa Microsoft office manager etc
provided easy platform for a image manipulations.
Images are manipulated for various reasons. Fun, entertainment, education, etc, however, recently
image manipulations are used to misrepresent images, altering the meaning of pictures and
contexts with malicious intention.
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
14
Figure 1-1: Original Picture of Joseph Stalin and Nikolai Yezhov
Figure 1-2: Manipulated image Nikolai Yezhov was erased
2. RELATED WORK
The recently researchers made efforts to detect the image forgery detection, the different
methods are proposed for different types of forgeries [1,2,3,4,5]. Images forgery detection based
on active methods such as digital watermarking[5], a digital signature[5] but those requires
embedded of information or a data such a holograms either at image acquisition stage or image
formation step .The detection method methods verifies the integrity of imbedded information,
other method is blind or passive image forgery detection. This method doesn’t require any pre
imbedded information or a data.
The blind methods becoming popular since it don’t require any extra hardware or softwares and
its natural. The forgery detection based on near duplicate concepts are proposed[11],
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
15
inconsistencies of light properties[15] ,noise features[16] and chromatic aberration[13],camera
parameters[18], are reported The image forgery detection methods for, JPEG compression[17]
and image splicing[] are also reported
3 PROPOSED METHOD
Our image forgery detection model based on image qualities and markov process based features
the frame work of model is shown in fig 3-1
3.1Image qualities: In computer vision research there is rich set of literature available on image
qualities. We selected a image quality features based on study of Avcibas. In[19,20] ,Aviabas
present a large set of image quality features, which are sensitive to discriminative to based few
features of forgeries such as compression, watermarking, blurring and distortions. We selected
such a eighteen features which are sensitive to image forgery operations .Those features are Mean
Errors (D1-D4), Correlation (C1-C5), Spectral Errors (S1-S5), HSV Norms (H1-H2)
a.) Mean error features : Mean absolute error D1, mean square error D2, modified
infinity norm D3, L*a*b perceptual error D4
b) Normalized cross-correlation C1, image fidelity C2,,Czenakowski correlation C3, mean angle
similarity C4, mean angle-magnitude similarity C5.
c) Pratt edge measure E1, edge stability measure E2.
d) Spectral phase error S1, spectral phase-magnitude error S2, block spectral magnitude error
S3, block spectral phase error S4, block spectral phase-magnitude error S5.
e). HVS absolute norm H1, HVS L2 norm H2.
3.2Moment based Features: The forgery operation assumed to be disturbs the continuity,
smoothness, regularity pattern, smoothness, consistency and periodicity of pixel correlations
Our moment based feature extraction procedure is shown in fig 3-2.
Pixel Array(2D)
Pixel 2D Array
MBDCT(2D Array)
Markov Features
Moment’s features
Given Image
Fig 3-1: Image forgery detection model
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
16
Figure 3-2: Moment extraction Procedure
Multi- block discrete cosine transforms (MBDCT): the block discrete cosine transforms co-
efficient are able to reflect the disturbances (changes) in the local frequency distributions. We use
multibolck discrete cosine transform to pick up local frequency disturbances effectively.
The 2D block DCT coefficients are represented by
F s,t
` a
=
2
n
ffff
A
X
x = 0
n @1
X
y = 0
n @1
V x
` a
V y
` a
cosπ
2x + 1
2n
fffffffffffffffffff
cosπ
2y = 1
2n
ffffffffffffffffff
f x,y
` a
----1
Where f(x,y),x,y=0,1 denotes a nXn image
3.3 Prediction Error 2D Array: This is used for dimension reduction purpose. It also serves the
additional purpose of enhancing the statistical artifacts introduced by forgeries. The prediction
context is shown in Fig 3-3
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
17
Figure 3-3: Prediction Context
We predict the pixel value x using the neighbouring pixel a,b and c, the prediction 2D array is
