Abstract
In this paper, we propose a novel feature processing approach based on fusion of noise and quantization residue features for detecting tampering or forgery in video sequences. The evaluation of proposed residue features – the noise residue features and the quantization features, their transformation in optimal feature subspace based on fisher linear discriminant features and canonical correlation analysis features, and their subsequent fusion for emulated copy-move tamper scenarios shows a significant improvement in tamper detection accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bayram, S., Sencar, H.T., Memon, N.: An Efficient and Robust Method For Detecting Copy-Move Forgery. In: Proceedings IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2009, Taipei Taiwan (June 2009)
Dirik, A.E., Memon, N.: Image Tamper Detection Based on Demosaicing Artifacts. In: Proceedings IEEE ICIP 2009, Cairo Egypt (November 2009)
Popescu, A.C., Farid, H.: Exposing Digital Forgeries by Detecting Traces of Re-sampling. IEEE Transactions on signal processing 53(2) (February 2005)
Fridrich, J., David, S., Jan, L.: Detection of Copy-Move Forgery in Digital Images, http://www.ws.binghamton.edu/fridrich/Research/copymove.pdf
Hsu, Y.F., Chang, S.F.: Detecting Image Splicing Using Geometry Invariants and Camera Characteristics Consistency. In: ICME, Toronto, Canada (July 2006)
Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proc. ACM Multimedia Security Workshop, Dallas, Texas, pp. 51–62 (September 2007)
Gou, H., Swaminathan, A., Wu, M.: Noise Features for Image Tampering Detection and Steganalysis. In: Proc. of IEEE Int. Conf. On Image Processing (ICIP 2007), San Antonio, TX (September 2007)
Ng, T.T., Chang, C.S.F., Lin, Y., Sun, Q.: Passive-blind Image Forensics. In: Zeng, W., Yu, H., Lin, C.-Y. (eds.) Multimedia Security Technologies for Digital Rights. Elsevier, Amsterdam (2006)
Criminisi, A., Perez, P., Toyama, K.: Region filling and object removal by exemplar-based image inpainting. IEEE Trans. Image Process. 13(9), 1200–1212 (2004)
Gopi, E.S., Lakshmanan, N., Gokul, T., KumaraGanesh, S., Shah, P.R.: Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients. In: Proceedings Canadian Conference on Electrical and Computer Engineering, Ottawa, Canada, May 7-10, pp. 194–197 (2006)
Hsu, C., Hung, T., Lin, C., Hsu, C.: Video Forgery Detection Using Correlation of Noise Residues, http://www.ee.nthu.edu.tw/~cwlin/pub/mmsp08forensics.pdf (retrieved on 11/3/2010)
Martinez, A.M., Kak, A.C.: PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence 23(2), 228–233 (2001), http://www.ece.osu.edu/~aleix/pami01.pdf , doi:10.1109/34.908974 (retrieved on 11/3/2010)
Borga, M., Knutsson, H.: Finding Efficient Nonlinear Visual Operators using Canonical Correlation Analysis. In: Proc. of SSAB 2000, Halmstad, pp. 13–16 (2000)
Laptev, I., Marszałek, M., Schmid, C., Rozenfeld, B.: Learning realistic human actions from movies. In: Proc. CVPR 2008, Anchorage, USA (2008)
Chetty, G., Wagner, M.: Robust face-voice based speaker identity verification using multilevel fusion. Image and Vision Computing 26(8), 1249–1260 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chetty, G., Singh, M., White, M. (2010). Blind Image Tamper Detection Based on Multimodal Fusion. In: Wong, K.W., Mendis, B.S.U., Bouzerdoum, A. (eds) Neural Information Processing. Models and Applications. ICONIP 2010. Lecture Notes in Computer Science, vol 6444. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17534-3_69
Download citation
DOI: https://doi.org/10.1007/978-3-642-17534-3_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17533-6
Online ISBN: 978-3-642-17534-3
eBook Packages: Computer ScienceComputer Science (R0)