Detection of content-aware image resizing based on Benford’s law
- 216 Downloads
Content-aware image resizing is currently widely used because it maintains the original appearance of important objects to the greatest extent when the aspect ratio of an image changes during resizing. Content-aware image resizing techniques, such as seam carving, are also used for image forgery. A new Benford’s law-based algorithm for detecting content-aware resized images is presented. The algorithm extracts features on the basis of the first digit distribution of the discrete cosine transform coefficients, which follow the standard Benford’s law. We trained these features from both normal images and content-aware resized images using a support vector machine. The experimental results show that the proposed method can efficiently distinguish a content-aware resized image from a normal image, and its precision is better than that of existing methods, including those based on Markov features and others.
KeywordsContent-aware image resizing Image forensics Image forgery Seam carving SVM Benford’s law
This study was funded by National Natural Science Foundation of China (No. 61502218, 61232016, U1405254), Outstanding Young Scientists Foundation Grant of Shandong Province (No. BS2014DX016), Natural Science Foundation of Shandong Province (ZR2014FM005, ZR2013 FL008), Shandong Province Higher Educational Science and Technology Program (J14LN20), Shandong Province Science and Technology Plan Projects (2014 GGB01944, 2015GSF116001), Doctoral Foundation of Lu dong University (LY2014034, LY2013005, LY2015033), the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET), Guangzhou Scholars Project (No. 1201561613).
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
This article does not contain any studies with human participants performed by any of the authors.
- Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with j-linkage. Signal Process Image Commun 28(6):659–669Google Scholar
- Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forens Secur 6(3):1099–1110Google Scholar
- Avidan S, Shamir A (2007) Seam carving for content-aware image resizing. In: ACM transactions on graphics (TOG), vol 26. ACM, New York, pp 10Google Scholar
- Benford F (1938) The law of anomalous numbers. In: Proceedings of the American Philosophical Society, pp 551–572Google Scholar
- Chang CC, Lin CJ (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27Google Scholar
- Chi-Yao W, Hong Zhang Y, Chun Lin L, Wang SJ (2013) Visible watermarking images in high quality of data hiding. J Supercomput 66(2):1033–1048Google Scholar
- Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297Google Scholar
- Fillion C, Sharma G (2010) Detecting content adaptive scaling of images for forensic applications. In: IS&T/SPIE electronic imaging. International Society for Optics and Photonics, San Francisco, pp 75410Z–75410ZGoogle Scholar
- Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, CiteseerGoogle Scholar
- Fu D, Shi YQ, Su W (2006) Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition. In: Digital Watermarking. Springer, Berlin, pp 177–187Google Scholar
- Hill TP (1995) A statistical derivation of the significant-digit law. In: Statistical science, pp 354–363Google Scholar
- Li J, Chen X, Li M, Li J, Lee PC, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. In: IEEE transactions on parallel and distributed systems 25(6):1615–1625Google Scholar
- Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681–1689Google Scholar
- Li J, Kim K, Zhang F, Chen X (2007) Aggregate proxy signature and verifiably encrypted proxy signature. In: Provable security. Springer, Berlin, pp 208–217Google Scholar
- Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE. IEEE, New York, pp 1–5Google Scholar
- Lu W, Wu M (2011) Seam carving estimation using forensic hash. In: Proceedings of the thirteenth ACM multimedia workshop on multimedia and security. ACM, New York, pp 9–14Google Scholar
- Sarkar A, Nataraj L, Manjunath BS (2009) Detection of seam carving and localization of seam insertions in digital images. In: Proceedings of the 11th ACM workshop on multimedia and security. ACM, New York, pp 107–116Google Scholar
- Shi YQ, Chen C, Chen W (2007) A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on multimedia & security. ACM, New York, pp 51–62Google Scholar
- Tian-Tsong N, Shih-Fu C, Sun Q (2004) A data set of authentic and spliced image blocks. Columbia University, ADVENT Technical Report, p 203Google Scholar
- Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2013) Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inf Syst 10(2):667–684Google Scholar
- Yilei W, Wong DS, Zhao C, Xu Q (2015) Fair two-party computation with rational parties holding private types. Security and communication. Networks 8(2):284–297Google Scholar