represented as
x
ffff
= sign x
` a
A a
L
L
M
M+ b
L
L
M
M+ c
L
L
M
M
R c
------------------------2
The prediction error 2D array can be expressed by
∆x = x @x
ffff
= x @sign x
` a
A a
L
L
M
M+ b
L
L
M
M+ c
L
L
M
M
R S
-------------------------3
Discrete wavelet transforms
The wavelet transforms are suitable to pick up transient and localised changes in spatial and
frequency domain.
Moments and Marginal moments
The 1D Characteristic function (CF) is the DFT of the first order histogram of each wavelet sub
band.
The absolute moments of 1D CF are defined by
M l =
X
il1
k
2
ffff
x. i
H xi
` a
fffffffffffffffffff
X
i = l
k
2
ffff
H xi
` a
L
L
L
M
M
M
ffffffffffffffffffffffffffffffffffffff
---------------------------4
Where H(xi) is the CF component t frequency xi ,
Here K= total number of different values assumed by all of coefficients in the sub-band under
consideration, and L= order of moment, which is a integer value
The 2D characteristic function is the 2D DFT of the second order histogram of the image and
MBDCT coefficient 2D array.
The second order histogram is defined as
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
18
hd j1 , j2 ζ,θ
b c
=
N j1 , j2. ζ,θ
b c
N T ζ,θ
b c
ffffffffffffffffffffffffffffffffffffffffffffff
--------------------------------5
Where
ζ @the distance between two pixel,
θ @Angle of line linking these two pixels with respect to the horizontal axis
N j1 , j2 ζ,θ
b c
@Number of pixel pairs for which the first pixel value is J1 while second is J2
N T ζ,θ
b c
-Total number of pixel pair in the image with separation ( ζ,θ,).
Two Marginal moments of the 2D CF are given by
M u ,j =
X
j = i
k
2
ffff
X
i = 1
k
2
ffff
u. i Hui ,v j
L
L
L
M
M
M
X
j = i
k
2
ffff
X
i = 1
k
2
ffff
Hui ,v j
L
L
L
c
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffQ
----------------------6
M v ,j =
X
j
K
2
ffffff
X
i = 1
k
2
ffff
v. j H ui ,v j
b c
L
L
L
L
M
M
M
M
X
j
K
2
ffffff
X
i = 1
k
2
ffff
| H ui ,v j
b c
|
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
------------------------7
Where H(ui,vj)- 2D CF component at DFT frequency (ui,vj), l- order of moment, integer
4 THE EXPERIMENT AND RESULTS
4.1 Algorithm:
1.) Extract Image Quality Metrics (IQMs).
a. Divide test image into 4 regions.
b. Extract features from every region.
2) Extract moment based features.
a. Apply wavelet transform to this image and obtain all the sub-bands including the test
image itself.
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
19
b. Obtain histogram for each sub-band.
c. Apply DFT to the histogram of each sub-band to obtain its characteristic function.
d. Apply Eqn -- (4) to calculate moments.
e. Apply Eqn-- (3) to obtain prediction-error 2-D array.
f. Repeat a. to d. To obtain prediction-error 2-D array.
g. Obtain 2-D histograms for the test image.
h. Apply 2-D DFT to each 2-D histograms to obtain the 2-D characteristic function.
i. Apply Eqn--(6) and Eqn-- (7) to calculate marginal moments.
3) Apply 2×2, 4×4, 8×8, …n×n BDCT to the given image. Round those BDCT coefficients to
nearest integers, and repeat step 2).
4) Repeat step 1) to 3) to obtain features of all images.
5) Obtain the best parameter of C and g which will be used in training.
6) Train a part of images using SVM and obtain SVM model.
7) Predict the remaining images using SVM model.
4.2 Experiment: We used the image dataset[22] of Columbia image splicing detection and
evaluation data.Other images are collected from internet:933 authentic images and 912
forged(spliced images ) and 55 forged as well as same number of authentic images were
collected from various resources from internet. SVM classifier and matlab code [21] is used for
randomly selected 65%,75% and 85% images from the above databases for training purposes and
renaming are used for testing purposes. The results are shown in table1below.
Table 1: Results
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
20
5. CONCLUSIONS AND DISCUSSIONS
Sensitive quality features [19, 20] and markov process model was utilised to detect
forgery in image data using histogram moments. Experiments were conducted on famous
databases providing and authentic and forged images to find true positive and true
