Skip to main content

Image Resampling Forensics: A Review on Techniques for Image Authentication

  • Conference paper
  • First Online:
Applications of Computational Intelligence in Management & Mathematics (ICCM 2022)

Abstract

The raw image can be corrupted in part or as a whole; thus it is essential to identify the type of image manipulation technique employed and region of tampering on the infected image. Initially, individual handcrafted modified images were used to recognize the tampering contained in the image, but in the actual world, one image can be edited using a variety of image manipulation schemes. However, at present, numerous tampering schemes are probed on an image, followed by post-processing to remove the traces and signs left by the tampering operation. This process makes the detection of tampering difficult and hassle task even for efficient detector. Image resampling is a common manipulation of particular forensic importance since resampling is performed at any stage of processing such as resize, rotation, or affine transformation. The forensics of resampling plays a prominent role to detect tampering in images. So resampling detection is a significant tool that provides the forensic clues about the forged image. Generally, resampling is used to reconstruct the history of an image that will be helpful in detailed forensic analysis. In this chapter, a detailed review on various recent image manipulation detection techniques of image authentication using resampling forensics is studied.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758–767, 2005.

    Article  MathSciNet  MATH  Google Scholar 

  2. H. Farid, “Image forgery detection,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16–25, 2009.

    Article  Google Scholar 

  3. A. C. Popescu and H. Farid, “Statistical tools for digital forensics,” in International Workshop on Information Hiding. Springer, 2004, pp. 128–147.

    Google Scholar 

  4. M. C. Stamm, M. Wu, and K. R. Liu, “Information forensics: An overview of the first decade,” IEEE Access, vol. 1, pp. 167–200, 2013.

    Article  Google Scholar 

  5. L. Zheng, Y. Zhang, and V. L. Thing, “A survey on image tampering and its detection in real-world photos,” Journal of Visual Communication and Image Representation, vol. 58, pp. 380–399, 2019.

    Article  Google Scholar 

  6. V. Christlein, C. Riess, and E. Angelopoulou, “A study on features for the detection of copy-move forgeries,” in Sicherheit 2010. Sicherheit, Schutz und Zuverlssigkeit, F. C. Freiling, Ed. Bonn: Gesellschaft fr Informatik e.V., 2010, pp. 105–116.

    Google Scholar 

  7. S. Katzenbeisser and F. Petitcolas, “Digital watermarking,” Artech House, London, vol. 2, 2000.

    Google Scholar 

  8. M. Kirchner, “Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue,” in ACM Workshop on Multimedia and Security, 2008, pp. 11–20.

    Google Scholar 

  9. M. Kirchner and T. Gloe, “On resampling detection in re-compressed images,” in IEEE International Workshop on Information Forensics and Security (WIFS), 2009, pp. 21–25.

    Google Scholar 

  10. C. Chen, J. Ni, Z. Shen, and Y. Q. Shi, “Blind forensics of successive geometric transformations in digital images using spectral method: Theory and applications,” IEEE Transactions on Image Processing, vol. 26, no. 6, pp. 2811–2824, 2017.

    Article  MathSciNet  MATH  Google Scholar 

  11. B. Mahdian and S. Saic, “Blind authentication using periodic properties of interpolation,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 529–538, 2008.

    Article  Google Scholar 

  12. X. Feng, I. J. Cox, and G. Doërr, “An energy-based method for the forensic detection of re-sampled images,” in IEEE International Conference on Multimedia and Expo, 2011, pp. 1–6.

    Google Scholar 

  13. T. Bianchi and A. Piva, “Reverse engineering of double JPEG compression in the presence of image resizing,” in IEEE International Workshop on Information Forensics and Security (WIFS), 2012, pp. 127–132.

    Google Scholar 

  14. D. Vazquez-Padin, F. Pérez-González, and P. Comesana- Alfaro, “A random matrix approach to the forensic analysis of upscaled images,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115– 2130, 2017.

    Google Scholar 

  15. B. Bayar and M. C. Stamm, “Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2691–2706, 2018.

    Article  Google Scholar 

  16. T. Qiao, R. Shi, X. Luo, M. Xu, N. Zheng, and Y. Wu, “Statistical model-based detector via texture weight map: Application in re-sampling authentication,” IEEE Transactions on Multimedia, vol. 21, no. 5, pp. 1077–1092, 2019.

    Article  Google Scholar 

  17. Gang Cao, Antao Zhou, Xianglin Huang, Gege Song, Lifang Yang, Yonggui Zhu. Resampling detection of recompressed images via dual-stream convolutional neural network[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 5022–5040. https://doi.org/10.3934/mbe.2019253

    Article  MathSciNet  Google Scholar 

  18. Y. Liang, Y. Fang, S. Luo and B. Chen, “Image Resampling Detection Based on Convolutional Neural Network,” 2019 15th International Conference on Computational Intelligence and Security (CIS), 2019, pp. 257–261, https://doi.org/10.1109/CIS.2019.00061.

