Skip to main content

An Image Splicing Detection Based on Interpolation Analysis

  • Conference paper
Advances in Multimedia Information Processing – PCM 2012 (PCM 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7674))

Included in the following conference series:

Abstract

With the advent of low-cost and high-resolution digital cameras and sophisticated editing software, it is becoming increasingly easier to tamper with the digital image. A common form of manipulation is to combine parts of the image fragment into another different image to remove objects from the image. Inspired by the digital image correlation concept, we exploit the peak of cross-correlation function to automatically detect the splicing artifacts in any fragment of an image. We show the efficacy of the proposed scheme on revealing the source of spliced regions. We make the first concrete technique towards appropriate tools which are necessary for rendering digital forgeries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Farid, H.: Detecting Digital Forgeries Using Bispectral Analysis. Technical Report AIM-1657, AI Lab, Massachusetts Institute of Technology (1999)

    Google Scholar 

  2. Ng, T.T., Chang, S.F., Lin, C.Y., Sun, Q.: Passive-blind Image Forensics. In: Zeng, W., Yu, H., Lin, C.Y. (eds.) Multimedia Security Technologies for Digital Rights, ch. 15, pp. 383–412. Academic Press, Missouri (2006)

    Chapter  Google Scholar 

  3. Popescu, A.C., Farid, H.: Exposing Digital Forgeries by Detecting Traces of Re-sampling. IEEE Transaction on Signal Processing 53(2), 758–767 (2005)

    Article  MathSciNet  Google Scholar 

  4. Prasad, S., Ramakrishnan, K.R.: On Resampling Detection and its Application to Detect Image Tampering. In: IEEE International Conference on Multimedia and Expo, ICME (2006)

    Google Scholar 

  5. Ye, S., Sun, Q., Chang, E.C.: Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact. In: IEEE International Conference on Multimedia and Expo, ICME (2007)

    Google Scholar 

  6. Pan, X., Lyu, S.: Region Duplication Detection using Image Feature Matching. IEEE Transaction on Information Forensics and Security 5(4), 857–867 (2010)

    Article  Google Scholar 

  7. Farid, H., Lyu, S.: Higher-order Wavelet Statistics and their Application to Digital Forensics. In: IEEE Workshop on Statistical Analysis in Computer Vision (in Conjunction with CVPR) (2003)

    Google Scholar 

  8. Ng, T.T., Chang, S.F., Sun, Q.: Blind Detection of Photomontage using Higher Order Statistics. In: IEEE International Symposium on Circuits and Systems, vol. 5, pp. 688–691 (2004)

    Google Scholar 

  9. Avcibas, I., Bayram, S., Memon, N., Sankur, B., Ramkumar, M.: A Classifier Design for Detecting Image Manipulations. In: IEEE International Conference on Image Processing, ICIP (2004)

    Google Scholar 

  10. Bayram, S., Avcibas, I., Sankur, B., Memon, N.: Image Manipulation Detection. Journal of Electronic Imaging 15(4), 041102 (2006)

    Google Scholar 

  11. Chen, W., Shi, Y.Q., Su, W.: Image Splicing Detection using 2-D Phase Congruency and Statistical Moments of Characteristic Function. In: Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol. 6505, art. No. 65050R. SPIE, Washington (2007)

    Google Scholar 

  12. Dong, J., Wang, W., Tan, T., Shi, Y.Q.: Run-Length and Edge Statistics Based Approach for Image Splicing Detection. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 76–87. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  13. Sutthiwan, P., Shi, Y.Q., Zhao, H., Ng, T.T., Su, W.: Markovian Rake Transform for Digital Image Tampering Detection. In: Shi, Y.Q., Emmanuel, S., Kankanhalli, M.S., Chang, S.-F., Radhakrishnan, R., Ma, F., Zhao, L. (eds.) Transactions on DHMS VI. LNCS, vol. 6730, pp. 1–17. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  14. Wang, W., Farid, H.: Exposing digital forgeries in video by detecting duplication. In: Proceeding ACM Workshop on MMSec, Dallas, TX (2007)

    Google Scholar 

  15. Ng, T.T.: Statistical and Geometric Methods for Passive-blind Image Forensics. Ph.D. Dissertation, Columbia University (2007)

    Google Scholar 

  16. Liu, J., Iskander, M.: Digital Image Correlation. In: Iskander, M. (ed.) Modeling with Transparent Soils, SSGG, pp. 137–164. Springer, Heidelberg (2010)

    Google Scholar 

  17. Ye, S.M., Sun, Q.B., Chang, E.C.: Error resilient content-based image authentication over wireless channel. In: IEEE Int. Symp. Circuits and Systems, ISCAS, Kobe, Japan, pp. 2707–2710 (2005)

    Google Scholar 

  18. Ng, T.T., Chang, S., Sun, Q.: A data set of authentic and spliced image blocks. In: ADVENT Technical Report 203-2004-3. Columbia University (June 2004), http://www.ee.columbia.edu/trustfoto

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ciptasari, R.W., Rhee, KH., Sakurai, K. (2012). An Image Splicing Detection Based on Interpolation Analysis. In: Lin, W., et al. Advances in Multimedia Information Processing – PCM 2012. PCM 2012. Lecture Notes in Computer Science, vol 7674. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34778-8_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34778-8_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34777-1

  • Online ISBN: 978-3-642-34778-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics