Skip to main content

Blind Image Tamper Detection Based on Multimodal Fusion

  • Conference paper
Neural Information Processing. Models and Applications (ICONIP 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6444))

Included in the following conference series:

  • 2730 Accesses

Abstract

In this paper, we propose a novel feature processing approach based on fusion of noise and quantization residue features for detecting tampering or forgery in video sequences. The evaluation of proposed residue features – the noise residue features and the quantization features, their transformation in optimal feature subspace based on fisher linear discriminant features and canonical correlation analysis features, and their subsequent fusion for emulated copy-move tamper scenarios shows a significant improvement in tamper detection accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bayram, S., Sencar, H.T., Memon, N.: An Efficient and Robust Method For Detecting Copy-Move Forgery. In: Proceedings IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2009, Taipei Taiwan (June 2009)

    Google Scholar 

  2. Dirik, A.E., Memon, N.: Image Tamper Detection Based on Demosaicing Artifacts. In: Proceedings IEEE ICIP 2009, Cairo Egypt (November 2009)

    Google Scholar 

  3. Popescu, A.C., Farid, H.: Exposing Digital Forgeries by Detecting Traces of Re-sampling. IEEE Transactions on signal processing 53(2) (February 2005)

    Google Scholar 

  4. Fridrich, J., David, S., Jan, L.: Detection of Copy-Move Forgery in Digital Images, http://www.ws.binghamton.edu/fridrich/Research/copymove.pdf

  5. Hsu, Y.F., Chang, S.F.: Detecting Image Splicing Using Geometry Invariants and Camera Characteristics Consistency. In: ICME, Toronto, Canada (July 2006)

    Google Scholar 

  6. Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proc. ACM Multimedia Security Workshop, Dallas, Texas, pp. 51–62 (September 2007)

    Google Scholar 

  7. Gou, H., Swaminathan, A., Wu, M.: Noise Features for Image Tampering Detection and Steganalysis. In: Proc. of IEEE Int. Conf. On Image Processing (ICIP 2007), San Antonio, TX (September 2007)

    Google Scholar 

  8. Ng, T.T., Chang, C.S.F., Lin, Y., Sun, Q.: Passive-blind Image Forensics. In: Zeng, W., Yu, H., Lin, C.-Y. (eds.) Multimedia Security Technologies for Digital Rights. Elsevier, Amsterdam (2006)

    Google Scholar 

  9. Criminisi, A., Perez, P., Toyama, K.: Region filling and object removal by exemplar-based image inpainting. IEEE Trans. Image Process. 13(9), 1200–1212 (2004)

    Article  Google Scholar 

  10. Gopi, E.S., Lakshmanan, N., Gokul, T., KumaraGanesh, S., Shah, P.R.: Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients. In: Proceedings Canadian Conference on Electrical and Computer Engineering, Ottawa, Canada, May 7-10, pp. 194–197 (2006)

    Google Scholar 

  11. Hsu, C., Hung, T., Lin, C., Hsu, C.: Video Forgery Detection Using Correlation of Noise Residues, http://www.ee.nthu.edu.tw/~cwlin/pub/mmsp08forensics.pdf (retrieved on 11/3/2010)

  12. Martinez, A.M., Kak, A.C.: PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence 23(2), 228–233 (2001), http://www.ece.osu.edu/~aleix/pami01.pdf , doi:10.1109/34.908974 (retrieved on 11/3/2010)

    Article  Google Scholar 

  13. Borga, M., Knutsson, H.: Finding Efficient Nonlinear Visual Operators using Canonical Correlation Analysis. In: Proc. of SSAB 2000, Halmstad, pp. 13–16 (2000)

    Google Scholar 

  14. Laptev, I., Marszałek, M., Schmid, C., Rozenfeld, B.: Learning realistic human actions from movies. In: Proc. CVPR 2008, Anchorage, USA (2008)

    Google Scholar 

  15. Chetty, G., Wagner, M.: Robust face-voice based speaker identity verification using multilevel fusion. Image and Vision Computing 26(8), 1249–1260 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chetty, G., Singh, M., White, M. (2010). Blind Image Tamper Detection Based on Multimodal Fusion. In: Wong, K.W., Mendis, B.S.U., Bouzerdoum, A. (eds) Neural Information Processing. Models and Applications. ICONIP 2010. Lecture Notes in Computer Science, vol 6444. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17534-3_69

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17534-3_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17533-6

  • Online ISBN: 978-3-642-17534-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics