Chinese Conference on Image and Graphics Technologies

IGTA 2015: Advances in Image and Graphics Technologies pp 63-71 | Cite as

A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-Pair Histogram

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 525)

Abstract

A novel image forensic method based on generalized coefficient-pair histogram in DCT domain was proposed. In the proposed method, firstly, the image is transformed by DCT, and then the differential DCT coefficient matrix of two directions, such as horizontal and vertical direction are computed, the following is to compute the coefficient-pair histogram for each differential DCT coefficient matrix within the given threshold. Finally, support vector machine (SVM) is used to classify the authentic and spliced image through training the feature vectors of authentic and tampered image. The experimental results show that the proposed approach has not only the lower computing complexity; it also outperforms all the state-of-the-art methods in detection rate with the same test database.

Keywords

Coefficient-pair histogram Generalized differential DCT coefficients Image splicing detection 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ng, T.-T., Chang, S.-F., Sun, Q.: Blind detection of photomontage using higher order statistics. In: IEEE ISCAS, Vancouver, Canada, pp. 688–691 (2004)Google Scholar
  2. 2.
    Fu, D., Shi, Y.Q., Su, W.: Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 177–187. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  3. 3.
    Chen, W., Shi, Y.Q., Su, W.: Image splicing detection using 2-d phase congruency and statistical moments of characteristic function. In: Imaging: Security, Steganography,and Watermarking of Multimedia Contents (2007). 6505RGoogle Scholar
  4. 4.
    Dong, J., Wang, W., Tan, T., Shi, Y.Q.: Run-length and edge statistics based approach for image splicing detection. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 76–87. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  5. 5.
    He, Z., Sun, W., Wei, L., Hongtao, L.: Digital image splicing detection based on approximate run length. Pattern Recognition Letters 32(12), 1591–1597 (2011)CrossRefGoogle Scholar
  6. 6.
    Shi, Y.Q., Chen, C., Chen, W.: A natural image model approaches to splicing detection. In: Proceedings of the 9th Workshop on Multimedia & Security, pp. 51–62 (2007)Google Scholar
  7. 7.
    Sutthiwan, P., Shi, Y.Q., Dong, J., et. al.: New developments in color image tampering detection. In: Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 3064–3067 (2010)Google Scholar
  8. 8.
    He, Z., lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition 45, 4292–4299 (2012)CrossRefGoogle Scholar
  9. 9.
    Saleh, S.Q., Hussain, M., Muhammad, G., Bebis, G.: Evaluation of image forgery detection using multi-scale weber local descriptors. In: Bebis, G., Boyle, R., Parvin, B., Koracin, D., Li, B., Porikli, F., Zordan, V., Klosowski, J., Coquillart, S., Luo, X., Chen, M., Gotz, D. (eds.) ISVC 2013, Part II. LNCS, vol. 8034, pp. 416–424. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  10. 10.
    Alahmadi1, A.A., Hussain1, M., Aboalsamh, H.: Splicing image forgery detection based on DCT and Local Binary Pattern. In: Proceedings of IEEE Global Conference on Signal and Information Processing, pp. 253–256 (2013)Google Scholar
  11. 11.
    Qian-lan, D.: The blind detection of information hiding in color image. In: Proceedings of Second Int. conf. Computer Engineering and Technology, vol. 7, pp. 346–348 (2010)Google Scholar
  12. 12.
    Shabanifard, M., Shayesteh, M.G., Akhaee, M.A.: Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram. IET Image Process 7(9), 817–828 (2013)CrossRefGoogle Scholar
  13. 13.
    Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST) 2(3), 27 (2011)Google Scholar
  14. 14.
    Dong, J.: CASIA tampered image detection evaluation database (2011). http://forensics.idealtest.org

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.Tianjin UniversityTianjinChina

Personalised recommendations