Abstract
The raw image can be corrupted in part or as a whole; thus it is essential to identify the type of image manipulation technique employed and region of tampering on the infected image. Initially, individual handcrafted modified images were used to recognize the tampering contained in the image, but in the actual world, one image can be edited using a variety of image manipulation schemes. However, at present, numerous tampering schemes are probed on an image, followed by post-processing to remove the traces and signs left by the tampering operation. This process makes the detection of tampering difficult and hassle task even for efficient detector. Image resampling is a common manipulation of particular forensic importance since resampling is performed at any stage of processing such as resize, rotation, or affine transformation. The forensics of resampling plays a prominent role to detect tampering in images. So resampling detection is a significant tool that provides the forensic clues about the forged image. Generally, resampling is used to reconstruct the history of an image that will be helpful in detailed forensic analysis. In this chapter, a detailed review on various recent image manipulation detection techniques of image authentication using resampling forensics is studied.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758–767, 2005.
H. Farid, “Image forgery detection,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16–25, 2009.
A. C. Popescu and H. Farid, “Statistical tools for digital forensics,” in International Workshop on Information Hiding. Springer, 2004, pp. 128–147.
M. C. Stamm, M. Wu, and K. R. Liu, “Information forensics: An overview of the first decade,” IEEE Access, vol. 1, pp. 167–200, 2013.
L. Zheng, Y. Zhang, and V. L. Thing, “A survey on image tampering and its detection in real-world photos,” Journal of Visual Communication and Image Representation, vol. 58, pp. 380–399, 2019.
V. Christlein, C. Riess, and E. Angelopoulou, “A study on features for the detection of copy-move forgeries,” in Sicherheit 2010. Sicherheit, Schutz und Zuverlssigkeit, F. C. Freiling, Ed. Bonn: Gesellschaft fr Informatik e.V., 2010, pp. 105–116.
S. Katzenbeisser and F. Petitcolas, “Digital watermarking,” Artech House, London, vol. 2, 2000.
M. Kirchner, “Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue,” in ACM Workshop on Multimedia and Security, 2008, pp. 11–20.
M. Kirchner and T. Gloe, “On resampling detection in re-compressed images,” in IEEE International Workshop on Information Forensics and Security (WIFS), 2009, pp. 21–25.
C. Chen, J. Ni, Z. Shen, and Y. Q. Shi, “Blind forensics of successive geometric transformations in digital images using spectral method: Theory and applications,” IEEE Transactions on Image Processing, vol. 26, no. 6, pp. 2811–2824, 2017.
B. Mahdian and S. Saic, “Blind authentication using periodic properties of interpolation,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 529–538, 2008.
X. Feng, I. J. Cox, and G. Doërr, “An energy-based method for the forensic detection of re-sampled images,” in IEEE International Conference on Multimedia and Expo, 2011, pp. 1–6.
T. Bianchi and A. Piva, “Reverse engineering of double JPEG compression in the presence of image resizing,” in IEEE International Workshop on Information Forensics and Security (WIFS), 2012, pp. 127–132.
D. Vazquez-Padin, F. Pérez-González, and P. Comesana- Alfaro, “A random matrix approach to the forensic analysis of upscaled images,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115– 2130, 2017.
B. Bayar and M. C. Stamm, “Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2691–2706, 2018.
T. Qiao, R. Shi, X. Luo, M. Xu, N. Zheng, and Y. Wu, “Statistical model-based detector via texture weight map: Application in re-sampling authentication,” IEEE Transactions on Multimedia, vol. 21, no. 5, pp. 1077–1092, 2019.
Gang Cao, Antao Zhou, Xianglin Huang, Gege Song, Lifang Yang, Yonggui Zhu. Resampling detection of recompressed images via dual-stream convolutional neural network[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 5022–5040. https://doi.org/10.3934/mbe.2019253
Y. Liang, Y. Fang, S. Luo and B. Chen, “Image Resampling Detection Based on Convolutional Neural Network,” 2019 15th International Conference on Computational Intelligence and Security (CIS), 2019, pp. 257–261, https://doi.org/10.1109/CIS.2019.00061.
Chang Liu and Matthias Kirchner. 2019. CNN-based Rescaling Factor Estimation. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec’19). Association for Computing Machinery, New York, NY, USA, 119–124. https://doi.org/10.1145/3335203.3335725
A. C. Gallagher, “Detection of linear and cubic interpolation in JPEG compressed images.” in Canadian Conference on Computer and Robot Vision (CRV’05), vol. 5. IEEE, 2005, pp. 65–72.
