Skip to main content
Log in

Sequential computational procedure for remote sensing data forgery detection

  • Applied Problems
  • Published:
Pattern Recognition and Image Analysis Aims and scope Submit manuscript

Abstract

This article considers the problem of constructing a sequential computational procedure for detecting artificial changes of remote sensing data (RSD) using a set of elementary algorithms of detecting artificial RSD changes. The stated task has been solved within the framework of the passive approach, which requires determining actual changes (forgeries) in RSD based on computer analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. M. Sridevi, C. Mala, and S. Sanyam, “Comparative study of image forgery and copy-move techniques,” in Proc. 2nd Int. Conf. on Computer Science, Engineering and Applications (ICCSEA 2012) (New Delhi, 2012), pp. 715–723.

    Google Scholar 

  2. I. J. Cox, G. Doerr, and T. Furon, “Watermarking is not cryptography,” in Proc. 5th Int. Workshop on Digital Watermarking (Jeju Island, 2006), pp. 1–15.

    Chapter  Google Scholar 

  3. E. T. Lin and E. J. Delp, “A review of fragile image watermarks,” in Proc. ACM Multimedia and Security Workshop (Orlando, FL, 1999), Vol. 1, pp. 25–29.

    Google Scholar 

  4. B. Mahdian and S. Saic, “A bibliography on blind methods for identifying image forgery,” Signal Processing: Image Commun. 25, 389–399 (2010).

    Google Scholar 

  5. N. I. Glumov and A. V. Kuznetsov, “The way to detect local artificial variations in images,” Avtometriya 47 (3), 3–11 (2011).

    Google Scholar 

  6. A. C. Popescu, “Statistical tools for digital image forensics,” PhD Thesis (Dartmouth College, Dep. Computer Sci., Hanover, 2005).

    Google Scholar 

  7. J. Fridrich and J. Lukas, “Estimation of primary quantization matrix in double compressed JPEG images,” in Proc. Digital Forensic Research Workshop (Cleveland, OH, 2003), pp. 2–5.

    Google Scholar 

  8. S. Bayram, H. T. Senca, and N. Memon, “A survey of copy-move forgery detection techniques,” in Proc. IEEE Western New York Image Processing Workshop (New York, 2008), pp. 1–4.

    Google Scholar 

  9. J. Fridrich, D. Soukal, and J. Lukas, “Detection of copy-move forgery in digital images,” in Proc. Digital Forensic Research Workshop (IEEE Computer Soc., Cleveland, OH, 2003), pp. 55–61.

    Google Scholar 

  10. H. Huang, W. Guo, and Y. Zhang, “Detection of copymove forgery in digital images using sift algorithm,” in Proc. 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application (IEEE Computer Soc., Washington, 2008), pp. 272–276.

    Chapter  Google Scholar 

  11. M. Kirchner, “Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue,” in Proc. 10th ACM Workshop on Multimedia and Security (New York, 2008), pp. 11–20.

    Chapter  Google Scholar 

  12. J. Dong, W. Wang, T. Tan, and Y. Shi, “Run-length and edge statistics based approach for image splicing detection,” in Proc. 7th Int. Workshop on Digital Watermarking IWDW 2008 (Busan, 2008), pp. 76–87.

    Google Scholar 

  13. G. Sankar, V. Zhao, and Y.-H. Yang, “Feature based classification of computer graphics and real images,” in Proc. 2009 IEEE Int.Conf.on Acoustics, Speech and Signal Processing (IEEE Computer Soc., Washington, 2009), pp. 1513–1516.

    Chapter  Google Scholar 

  14. C.-T. Li, “Detection of block artifacts for digital forensic analysis,” in Proc. Int. Conf. on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forenensics 09) (Adelaide, Jan. 19–21, 2009), pp. 173–178.

    Chapter  Google Scholar 

  15. N. Fan, C. Jin, and Y. Huang, “A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation,” in Proc. 11th ACM Workshop on Multimedia and Security (New York, 2009), pp. 125–130.

    Chapter  Google Scholar 

  16. H. Gou, A. Swaminathan, and M. Wu, “Noise features for image tampering detection and steganalysis,” in Proc. 6th IEEE ICIP (San Antonio, 2007), pp. 97–100.

    Google Scholar 

  17. Z. Li and J. Bin Zheng, “Blind detection of digital forgery image based on the local entropy of the gradient,” in Proc. IWDW (Busan, 2008), pp. 161–169.

    Google Scholar 

  18. M. Johnson and H. Farid, “Exposing digital forgeries in complex lighting environments,” IEEE Trans. Inf. Forensics Security 2 (3), 450–461 (2007).

    Article  Google Scholar 

  19. H. Farid and M. Bravo, “Image forensic analyses that elude the human visual system,” in Proc. SPIE Symp. on Electronic Imaging (San Jose, 2010).

    Google Scholar 

  20. S. Lee, D. A. Shamma, and B. Gooch, “Detecting false captioning using common-sense reasoning,” Digital Invest. 3 (Suppl. 1), 65–70 (2006).

    Article  Google Scholar 

  21. M. Taileb and S. Touati, “NOHIS-tree: High-dimensional index structure for similarity search,” World Acad. Sci., Eng. Technol., No. 59, 518–525 (2011).

    Google Scholar 

  22. Kh. A. Takha, Introduction to Operations Research, 6th ed. (Vil’yams, Moscow, 2001) [in Russian].

    Google Scholar 

  23. D. E. Knut, Art of Programming, Vol. 2: Self-Digital Algorithms (Vil’yams, Moscow, 2007) [in Russian].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to A. V. Kuznetsov or V. V. Myasnikov.

Additional information

This paper uses the materials of the report submitted at the 11th International Conference “Pattern Recognition and Image Analysis: New Information Technologies,” Samara, Russia, September 23–28, 2013.

Andrei Vladimirovich Kuznetsov. Born 1987. Graduated with honors from the Samara State Aerospace University in 2010. Received candidate’s degree in 2013. Scientific interests: image processing and analysis, detection of local artificial changes in images, pattern recognition, and geoinformatics. Author of 25 papers. Junior research fellow at the Institute of Image Processing Systems, Russian Academy of Sciences.

Vladislav Valer’evich Myasnikov. Born 1971. Graduated from Samara State Aerospace University in 1994. Received candidate’s degree in 1998 and doctoral degree in 2008. Scientific interests: signal and image digital processing, computer vision, pattern recognition, artificial intelligence, and geoinformatics. Author of more than 100 papers. Member of the Russian Association of Pattern Recognition and Image Analysis.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kuznetsov, A.V., Myasnikov, V.V. Sequential computational procedure for remote sensing data forgery detection. Pattern Recognit. Image Anal. 25, 645–653 (2015). https://doi.org/10.1134/S1054661815040136

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S1054661815040136

Keywords

Navigation