negative results duly these training of data for various ratios like %65,75% and 85%
respectively .Results obtained are superior to so far used techniques.
REFERENCES
[1] Hany farid” Image forgery Detection a survey”,IEEE signal processing magazine ,march 2009, pp 16-
25
[2] H.T.sencar and N.memon ,”Overview of state of the art in digital Image forensics”,WSPC proceedings
sept 2007
[3].. Luo weigi,Qu Zhenhua, et. Al,”A survey of passive technology for digital Image forensics”, Front.
Computer Science china 2007
[4]. N.Krawetz” A picture’s worth… Digital Image Analysis and Forensics”,black hat briefings USA2007.
[5]. .Babak Mahdian and stnislav siac,”Blind methods for detecting Image fakery”,ICCST2008.
[6] Zhen zhang,yuan ren ,et al.,” a survey on passive blind image forgery by doctored method
detection”,seventh ICML&C,kunming ,july2008.
[7] .Tran van lanh kai-sen chong et .al ,” a survey on digital image forensic methods”,ICME2007
[8] .Kusam ,pawanesh abrol,devanand,”Digital tampering detection techniques:A review”,IJIT2009.
[9]. Yu-Feng Hsu and Shih-Fu Chang“Statistical fusion of multiple cues for image tampering
detection”Asilomar Conference on Signals, Systems, and Computers 2008
[10] Tian-Tsong Ng and Shih-Fu Chang and Jessie Hsu and Lexing Xie and Mao-Pei Tsui“Physics-
motivated features for distinguishing photographic images and computer graphics”, MULTIMEDIA
'05: Proceedings of the 13th annual ACM international conference on Multimedia, November 6--11,
2005, Hilton, Singapore
[11]. Alin C. Popescu and Hany farid“Exposing digital forgeries by detecting duplicated image regions”
2004
[12]. Alin C. Popescu and Hany farid“Blind removal of lens distortion” Journal of the Optical Society of
America 2001
[13]. Micah K. Johnson and Hany Farid,” Exposing digital forgeries through chromatic aberration” ACM
Multimedia and Security Workshop 2006
[14] Micah K. Johnson and Hany Farid,”“Detecting photographic composites of people” 6th
InternationalWorkshop on Digital Watermarking, Guangzhou, China
[15]. Micah K. Johnson and Hany Farid“Exposing digital forgeries by detecting inconsistencies in lighting”
ACM Multimedia and Security Workshop 2005
[16]. H. Gou, A. Swaminathan, and M. Wu, “Noise features for image tamperingdetection and
steganalysis” in Proc. IEEE Int. Conf. Image Processing, San Antonio,TX, 2007, vol. 6, pp. 97–100.
[17]. J. He, Z. Lin, L. Wang, and X. Tang, “Detecting doctored JPEG images viaDCT coefficient analysis”,
in Proc. European Conf. Computer Vision, Graz, Austria,2006, pp. 423–435.
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
21
[18]. Z. Lin, R. Wang, X. Tang, and H.-Y. Shum, “Detecting doctored imagesusing camera response
normality and consistency",in IEEE Computer So-ciety Conference on Computer Vision and Pattern
Recognition, vol. 1, June2005, pp. 1087
[19]. Avcibas I,B.Sankur,K. Sayood,”Statistical Evaluation of Image Quality Measure”, Journal of
Electronic Imaging,11,206-223,2002
[20] .Avcibas I,N.menon,B.Sankur,”Steganalysis Using Image Quality Metrics”,IEEE Transactions on
Image processing,12,221-229,2003
[21]. C. C. Chang and C. J. Lin, LIBSVM: A Library for Support Machines,
http://www.csie.ntu.edu.tw/~cjlin/libsvm/index.html.
[22]. Columbia DVMM Research Lab, Columbia Image Splicing DetectionEvaluation Dataset,
http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSpliced DataSet.htm.
Authors
Shrishail Math received his B.E(Electronics&Communication enginerring)
,M.Tech(Computer science &Engineering from University of Mysore and
Manipal university,respectively in year 1996 and 2001.Currently Doctoral
student at Indian Institue of information Technology,Allahabad, his research
interest are information assurance & security, and multimedia forensics.
R.C.Triapthi is a Dean (R&D) Research and Development, head of IPR
division, worked as senior Director Ministry of Communication &Information
Technology (MCIT), Govt .of India, published three books and several
research articles and papers in international and national journals. He worked
as a co-chairman of 1st International conference onIntelligent Interactive
Multimedia (IITM) 2010 sponsored by ACM

