Expose noise level inconsistency incorporating the inhomogeneity scoring strategy

  • Heng Yao
  • Fang Cao
  • Zhenjun Tang
  • Jinwei Wang
  • Tong Qiao
Article

Abstract

Estimating variances in noise is of key importance in many image processing applications, such as filtering, enhancement, quality assessment, and detecting forgery. For the existing detection methods that are based on inconsistencies in noise, the conventional approach is to estimate the noise variance of each region first and then identify the regions with extremely higher or lower variance as splicing regions. However, due to the impossibility of completely separating image noise and inherent texture, inevitably, each estimate is overestimated, especially for regions that have more complex textures. In this paper, we consider the issue that the estimation of the noise of each region frequently is inaccurate due to the complexity of the texture of the region. Based on this consideration and motivated by the scoring strategy-based, object-proposal technique, an approach that incorporates the inhomogeneity scoring strategy is proposed to provide a more convincing result to expose image-splicing manipulations. Specifically, first, the image is segmented into small patches, and the noise variance of each patch is computed by using the kurtosis concentration-based pixel-level noise estimation method. Then, the inhomogeneity score is computed using the spectral residual-based saliency measurement method. After using a linear equation fitting based on the estimated sample of variance and the inhomogeneity score of each patch, the suspicious region can be identified by seeking the conjunct patches that are out of the linear constraint. The experimental results demonstrated the efficacy and robustness of the proposed method.

Keywords

Image forensics Splicing detection Noise inconsistency Inhomogeneity assessment Noise estimation 

Notes

Acknowledgements

We would like to thank Drs. Siwei Lyu and Hui Zeng for kindly sharing the codecs of their work. This work was supported in part by the National Natural Science Foundation of China (61702332, 61672354, 61562007), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (MIMS16-03), the PAPD Fund, and the CICAEET Fund.

