Abstract
This article considers the problem of constructing a sequential computational procedure for detecting artificial changes of remote sensing data (RSD) using a set of elementary algorithms of detecting artificial RSD changes. The stated task has been solved within the framework of the passive approach, which requires determining actual changes (forgeries) in RSD based on computer analysis.
Similar content being viewed by others
References
M. Sridevi, C. Mala, and S. Sanyam, “Comparative study of image forgery and copy-move techniques,” in Proc. 2nd Int. Conf. on Computer Science, Engineering and Applications (ICCSEA 2012) (New Delhi, 2012), pp. 715–723.
I. J. Cox, G. Doerr, and T. Furon, “Watermarking is not cryptography,” in Proc. 5th Int. Workshop on Digital Watermarking (Jeju Island, 2006), pp. 1–15.
E. T. Lin and E. J. Delp, “A review of fragile image watermarks,” in Proc. ACM Multimedia and Security Workshop (Orlando, FL, 1999), Vol. 1, pp. 25–29.
B. Mahdian and S. Saic, “A bibliography on blind methods for identifying image forgery,” Signal Processing: Image Commun. 25, 389–399 (2010).
N. I. Glumov and A. V. Kuznetsov, “The way to detect local artificial variations in images,” Avtometriya 47 (3), 3–11 (2011).
A. C. Popescu, “Statistical tools for digital image forensics,” PhD Thesis (Dartmouth College, Dep. Computer Sci., Hanover, 2005).
J. Fridrich and J. Lukas, “Estimation of primary quantization matrix in double compressed JPEG images,” in Proc. Digital Forensic Research Workshop (Cleveland, OH, 2003), pp. 2–5.
S. Bayram, H. T. Senca, and N. Memon, “A survey of copy-move forgery detection techniques,” in Proc. IEEE Western New York Image Processing Workshop (New York, 2008), pp. 1–4.
J. Fridrich, D. Soukal, and J. Lukas, “Detection of copy-move forgery in digital images,” in Proc. Digital Forensic Research Workshop (IEEE Computer Soc., Cleveland, OH, 2003), pp. 55–61.
H. Huang, W. Guo, and Y. Zhang, “Detection of copymove forgery in digital images using sift algorithm,” in Proc. 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application (IEEE Computer Soc., Washington, 2008), pp. 272–276.
M. Kirchner, “Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue,” in Proc. 10th ACM Workshop on Multimedia and Security (New York, 2008), pp. 11–20.
J. Dong, W. Wang, T. Tan, and Y. Shi, “Run-length and edge statistics based approach for image splicing detection,” in Proc. 7th Int. Workshop on Digital Watermarking IWDW 2008 (Busan, 2008), pp. 76–87.
G. Sankar, V. Zhao, and Y.-H. Yang, “Feature based classification of computer graphics and real images,” in Proc. 2009 IEEE Int.Conf.on Acoustics, Speech and Signal Processing (IEEE Computer Soc., Washington, 2009), pp. 1513–1516.
C.-T. Li, “Detection of block artifacts for digital forensic analysis,” in Proc. Int. Conf. on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forenensics 09) (Adelaide, Jan. 19–21, 2009), pp. 173–178.
N. Fan, C. Jin, and Y. Huang, “A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation,” in Proc. 11th ACM Workshop on Multimedia and Security (New York, 2009), pp. 125–130.
H. Gou, A. Swaminathan, and M. Wu, “Noise features for image tampering detection and steganalysis,” in Proc. 6th IEEE ICIP (San Antonio, 2007), pp. 97–100.
Z. Li and J. Bin Zheng, “Blind detection of digital forgery image based on the local entropy of the gradient,” in Proc. IWDW (Busan, 2008), pp. 161–169.
M. Johnson and H. Farid, “Exposing digital forgeries in complex lighting environments,” IEEE Trans. Inf. Forensics Security 2 (3), 450–461 (2007).
H. Farid and M. Bravo, “Image forensic analyses that elude the human visual system,” in Proc. SPIE Symp. on Electronic Imaging (San Jose, 2010).
S. Lee, D. A. Shamma, and B. Gooch, “Detecting false captioning using common-sense reasoning,” Digital Invest. 3 (Suppl. 1), 65–70 (2006).
M. Taileb and S. Touati, “NOHIS-tree: High-dimensional index structure for similarity search,” World Acad. Sci., Eng. Technol., No. 59, 518–525 (2011).
Kh. A. Takha, Introduction to Operations Research, 6th ed. (Vil’yams, Moscow, 2001) [in Russian].
D. E. Knut, Art of Programming, Vol. 2: Self-Digital Algorithms (Vil’yams, Moscow, 2007) [in Russian].
Author information
Authors and Affiliations
Corresponding authors
Additional information
This paper uses the materials of the report submitted at the 11th International Conference “Pattern Recognition and Image Analysis: New Information Technologies,” Samara, Russia, September 23–28, 2013.
Andrei Vladimirovich Kuznetsov. Born 1987. Graduated with honors from the Samara State Aerospace University in 2010. Received candidate’s degree in 2013. Scientific interests: image processing and analysis, detection of local artificial changes in images, pattern recognition, and geoinformatics. Author of 25 papers. Junior research fellow at the Institute of Image Processing Systems, Russian Academy of Sciences.
Vladislav Valer’evich Myasnikov. Born 1971. Graduated from Samara State Aerospace University in 1994. Received candidate’s degree in 1998 and doctoral degree in 2008. Scientific interests: signal and image digital processing, computer vision, pattern recognition, artificial intelligence, and geoinformatics. Author of more than 100 papers. Member of the Russian Association of Pattern Recognition and Image Analysis.
Rights and permissions
About this article
Cite this article
Kuznetsov, A.V., Myasnikov, V.V. Sequential computational procedure for remote sensing data forgery detection. Pattern Recognit. Image Anal. 25, 645–653 (2015). https://doi.org/10.1134/S1054661815040136
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1134/S1054661815040136