More Related Content

What's hot

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
prjpublications
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251
Editor IJARCET
 
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
iosrjce
 

What's hot (19)

Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital images
 
Cc24529533
Cc24529533Cc24529533
Cc24529533
 
Detecting image splicing in the wild Web
Detecting image splicing in the wild WebDetecting image splicing in the wild Web
Detecting image splicing in the wild Web
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251
 
G031201042047
G031201042047G031201042047
G031201042047
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edge
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
 
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session Key
 

Similar to Image Quality Feature Based Detection Algorithm for Forgery in Images

project_final_seminar
project_final_seminarproject_final_seminar
project_final_seminar
MUKUL BICHKAR
 
Iaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensicIaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensic
Iaetsd Iaetsd
 

Similar to Image Quality Feature Based Detection Algorithm for Forgery in Images (20)

Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
 
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...
 
mini prjt
mini prjtmini prjt
mini prjt
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
 
F017374752
F017374752F017374752
F017374752
 
IRJET-Lossless Image compression and decompression using Huffman coding
IRJET-Lossless Image compression and decompression using Huffman codingIRJET-Lossless Image compression and decompression using Huffman coding
IRJET-Lossless Image compression and decompression using Huffman coding
 
project_final_seminar
project_final_seminarproject_final_seminar
project_final_seminar
 
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
Application of Digital Image Correlation: A Review
Application of Digital Image Correlation: A ReviewApplication of Digital Image Correlation: A Review
Application of Digital Image Correlation: A Review
 
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmSecret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 
C010111519
C010111519C010111519
C010111519
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 
Iaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensicIaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensic
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 