D. Vazquez-Padin and P. Comesana, “ML estimation of the resampling factor,” in IEEE International Workshop on Information Forensics and Security (WIFS), 2012, pp. 205–210.
D. Vázquez-Padón, P. Comesana, and F. Pérez-González, “An SVD approach to forensic image resampling detection,” in European Signal Processing Conference (EUSIPCO). IEEE, 2015, pp. 2067–2071.
S. Pfennig and M. Kirchner, “Spectral methods to determine the exact scaling factor of resampled digital images,” in International Symposium on Communications, Control and Signal Processing. IEEE, 2012, pp. 1–6.
H. C. Nguyen and S. Katzenbeisser, “Detecting resized double JPEG compressed images–using support vector machine,” in IFIP International Conference on Communications and Multimedia Security. Springer, 2013, pp. 113–122.
K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 770–778.
A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet classification with deep convolutional neural networks,” in International Conference on Neural Information Processing Systems - Volume 1, ser. NIPS’12. Red Hook, NY, USA: Curran Associates Inc., 2012, p. 10971105.
K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in International Conference on Learning Representations, Y. Bengio and Y. LeCun, Eds., 2015. [Online]. Available: http://arxiv.org/abs/1409.1556
Y. Rao and J. Ni, “A deep learning approach to detection of splicing and copy-move forgeries in images,” in IEEE International Workshop on Information Forensics and Security (WIFS), 2016, pp. 1–6.
Y. Liu, Q. Guan, X. Zhao, and Y. Cao, “Image forgery localization based on multi-scale convolutional neural networks,” in ACM Workshop on Information Hiding and Multimedia Security, 2018, pp. 85–90.
B. Bayar and M. C. Stamm, “A deep learning approach to universal image manipulation detection using a new convolutional layer,” in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 5–10.
P. Zhou, X. Han, V. I. Morariu, and L. S. Davis, “Learning rich features for image manipulation detection,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 1053–1061.
Y.-F. Hsu and S.-F. Chang, “Detecting image splicing using geometry invariants and camera characteristics consistency,” in 2006 IEEE International Conference on Multimedia and Expo. IEEE, 2006, pp. 549–552.
T.-T. Ng, S.-F. Chang, and Q. Sun, “A data set of authentic and spliced image blocks,” Columbia University, ADVENT Technical Report, pp. 203–2004, 2004.
H. Guan, M. Kozak, E. Robertson, Y. Lee, A. N. Yates, A. Delgado, D. Zhou, T. Kheyrkhah, J. Smith, and J. Fiscus, “MFC datasets: Large-scale benchmark datasets for media forensic challenge evaluation,” in 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW). IEEE, 2019, pp. 63–72.
D. Cozzolino, G. Poggi, and L. Verdoliva, “Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection,” in ACM Workshop on Information Hiding and Multimedia Security, 2017, pp. 159–164.
Y. Yan,W. Ren, and X. Cao, “Recolored image detection via a deep discriminative model,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 1, pp. 5–17, 2018.
J. H. Bappy, C. Simons, L. Nataraj, B. Manjunath, and A. K. Roy-Chowdhury, “Hybrid LSTM and encoder– decoder architecture for detection of image forgeries,” IEEE Transactions on Image Processing, vol. 28, no. 7, pp. 3286–3300, 2019.
F. Marra, D. Gragnaniello, D. Cozzolino, and L. Verdoliva, “Detection of GAN-generated fake images over social networks,” in 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 2018, pp. 384–389.
P. Korshunov and S. Marcel, “DeepFakes: a new threat to face recognition? assessment and detection,” arXiv preprint arXiv:1812.08685, 2018.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kadha, V., Vakamullu, V., Das, S.K., Mishra, M., Bora, J. (2023). Image Resampling Forensics: A Review on Techniques for Image Authentication. In: Mishra, M., Kesswani, N., Brigui, I. (eds) Applications of Computational Intelligence in Management & Mathematics. ICCM 2022. Springer Proceedings in Mathematics & Statistics, vol 417. Springer, Cham. https://doi.org/10.1007/978-3-031-25194-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-25194-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25193-1
Online ISBN: 978-3-031-25194-8
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)