  19. Chang Liu and Matthias Kirchner. 2019. CNN-based Rescaling Factor Estimation. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec’19). Association for Computing Machinery, New York, NY, USA, 119–124. https://doi.org/10.1145/3335203.3335725

  20. A. C. Gallagher, “Detection of linear and cubic interpolation in JPEG compressed images.” in Canadian Conference on Computer and Robot Vision (CRV’05), vol. 5. IEEE, 2005, pp. 65–72.

    Google Scholar 

  21. D. Vazquez-Padin and P. Comesana, “ML estimation of the resampling factor,” in IEEE International Workshop on Information Forensics and Security (WIFS), 2012, pp. 205–210.

    Google Scholar 

  22. D. Vázquez-Padón, P. Comesana, and F. Pérez-González, “An SVD approach to forensic image resampling detection,” in European Signal Processing Conference (EUSIPCO). IEEE, 2015, pp. 2067–2071.

    Google Scholar 

  23. S. Pfennig and M. Kirchner, “Spectral methods to determine the exact scaling factor of resampled digital images,” in International Symposium on Communications, Control and Signal Processing. IEEE, 2012, pp. 1–6.

    Google Scholar 

  24. H. C. Nguyen and S. Katzenbeisser, “Detecting resized double JPEG compressed images–using support vector machine,” in IFIP International Conference on Communications and Multimedia Security. Springer, 2013, pp. 113–122.

    Google Scholar 

  25. K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 770–778.

    Google Scholar 

  26. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet classification with deep convolutional neural networks,” in International Conference on Neural Information Processing Systems - Volume 1, ser. NIPS’12. Red Hook, NY, USA: Curran Associates Inc., 2012, p. 10971105.

    Google Scholar 

  27. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in International Conference on Learning Representations, Y. Bengio and Y. LeCun, Eds., 2015. [Online]. Available: http://arxiv.org/abs/1409.1556

  28. Y. Rao and J. Ni, “A deep learning approach to detection of splicing and copy-move forgeries in images,” in IEEE International Workshop on Information Forensics and Security (WIFS), 2016, pp. 1–6.

    Google Scholar 

  29. Y. Liu, Q. Guan, X. Zhao, and Y. Cao, “Image forgery localization based on multi-scale convolutional neural networks,” in ACM Workshop on Information Hiding and Multimedia Security, 2018, pp. 85–90.

    Google Scholar 

  30. B. Bayar and M. C. Stamm, “A deep learning approach to universal image manipulation detection using a new convolutional layer,” in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 5–10.

    Google Scholar 

  31. P. Zhou, X. Han, V. I. Morariu, and L. S. Davis, “Learning rich features for image manipulation detection,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 1053–1061.

    Google Scholar 

  32. Y.-F. Hsu and S.-F. Chang, “Detecting image splicing using geometry invariants and camera characteristics consistency,” in 2006 IEEE International Conference on Multimedia and Expo. IEEE, 2006, pp. 549–552.

    Google Scholar 

  33. T.-T. Ng, S.-F. Chang, and Q. Sun, “A data set of authentic and spliced image blocks,” Columbia University, ADVENT Technical Report, pp. 203–2004, 2004.

    Google Scholar 

  34. H. Guan, M. Kozak, E. Robertson, Y. Lee, A. N. Yates, A. Delgado, D. Zhou, T. Kheyrkhah, J. Smith, and J. Fiscus, “MFC datasets: Large-scale benchmark datasets for media forensic challenge evaluation,” in 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW). IEEE, 2019, pp. 63–72.

    Google Scholar 

  35. D. Cozzolino, G. Poggi, and L. Verdoliva, “Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection,” in ACM Workshop on Information Hiding and Multimedia Security, 2017, pp. 159–164.

    Google Scholar 

  36. Y. Yan,W. Ren, and X. Cao, “Recolored image detection via a deep discriminative model,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 1, pp. 5–17, 2018.

    Article  Google Scholar 

  37. J. H. Bappy, C. Simons, L. Nataraj, B. Manjunath, and A. K. Roy-Chowdhury, “Hybrid LSTM and encoder– decoder architecture for detection of image forgeries,” IEEE Transactions on Image Processing, vol. 28, no. 7, pp. 3286–3300, 2019.

    Article  MathSciNet  MATH  Google Scholar 

  38. F. Marra, D. Gragnaniello, D. Cozzolino, and L. Verdoliva, “Detection of GAN-generated fake images over social networks,” in 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 2018, pp. 384–389.

    Google Scholar 

  39. P. Korshunov and S. Marcel, “DeepFakes: a new threat to face recognition? assessment and detection,” arXiv preprint arXiv:1812.08685, 2018.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kadha, V., Vakamullu, V., Das, S.K., Mishra, M., Bora, J. (2023). Image Resampling Forensics: A Review on Techniques for Image Authentication. In: Mishra, M., Kesswani, N., Brigui, I. (eds) Applications of Computational Intelligence in Management & Mathematics. ICCM 2022. Springer Proceedings in Mathematics & Statistics, vol 417. Springer, Cham. https://doi.org/10.1007/978-3-031-25194-8_15

Download citation

Publish with us

Policies and ethics