Recently uploaded (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

Image Quality Feature Based Detection Algorithm for Forgery in Images

  • 1. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 13 IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES Shrishail Math1 and R.C.Tripathi2 Indian Institute of Information Technology, Allahabad, India,211012 1 ssm@iiita.ac.in 2 rctripathi@iiita.ac.in ABSTRACT The verifying of authenticity and integrity of images is a serious research issue. There are various types of techniques to create forged images for various intentions. In this paper, Attempt is made to verify the authenticity of image using the image quality features like markov and moment based features. They are found to have their best results in case of forgery involving splicing. KEYWORDS Image forgery, image quality, moments, Multiblock cosine transforms 1. INTRODUCTION Once photographs are known for their authenticity and considered as a evidences. However today any one with basic knowledge of computer and image editing softwares like photoshop, GIMP etc maybe able to manipulate photographs easily. The Advances in image processing and photo realistic softwares, higher capable digital camera, and other handheld portable image acquisition devices, high speed internet and social networking and image photo managing and sharing softwares like picasa Microsoft office manager etc provided easy platform for a image manipulations. Images are manipulated for various reasons. Fun, entertainment, education, etc, however, recently image manipulations are used to misrepresent images, altering the meaning of pictures and contexts with malicious intention.
  • 2. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 14 Figure 1-1: Original Picture of Joseph Stalin and Nikolai Yezhov Figure 1-2: Manipulated image Nikolai Yezhov was erased 2. RELATED WORK The recently researchers made efforts to detect the image forgery detection, the different methods are proposed for different types of forgeries [1,2,3,4,5]. Images forgery detection based on active methods such as digital watermarking[5], a digital signature[5] but those requires embedded of information or a data such a holograms either at image acquisition stage or image formation step .The detection method methods verifies the integrity of imbedded information, other method is blind or passive image forgery detection. This method doesn’t require any pre imbedded information or a data. The blind methods becoming popular since it don’t require any extra hardware or softwares and its natural. The forgery detection based on near duplicate concepts are proposed[11],
  • 3. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 15 inconsistencies of light properties[15] ,noise features[16] and chromatic aberration[13],camera parameters[18], are reported The image forgery detection methods for, JPEG compression[17] and image splicing[] are also reported 3 PROPOSED METHOD Our image forgery detection model based on image qualities and markov process based features the frame work of model is shown in fig 3-1 3.1Image qualities: In computer vision research there is rich set of literature available on image qualities. We selected a image quality features based on study of Avcibas. In[19,20] ,Aviabas present a large set of image quality features, which are sensitive to discriminative to based few features of forgeries such as compression, watermarking, blurring and distortions. We selected such a eighteen features which are sensitive to image forgery operations .Those features are Mean Errors (D1-D4), Correlation (C1-C5), Spectral Errors (S1-S5), HSV Norms (H1-H2) a.) Mean error features : Mean absolute error D1, mean square error D2, modified infinity norm D3, L*a*b perceptual error D4 b) Normalized cross-correlation C1, image fidelity C2,,Czenakowski correlation C3, mean angle similarity C4, mean angle-magnitude similarity C5. c) Pratt edge measure E1, edge stability measure E2. d) Spectral phase error S1, spectral phase-magnitude error S2, block spectral magnitude error S3, block spectral phase error S4, block spectral phase-magnitude error S5. e). HVS absolute norm H1, HVS L2 norm H2. 3.2Moment based Features: The forgery operation assumed to be disturbs the continuity, smoothness, regularity pattern, smoothness, consistency and periodicity of pixel correlations Our moment based feature extraction procedure is shown in fig 3-2. Pixel Array(2D) Pixel 2D Array MBDCT(2D Array) Markov Features Moment’s features Given Image Fig 3-1: Image forgery detection model
