Multimedia Tools and Applications

, Volume 76, Issue 14, pp 15817–15838 | Cite as

Detecting digital image forgery in near-infrared image of CCTV

  • Jin-Seok Park
  • Dai-Kyung Hyun
  • Jong-Uk Hou
  • Do-Guk Kim
  • Heung-Kyu Lee


The reliability of CCTV digital images is more important than the reliability of many other types of images. However, image editing tools such as Photoshop make this unreliable. CCTV uses two photography modes, the RGB mode and the near-infrared mode. While near-infrared images have different properties, such as a constant level of source light intensity, and a constant direction of the source light, there are no forensic techniques for near-infrared images. In this paper, we propose a forensic technique based on a constant direction of the source light. In order to expose splicing forgery in near-infrared images, we create an ideal near-infrared image model of a plane. We then calculate gradient vectors of the model and objects in images. Depending on the similarity of two vectors, the image is determined forged or not. This forensic technique helps to improve the reliability of near-infrared images.


Image forensics Near-infrared image CCTV Image splicing Forged near-infrared image 


  1. 1.
    Choi CH, Lee HY, Lee HK (2013) Estimation of color modification in digital images by cfa pattern change. Forensic Sci Int 226(1):94–105CrossRefGoogle Scholar
  2. 2.
    Dorsey, J., Rushmeier, H., Sillion, F.X. (2007): Digital modeling of material appearance. The Morgan Kaufmann series in computer graphics. Morgan KaufmannGoogle Scholar
  3. 3.
    Fridrich, A.J., Soukal, B.D., Lukas, A.J. (2003) Detection of copy-move forgery in digital images. In: in Proceedings of Digital Forensic Research Workshop. CiteseerGoogle Scholar
  4. 4.
    Gill, M., Spriggs, A., Britain, G. (2005) Assessing the impact of CCTV. Home office research, development and statistics directorate LondonGoogle Scholar
  5. 5.
    He J, Lin Z, Wang L, Tang X (2006) Detecting doctored jpeg images via dct coefficient analysis. Computer Vision–ECCV:423–435 Springer (2006)Google Scholar
  6. 6.
    Hyun DK, Ryu SJ, Lee HY, Lee HK (2013) Detection of upscale-crop and partial manipulation in surveillance video based on sensor pattern noise. Sensors 13(9):12,605–12,631CrossRefGoogle Scholar
  7. 7.
    Johnson, M.K., Farid, H. (2005) Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th workshop on Multimedia and security, pp. 1–10. ACMGoogle Scholar
  8. 8.
    Johnson MK, Farid H (2007a) Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensics Secur 2(3):450–461CrossRefGoogle Scholar
  9. 9.
    Johnson, M.K., Farid, H. (2007b) Exposing digital forgeries through specular highlights on the eye. In: Information Hiding, pp. 311–325. SpringerGoogle Scholar
  10. 10.
    Kee, E., OBrien, J., Farid, H. (2014) Exposing photo manipulation from shading and shadows. ACM Trans. Graph. (in press 2014)Google Scholar
  11. 11.
    Kirchner, M., Gloe, T. (2009) On resampling detection in re-compressed images. In: information forensics and security, 2009. WIFS 2009. First IEEE international workshop on, pp. 21–25. IEEEGoogle Scholar
  12. 12.
    Li, B., Shi, Y.Q., Huang, J. (2008) Detecting doubly compressed jpeg images by using mode based first digit features. In: Multimedia Signal Processing, 2008 I.E. 10th Workshop on, pp. 730–735. IEEEGoogle Scholar
  13. 13.
    Lukas, J., Fridrich, J., Goljan, M. (2006) Detecting digital image forgeries using sensor pattern noise. In: electronic imaging 2006, pp. 60,720Y–60,720Y. International Society for Optics and PhotonicsGoogle Scholar
  14. 14.
    Piva, A. (2013) An overview on image forensics. ISRN Signal Process 2013Google Scholar
  15. 15.
    Shi, Y.Q., Chen, C., Chen, W. (2007) A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on Multimedia & security, pp. 51–62. ACMGoogle Scholar
  16. 16.
    Stamm MC, Liu K (2010) Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans Inf Forensics Secur 5(3):492–506CrossRefGoogle Scholar
  17. 17.
    Stamm MC, Wu M, Liu K (2013) Information forensics: an overview of the first decade. Access, IEEE 1:167–200CrossRefGoogle Scholar
  18. 18.
    Taylor, A.E., et al. (2000) Illumination fundamentals. Lighting research center, Rensselaer Polytechnic InstituteGoogle Scholar
  19. 19.
    Yerushalmy I, Hel-Or H (2011) Digital image forgery detection based on lens and sensor aberration. Int J ComputVision 92(1):71–91MATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Jin-Seok Park
    • 1
  • Dai-Kyung Hyun
    • 2
  • Jong-Uk Hou
    • 1
  • Do-Guk Kim
    • 1
  • Heung-Kyu Lee
    • 1
  1. 1.School of ComputingKorea Advanced Institute of Science and Technology 291 Daehak-ro Yuseong-guDaejeonRepublic of Korea
  2. 2.Agency for Defense DevelopmentDaejeonRepublic of Korea

Personalised recommendations