Image Splicing Detection Based on Machine Learning Algorithm

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 277)


Image splicing is a common method to construct forged image which decreases the authentication of the traditional image. Resizing operation is usually necessary to create a convinced forged image. Though the forged image leaves no visual clues, resizing operation using interpolation method destroys the relationship between neighboring pixels, thus leaving traces which can be captured by statistical feature. We first convert the traces left by resizing to feature and then feed features from enough sample images to support vector machines to train for detector. Finally, we use detector to determine whether the image is tampered and point out which parts of the image are tampered by block-wise method. Experimental results verify the effectiveness of our proposed method.


  1. 1.
    Farid, H. (2009). Image forgery detection. IEEE Signal Processing Magazine, 5(3), 16–25.CrossRefGoogle Scholar
  2. 2.
    Farid. H. (1999). Detecting digital forgeries using bi-spectral analysis. AI Lab, Massachusetts Institute of Technology, Tech. Rep. AIM-1657Google Scholar
  3. 3.
    Ng, T. T, & Chang, S.-F. (2004). A model for image splicing. Proceedings of IEEE International Conference on Image Processing. Singapore (Vol. 2, pp. 1169–1172).Google Scholar
  4. 4.
    Popescu, A. C., & Farid, H. (2005). Exposing digital forgeries by detecting traces of re-sampling. IEEE Transactions on Signal Processing, 53(2), 758–767.CrossRefMathSciNetGoogle Scholar
  5. 5.
    Mahdian, B., & Saic, S. (2008). Blind authentication using periodic properties of interpolation. IEEE Transactions on Information Forensics and Security, 3(3), 529–538.CrossRefGoogle Scholar
  6. 6.
    Andrew C. Gallagher. (2005). Detection of linear and cubic interpolation in JPEG compressed images, Proceedings of the Second Canadian Conference on Computer and Robot Vision. Vol. 33, pp. 65–72.Google Scholar
  7. 7.
    Shi, Y. Q., Chen, C. H., & Chen, W. (2007). A natural image model approach to splicing detection, MM and Sec’07, Proceedings of the Multimedia and Security Workshop, Dallas (pp. 51–62).Google Scholar
  8. 8.
    Kirchner, M., & Fridrich, J. (2010). On detection of median filtering in digital images, Proceedings of SPIE, San Jose USA (Vol. 7541, pp. 300–308).Google Scholar
  9. 9.
    Cristianini, N., & Taylor, J. S. (2000). An introduction to support vector machines and other kernel-based learning methods (pp. 230–250). London: Cambridge University Press.CrossRefGoogle Scholar
  10. 10.
    Chang, C.-C., & Lin, C.-J. (2011). LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 5(7), 230–235.Google Scholar
  11. 11.
    Schaefer, G., & Stich, M. (2004). UCID-An uncompressed color image database, Proceedings of SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA (pp. 472–480).Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Southwest University of Science and TechnologyMianyangChina
  2. 2.Mianyang Vocational and Technical CollegeMianyangChina

Personalised recommendations