Skip to main content

Detecting Digital Image Splicing in Chroma Spaces

  • Conference paper
Digital Watermarking (IWDW 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6526))

Included in the following conference series:

Abstract

Detecting splicing traces in the tampering color space is usually a tough work. However, it is found that image splicing which is difficult to be detected in one color space is probably much easier to be detected in another one. In this paper, an efficient approach for passive color image splicing detection is proposed. Chroma spaces are introduced in our work compared with commonly used RGB and luminance spaces. Four gray level run-length run-number (RLRN) vectors with different directions extracted from de-correlated chroma channels are employed as distinguishing features for image splicing detection. Support vector machine (SVM) is used as a classifier to demonstrate the performance of the proposed feature extraction method. Experimental results have shown that that RLRN features extracted from chroma channels provide much better performance than that extracted from R, G, B and luminance channels.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Photo tampering throughout history, http://www.cs.dartmouth.edu/farid/research/digitaltampering

  2. Shi, Y.Q., Chen, C., Chen, W.: A Natural Image Model Approach to Splicing Detection. In: ACM Proceedings of the 9th Workshop on Multimedia & Security (2007)

    Google Scholar 

  3. Ng, T.T., Chang, S.F., Sun, Q.: A data set of authentic and spliced image blocks. Tech. Rep., DVMM, Columbia University (2004), http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/photographers.htm

  4. Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using SIFT algorithm. In: 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA 2008) (2008)

    Google Scholar 

  5. Pan, X., Lyu, S.: Detecting image region duplication using SIFT features. In: 2010 Acoustics Speech and Signal Processing, ICASSP 2010 (2010)

    Google Scholar 

  6. Mahdian, B., Saic, S.: Using noise inconsistencies for blind image forensics. Image and Vision Computing 27, 1497–1503 (2009)

    Article  Google Scholar 

  7. Johnson, M.K., Farid, H.: Exposing digital forgeries by detecting inconsistencies in lighting. In: ACM Proceedings of the 7th Workshop on Multimedia and Security, pp. 1–10 (2005)

    Google Scholar 

  8. Popescu, A.C., Farid, H.: Exposing digital forgeries in color filter array interpolated images. IEEE Transactions Signal Processing 53(10), 3948–3959 (2005)

    Article  MathSciNet  Google Scholar 

  9. Ng, T.T., Chang, S.F., Sun, Q.: Blind detection of photomontage using higher order statistics. In: IEEE International Symposium on Circuits and Systems (2004)

    Google Scholar 

  10. Ng, T.T., Chang, S.F.: A model for image splicing. In: 2004 International Conference on Image Processing (ICIP 2004), pp. 1169–1172 (2004)

    Google Scholar 

  11. Dong, J., Wang, W., Tan, T., Shi, Y.Q.: Run-length and edge statistics based approach for image splicing detection. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 76–87. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Wang, W., Dong, J., Tan, T.: Effective image splicing detection based on image chroma. In: 2009 International Conference on Image Processing, ICIP 2009 (2009)

    Google Scholar 

  13. CASIA Tampering Detection Dataset, http://forensics.idealtest.org

  14. Zou, D., Shi, Y.Q., Su, W.: Steganalysis based on markov model of thresholded prediction-error image. In: IEEE International Conference on Multimedia and Expo, Toronto, Canada (2006)

    Google Scholar 

  15. Galloway, M.M.: Texture analysis using gray level run lengths. Comput. Graphics Image Process. 4, 172–179 (1975)

    Article  Google Scholar 

  16. Tang, X.: Texture information in run-length matrices. IEEE Transactions on Image Processing 7(11) (November 1998)

    Google Scholar 

  17. Poynton, C.: Frequently asked questions about color, http://www.poynton.com/Poynton-color.html

  18. Hsu, Y.-F., Chang, S.-F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: International Conference on Multimedia and Expo, Toronto, Canada (July 2006)

    Google Scholar 

  19. DVMM Laboratory of Columbia University: Columbia Image Splicing Detection Evaluation Dataset, http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/photographers.htm

  20. Chang, C.C., Lin, C.j.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhao, X., Li, J., Li, S., Wang, S. (2011). Detecting Digital Image Splicing in Chroma Spaces. In: Kim, HJ., Shi, Y.Q., Barni, M. (eds) Digital Watermarking. IWDW 2010. Lecture Notes in Computer Science, vol 6526. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18405-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18405-5_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-18404-8

  • Online ISBN: 978-3-642-18405-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics