Abstract
In order to create convincing forged images, manipulated images are usually exposed to some geometric operations which require a re-sampling step. Therefore, detecting traces of re-sampling became an important approach in the field of image forensics. There are many re-sampling detection techniques described in the literature, but their performance has been often examined with a small dataset. Besides, performance and robustness have been tested under different conditions, so it is difficult to evaluate and compare them. In this paper, we analyze the performance of some selected re-sampling detection techniques by using a common testing framework and a large dataset. We also employ several kinds of image post-processing to defeat the detectors in order to evaluate their robustness and security. We show that the tested techniques obtain the best results when detecting up-sampled images. Unfortunately, most techniques are not secure and they can be defeated on different levels by applying post-processing operations to the forged images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Sencar, H.T., Memon, N.: Overview of State-of-the-Art in Digital Image Forensics. In: Proc. WSPC (2007)
Farid, H.: Image forgery detection. IEEE Signal Processing Magazine 26, 16–25 (2009)
Mahdian, B., Saic, S.: A bibliography on blind methods for identifying image forgery. Signal Processing: Image Communication 25, 389–399 (2010)
Popescu, A., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing (2005)
Kirchner, M.: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, MM&Sec 2008, vol. 11 (2008)
Kirchner, M., Gloe, T.: On resampling detection in re-compressed images. In: WIFS, pp.21-25 (2009)
Prasad, S.: On resampling detection and its application to detect image tampering. Dept. of Electrical Engineering, IIS Bangalore, India. 1325-1328 (2006)
Gallagher, A.C.: Detection of Linear and Cubic Interpolation in JPEG Compressed Images. In: The 2nd Canadian Conference on Computer and Robot Vision (CRV 2005), pp. 65-72 (2005)
Mahdian, B., Saic, S.: Blind Authentication Using Periodic Properties of Interpolation. IEEE Transactions on Information Forensics and Security 3, 529–538 (2008)
Kirchner, M., Boehme, R.: Hiding Traces of Resampling in Digital Images. IEEE Transactions on Information Forensics and Security 3, 582–592 (2008)
Stamm, M., Tjoa, S., Lin, S., Liu, J.: Anti-Forensics of JPEG Compression. In: ICASSP (2010)
Stamm, M., Tjoa, S., Lin, S., Liu, K.J.R.: Undetectable image tampering through JPEG compression. In: ICIP 2010 (2010)
Uccheddu, F., Rosa, A.D., Piva, A., Barni, M.: Detection of resampled images: performance analysis and practical challenges. In: EURASIP, pp. 1675–1679 (2010)
Dempster, A., Laird, N., Rubin, D.: Maximum Likelihood from Incomplete Data via the EM Algorithm. Journal of the Royal Statistical Society. Series B (Methodological) 39, 1–38 (1977)
Nataraj, L., Sarkar, A., Manjunath, B.S.: Improving re-sampling detection by adding noise. Computer. 75410I-75410I-11 (2010)
Schaefer, G.: UCID: an uncompressed color image database. In: Proceedings of SPIE, pp. 472–480 (2004)
Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. Computer. 754110-754110-12 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nguyen, H.C., Katzenbeisser, S. (2012). Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-32205-1_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32204-4
Online ISBN: 978-3-642-32205-1
eBook Packages: Computer ScienceComputer Science (R0)