  • 4. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 16 Figure 3-2: Moment extraction Procedure Multi- block discrete cosine transforms (MBDCT): the block discrete cosine transforms co- efficient are able to reflect the disturbances (changes) in the local frequency distributions. We use multibolck discrete cosine transform to pick up local frequency disturbances effectively. The 2D block DCT coefficients are represented by F s,t ` a = 2 n ffff A X x = 0 n @1 X y = 0 n @1 V x ` a V y ` a cosπ 2x + 1 2n fffffffffffffffffff cosπ 2y = 1 2n ffffffffffffffffff f x,y ` a ----1 Where f(x,y),x,y=0,1 denotes a nXn image 3.3 Prediction Error 2D Array: This is used for dimension reduction purpose. It also serves the additional purpose of enhancing the statistical artifacts introduced by forgeries. The prediction context is shown in Fig 3-3
  • 5. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 17 Figure 3-3: Prediction Context We predict the pixel value x using the neighbouring pixel a,b and c, the prediction 2D array is represented as x ffff = sign x ` a A a L L M M+ b L L M M+ c L L M M R c ------------------------2 The prediction error 2D array can be expressed by ∆x = x @x ffff = x @sign x ` a A a L L M M+ b L L M M+ c L L M M R S -------------------------3 Discrete wavelet transforms The wavelet transforms are suitable to pick up transient and localised changes in spatial and frequency domain. Moments and Marginal moments The 1D Characteristic function (CF) is the DFT of the first order histogram of each wavelet sub band. The absolute moments of 1D CF are defined by M l = X il1 k 2 ffff x. i H xi ` a fffffffffffffffffff X i = l k 2 ffff H xi ` a L L L M M M ffffffffffffffffffffffffffffffffffffff ---------------------------4 Where H(xi) is the CF component t frequency xi , Here K= total number of different values assumed by all of coefficients in the sub-band under consideration, and L= order of moment, which is a integer value The 2D characteristic function is the 2D DFT of the second order histogram of the image and MBDCT coefficient 2D array. The second order histogram is defined as
  • 6. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 18 hd j1 , j2 ζ,θ b c = N j1 , j2. ζ,θ b c N T ζ,θ b c ffffffffffffffffffffffffffffffffffffffffffffff --------------------------------5 Where ζ @the distance between two pixel, θ @Angle of line linking these two pixels with respect to the horizontal axis N j1 , j2 ζ,θ b c @Number of pixel pairs for which the first pixel value is J1 while second is J2 N T ζ,θ b c -Total number of pixel pair in the image with separation ( ζ,θ,). Two Marginal moments of the 2D CF are given by M u ,j = X j = i k 2 ffff X i = 1 k 2 ffff u. i Hui ,v j L L L M M M X j = i k 2 ffff X i = 1 k 2 ffff Hui ,v j L L L c fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffQ ----------------------6 M v ,j = X j K 2 ffffff X i = 1 k 2 ffff v. j H ui ,v j b c L L L L M M M M X j K 2 ffffff X i = 1 k 2 ffff | H ui ,v j b c | fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ------------------------7 Where H(ui,vj)- 2D CF component at DFT frequency (ui,vj), l- order of moment, integer 4 THE EXPERIMENT AND RESULTS 4.1 Algorithm: 1.) Extract Image Quality Metrics (IQMs). a. Divide test image into 4 regions. b. Extract features from every region. 2) Extract moment based features. a. Apply wavelet transform to this image and obtain all the sub-bands including the test image itself.
  • 7. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 19 b. Obtain histogram for each sub-band. c. Apply DFT to the histogram of each sub-band to obtain its characteristic function. d. Apply Eqn -- (4) to calculate moments. e. Apply Eqn-- (3) to obtain prediction-error 2-D array. f. Repeat a. to d. To obtain prediction-error 2-D array. g. Obtain 2-D histograms for the test image. h. Apply 2-D DFT to each 2-D histograms to obtain the 2-D characteristic function. i. Apply Eqn--(6) and Eqn-- (7) to calculate marginal moments. 3) Apply 2×2, 4×4, 8×8, …n×n BDCT to the given image. Round those BDCT coefficients to nearest integers, and repeat step 2). 4) Repeat step 1) to 3) to obtain features of all images. 5) Obtain the best parameter of C and g which will be used in training. 6) Train a part of images using SVM and obtain SVM model. 7) Predict the remaining images using SVM model. 4.2 Experiment: We used the image dataset[22] of Columbia image splicing detection and evaluation data.Other images are collected from internet:933 authentic images and 912 forged(spliced images ) and 55 forged as well as same number of authentic images were collected from various resources from internet. SVM classifier and matlab code [21] is used for randomly selected 65%,75% and 85% images from the above databases for training purposes and renaming are used for testing purposes. The results are shown in table1below. Table 1: Results
