Multimedia Tools and Applications

, Volume 76, Issue 20, pp 20799–20814 | Cite as

Forgery detection using feature-clustering in recompressed JPEG images

Article

Abstract

JPEG images are widely used in a large range of applications. The properties of JPEG compression can be used for detection of forgery in digital images. The forgery in JPEG images requires the image to be resaved thereby, re-compression of image. Therefore, the traces of recompression can be identified in order to detect manipulation. In this paper, a method to detect forgery in JPEG image is presented and an algorithm is designed to classify the image blocks as forged or non-forged based on a particular feature present in multi-compressed JPEG images. The method performs better than the previous methods which use the probability based approach for detecting forgery in JPEG images.

Keywords

Recompression Forgery detection JPEG images 

References

  1. 1.
    Bianchi T, De Rosa A, Piva A (2011) Improved DCT coefficient analysis for forgery localization in JPEG images. Proceedings of ICASSP 2011, pp. 2444–2447Google Scholar
  2. 2.
    Bianchi T, Piva A (2012) Image forgery localization via block grained analysis of JPEG artifacts. IEEE Trans Inf Secur Forensics 7(2):1003–1017CrossRefGoogle Scholar
  3. 3.
    Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig Int J Digit Forensic Incident Response 10(3):226–245Google Scholar
  4. 4.
    DeCarlo LT (1997) On the meaning and use of kurtosis. Psychol Methods 2(3):292–307CrossRefGoogle Scholar
  5. 5.
    Farid H (2009) Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forensics Secur 4(1):154–160MathSciNetCrossRefGoogle Scholar
  6. 6.
    He J, Lin Z, Wang L, Tang X (2006) Detecting doctored JPEG images via DCT coefficient analysis. Proceedings of European Conference on Computer Vision, Graz, Austria, pp. 423–435Google Scholar
  7. 7.
    Johnson MK, Farid H (2005) Exposing digital forgeries by detecting inconsistencies in lighting. Proceedings of the 7th workshop on ACM Multimedia and Security Workshop, New York, pp. 1–10Google Scholar
  8. 8.
    Johnson MK, Farid H (2006) Exposing digital forgeries through chromatic aberration. In Proceedings of the 8th workshop on ACM Multimedia and Security Workshop, Geneva, Switzerland, pp. 48–55Google Scholar
  9. 9.
    Kee E, Johnon MK, Farid H (2011) Digital image authentication from JPEG headers. IEEE Trans Inf Forensics Secur 6(3):1066–1075CrossRefGoogle Scholar
  10. 10.
    Li W, Yuan Y, Yu N (2008) Detecting copy-paste forgery of JPEG image via block artifact grid extraction. Proceedings of International Workshop on Local and Non-local Approximation in Image Processing, pp. 121–126Google Scholar
  11. 11.
    Lin Z, He J, Tang X, Tang CK (2009) Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. J Pattern Recognit 42(11):2492–2501CrossRefMATHGoogle Scholar
  12. 12.
    Mahdian B, Saic S (2009) Detecting double compressed JPEG images. Proceeding of 3rd International conference on image for crime detection and prevention, pp. 12Google Scholar
  13. 13.
    Popescu AC, Farid H (2004) Statistical tools for digital forensics. 6th International Workshop on Information Hiding, Toronto, pp. 128–147Google Scholar
  14. 14.
    Popescu AC, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948–3959MathSciNetCrossRefGoogle Scholar
  15. 15.
    Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of re-sampling. IEEE Trans Signal Process 53(2):758–767CrossRefGoogle Scholar
  16. 16.
    Rocha A, Scheirer W, Boult T, Goldenstein S (2011) Vision of the unseen: current trends and challenges in digital image and video forensics. J ACM Comput Surv 43(4) Article 26:1–42Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Computer Engineering and ApplicationsGLA UniversityMathuraIndia

Personalised recommendations