References

  1. 1.
    Achanta R, Shaji A, Smith K, Lucchi A, Fua P, Suesstrunk S (2012) SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Trans Pattern Anal Mach Intell 34(11):2274–2281CrossRefGoogle Scholar
  2. 2.
    Alexe B, Deselaers T, Ferrari V (2012) Measuring the objectness of image windows. IEEE Trans Pattern Anal Mach Intell 34(11):2189–2202CrossRefGoogle Scholar
  3. 3.
    Bahrami K, Kot AC, Li L, Li H (2015) Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans. Inf. Forensics Secur 10(5):999–1009CrossRefGoogle Scholar
  4. 4.
    Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Forensics Secur 7(3):1003–1017CrossRefGoogle Scholar
  5. 5.
    Chen B, Coatrieux G, Wu J, Dong Z, Coatrieux LJ, Shu H (2015) Fast computation of sliding discrete Tchebichef moments and its application in duplicated regions detection. IEEE Trans Signal Process 63(20):5424–5436MathSciNetCrossRefGoogle Scholar
  6. 6.
    Chierchia G, Poggi G, Sansone C, Verdoliva L (2014) A Bayesian-MRF approach for PRNU-based image forgery detection. IEEE Trans. Inf. Forensics Secur 9(4):554–567CrossRefGoogle Scholar
  7. 7.
    Ferreira A, Felipussi SC, Alfaro C, Fonseca P, Vargas-Muñoz JE, Dos Santos JA, Rocha A (2016) Behavior knowledge space-based fusion for copy-move forgery detection. IEEE Trans Image Process 25(10):4729–4742MathSciNetCrossRefGoogle Scholar
  8. 8.
    Hou X, Zhang L (2007) Saliency detection: a spectral residual approach. In: Proc. of IEEE Conference on Computer Vision and Pattern Recognition pp 1–8Google Scholar
  9. 9.
    Korus P, Huang J (2017) Multi-scale analysis strategies in PRNU-based tampering localization. IEEE Trans. Inf. Forensics Secur 12(4):809–824CrossRefGoogle Scholar
  10. 10.
    Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur 10(3):507–518CrossRefGoogle Scholar
  11. 11.
    Li B, Ng TT, Li X, Tan S, Huang J (2015) Revealing the trace of high-quality JPEG compression through quantization noise analysis. IEEE Trans. Inf. Forensics Secur 10(3):558–573CrossRefGoogle Scholar
  12. 12.
    Liu C, Szeliski R, Kang SB, Zitnick CL, Freeman WT (2008) Automatic estimation and removal of noise from a single image. IEEE Trans Pattern Anal Mach Intell 30(2):299–314CrossRefGoogle Scholar
  13. 13.
    Lyu S, Pan X, Zhang X (2014) Exposing region splicing forgeries with blind local noise estimation. Int J Comput Vis 110:202–221CrossRefGoogle Scholar
  14. 14.
    Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497–1503CrossRefGoogle Scholar
  15. 15.
    Pan X, Zhang X, Lyu S (2011) Exposing image forgery with blind noise estimation. In the 13th ACM Workshop on Multimedia and Security, pp. 15–20Google Scholar
  16. 16.
    Pasquale F, Tiziano B, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur 7(5):1566–1577CrossRefGoogle Scholar
  17. 17.
    Pyatykh S, Hesser J, Zheng L (2013) Image noise level estimation by principal component analysis. IEEE Trans Image Process 22(2):687–699MathSciNetCrossRefGoogle Scholar
  18. 18.
    Qin C, Chen X, Ye D, Wang J, Sun X (2016) A novel image hashing scheme with perceptual robustness using block truncation coding. Inf Sci 361-362:84–99CrossRefGoogle Scholar
  19. 19.
    Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293CrossRefGoogle Scholar
  20. 20.
    Qureshi MA, Deriche M (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Processing-Image Communication 39:46–74CrossRefGoogle Scholar
  21. 21.
    Rakhshanfar M, Amer AM (2016) Estimation of gaussian, poissonian gaussian, and processed visual noise and its level function. IEEE Trans Image Process 25(9):4172–4185MathSciNetGoogle Scholar
  22. 22.
    Rota P, Sangineto E, Conotter V, Pramerdorfer C (2016) Bad teacher or unruly student: can deep learning say something in image forensics analysis? In Proc. of the 23rd International Conference on Pattern Recognition (ICPR), pp. 2503–2508Google Scholar
  23. 23.
    Stamm MC, Wu M, Liu KJR (2013) Information forensics: an overview of the first decade. IEEE Access 1:167–200CrossRefGoogle Scholar
  24. 24.
    Valsesia D, Coluccia G, Bianchi T, Magli E (2015) Compressed fingerprint matching and camera identification via random projections. IEEE Trans. Inf. Forensics Secur 10(7):1472–1485CrossRefGoogle Scholar
  25. 25.
    Wang J, Li T, Shi Y, Lian S, Ye J (2016) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimedia Tools and Applications (in press, DOI: 10.1007/s11042-016-4153-0)Google Scholar
  26. 26.
    Wei W, Wang S, Zhang X, Tang Z (2010) Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. IEEE Trans. Inf. Forensics Secur 5(3):507–517CrossRefGoogle Scholar
  27. 27.
    Wu CH, Chang HH (2015) Superpixel-based image noise variance estimation with local statistical assessment. EURASIP Journal on Image and Video Processing 2015: 38Google Scholar
  28. 28.
    Yao H, Wang S, Zhang X, Qin C, Wang J (2017) Detecting image splicing based on noise level inconsistency. Multimedia Tools and Applications 76(10):12457–12479CrossRefGoogle Scholar
  29. 29.
    Zeng H, Zhan Y, Kang X, Lin X (2017) Image splicing localization using PCA-based noise level estimation. Multimedia Tools and Applications 76(4):4783–4799CrossRefGoogle Scholar
  30. 30.
    Zoran D, Weiss Y (2009) Scale invariance and noise in natural images. In Proc. of IEEE International Conference on Computer Vision, pp. 2209–2216Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  • Heng Yao
    • 1
    • 2
  • Fang Cao
    • 3
  • Zhenjun Tang
    • 2
  • Jinwei Wang
    • 4
  • Tong Qiao
    • 5
  1. 1.Shanghai Key Lab of Modern Optical System, and Engineering Research Center of Optical Instrument and System, Ministry of EducationUniversity of Shanghai for Science and TechnologyShanghaiChina
  2. 2.Guangxi Key Lab of Multi-source Information Mining & SecurityGuangxi Normal UniversityGuilinChina
  3. 3.College of Information EngineeringShanghai Maritime UniversityShanghaiChina
  4. 4.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
  5. 5.School of CyberspaceHangzhou Dianzi UniversityHangzhouChina

Personalised recommendations