  • 8. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 20 5. CONCLUSIONS AND DISCUSSIONS Sensitive quality features [19, 20] and markov process model was utilised to detect forgery in image data using histogram moments. Experiments were conducted on famous databases providing and authentic and forged images to find true positive and true negative results duly these training of data for various ratios like %65,75% and 85% respectively .Results obtained are superior to so far used techniques. REFERENCES [1] Hany farid” Image forgery Detection a survey”,IEEE signal processing magazine ,march 2009, pp 16- 25 [2] H.T.sencar and N.memon ,”Overview of state of the art in digital Image forensics”,WSPC proceedings sept 2007 [3].. Luo weigi,Qu Zhenhua, et. Al,”A survey of passive technology for digital Image forensics”, Front. Computer Science china 2007 [4]. N.Krawetz” A picture’s worth… Digital Image Analysis and Forensics”,black hat briefings USA2007. [5]. .Babak Mahdian and stnislav siac,”Blind methods for detecting Image fakery”,ICCST2008. [6] Zhen zhang,yuan ren ,et al.,” a survey on passive blind image forgery by doctored method detection”,seventh ICML&C,kunming ,july2008. [7] .Tran van lanh kai-sen chong et .al ,” a survey on digital image forensic methods”,ICME2007 [8] .Kusam ,pawanesh abrol,devanand,”Digital tampering detection techniques:A review”,IJIT2009. [9]. Yu-Feng Hsu and Shih-Fu Chang“Statistical fusion of multiple cues for image tampering detection”Asilomar Conference on Signals, Systems, and Computers 2008 [10] Tian-Tsong Ng and Shih-Fu Chang and Jessie Hsu and Lexing Xie and Mao-Pei Tsui“Physics- motivated features for distinguishing photographic images and computer graphics”, MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia, November 6--11, 2005, Hilton, Singapore [11]. Alin C. Popescu and Hany farid“Exposing digital forgeries by detecting duplicated image regions” 2004 [12]. Alin C. Popescu and Hany farid“Blind removal of lens distortion” Journal of the Optical Society of America 2001 [13]. Micah K. Johnson and Hany Farid,” Exposing digital forgeries through chromatic aberration” ACM Multimedia and Security Workshop 2006 [14] Micah K. Johnson and Hany Farid,”“Detecting photographic composites of people” 6th InternationalWorkshop on Digital Watermarking, Guangzhou, China [15]. Micah K. Johnson and Hany Farid“Exposing digital forgeries by detecting inconsistencies in lighting” ACM Multimedia and Security Workshop 2005 [16]. H. Gou, A. Swaminathan, and M. Wu, “Noise features for image tamperingdetection and steganalysis” in Proc. IEEE Int. Conf. Image Processing, San Antonio,TX, 2007, vol. 6, pp. 97–100. [17]. J. He, Z. Lin, L. Wang, and X. Tang, “Detecting doctored JPEG images viaDCT coefficient analysis”, in Proc. European Conf. Computer Vision, Graz, Austria,2006, pp. 423–435.
  • 9. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 21 [18]. Z. Lin, R. Wang, X. Tang, and H.-Y. Shum, “Detecting doctored imagesusing camera response normality and consistency",in IEEE Computer So-ciety Conference on Computer Vision and Pattern Recognition, vol. 1, June2005, pp. 1087 [19]. Avcibas I,B.Sankur,K. Sayood,”Statistical Evaluation of Image Quality Measure”, Journal of Electronic Imaging,11,206-223,2002 [20] .Avcibas I,N.menon,B.Sankur,”Steganalysis Using Image Quality Metrics”,IEEE Transactions on Image processing,12,221-229,2003 [21]. C. C. Chang and C. J. Lin, LIBSVM: A Library for Support Machines, http://www.csie.ntu.edu.tw/~cjlin/libsvm/index.html. [22]. Columbia DVMM Research Lab, Columbia Image Splicing DetectionEvaluation Dataset, http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSpliced DataSet.htm. Authors Shrishail Math received his B.E(Electronics&Communication enginerring) ,M.Tech(Computer science &Engineering from University of Mysore and Manipal university,respectively in year 1996 and 2001.Currently Doctoral student at Indian Institue of information Technology,Allahabad, his research interest are information assurance & security, and multimedia forensics. R.C.Triapthi is a Dean (R&D) Research and Development, head of IPR division, worked as senior Director Ministry of Communication &Information Technology (MCIT), Govt .of India, published three books and several research articles and papers in international and national journals. He worked as a co-chairman of 1st International conference onIntelligent Interactive Multimedia (IITM) 2010 sponsored by ACM