Skip to main content
Log in

Passive detection of copy-paste forgery between JPEG images

  • Published:
Journal of Central South University Aims and scope Submit manuscript

Abstract

A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed. Two copy-paste tampering scenarios were introduced at first: the tampered image was saved in an uncompressed format or in a JPEG compressed format. Then the proposed detection method was analyzed and simulated for all the cases of the two tampering scenarios. The tampered region is detected by computing the averaged sum of absolute difference (ASAD) images between the examined image and a resaved JPEG compressed image at different quality factors. The experimental results show the advantages of the proposed method: capability of detecting small and/or multiple tampered regions, simple computation, and hence fast speed in processing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. MAHDIAN B, SAIC S. A bibliography on blind methods for identifying image forgery [J]. Signal Processing: Image Communication, 2010, 25(6): 389–399.

    Article  Google Scholar 

  2. CHAMLAWI R, KHAN A. Digital image authentication and recovery: Employing integer transform based information embedding and extraction [J]. Information Sciences, 2010, 180(24): 4909–4928.

    Article  MathSciNet  Google Scholar 

  3. MAHDIAN B, SAIC S. Using noise inconsistencies for blind image forensics [J]. Image and Vision Computing, 2009, 27(10): 1497–1503.

    Article  Google Scholar 

  4. FARID H. A survey of image forgery detection [J]. IEEE Signal Processing Magazine, 2009, 26(2): 16–25.

    Article  Google Scholar 

  5. CAO Hong, KOT A C. Detection of tampering inconsistencies on mobile photos [C]// 9th International Workshop on Digital Water-marking, Seoul. Korea, 2010: 1–11.

  6. LI Wei-hai, YUAN Yuan, YU Neng-hai. Passive detection of doctored JPEG image via block artifact grid extraction [J]. Signal Processing, 2009, 89(9): 1821–1829.

    Article  MATH  Google Scholar 

  7. LUO Wei-qi, QU Zhen-hua, HUANG Ji-wu, QIU Guo-ping. A novel method for detecting cropped and recompressed image block [C]// IEEE International Conference on Acoustics, Speech and Signal Processing. Honolulu, Hawaii, USA, 2007: II-217–II-220.

  8. BARNI M, COSTANZO A, SABATINI L. Identification of cut & paste tampering by means of double-JPEG detection and image segmentation [C]// Proceedings of 2010 IEEE International Symposium on Circuits and Systems. Paris, France, 2010: 1687–1690.

  9. YE Shui-ming, SUN Qi-bin, CHANG Ee-Chien. Detecting digital image forgeries by measuring inconsistencies of blocking artifact [C]// IEEE International Conference on Multimedia and Expo. Beijing, China, 2007: 12–15.

  10. FU Dong-dong, SHI Y Q, SU Wei. A generalized Benford’s law for JPEG coefficients and its applications in image forensics [C]// Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents IX. San Jose, USA, 2007, 6505: 1L1–1L11.

    Google Scholar 

  11. LIN Zhou-chen, HE Jun-feng, TANG Xiao-ou, TANG Chi-Keung. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis [J]. Pattern Recognition, 2009, 42(11): 2492–2501.

    Article  MATH  Google Scholar 

  12. FRIDRICH J, SOUKAL D, LUKÁŠ J. Detection of copy-move forgery in digital images [C]// Proceedings of Digital Forensic Research Workshop. Cleveland, OH, USA, 2004.

  13. MAHDIAN B, SAIC S. Detection of copy-move forgery using a method based on blur moment invariants [J]. Forensic Science International, 2007, 171(2): 180–189.

    Article  Google Scholar 

  14. SHIH F Y, YUAN Yuan. A comparison study on copy-cover image forgery detection [J]. The Open Artificial Intelligence Journal, 2010, 4: 49–54.

    Article  Google Scholar 

  15. BAYRAM S, SENCAR H T, MEMON N. An efficient and robust method for detecting copy-move forgery [C]// IEEE International Conference Acoustics, Speech and Signal Processing. Taipei, Taiwan, 2009: 1053–1056.

  16. HUANG Yan-ping, LU Wei, SUN Wei, LONG Dong-yang. Improved DCT-based detection of copy-move forgery in images [J]. Forensic Science International, 2011, 206(1/2/3): 178–184.

    Article  Google Scholar 

  17. LUO Wei-qi, HUANG Ji-wu, QIU Guo-ping. JPEG error analysis and its applications to digital image forensics [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3): 480–491.

    Article  Google Scholar 

  18. WANG Wei, DONG Jing, TAN Tie-niu. Tampered region localization of digital color images based on JPEG compression noise [J]. Lecture Notes in Computer Science, 2011, 6526: 121–135.

    Article  Google Scholar 

  19. JOHNSON M K, FARID H. Exposing digital forgeries in complex lighting environments [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 450–461.

    Article  Google Scholar 

  20. FARID H. Exposing digital forgeries from JPEG ghosts [J]. IEEE Transactions on Information Forensics and Security, 2009, 4(1): 154–160.

    Article  MathSciNet  Google Scholar 

  21. POPESCU A C, FARID H. Exposing digital forgeries by detecting traces of resampling [J]. IEEE Transactions on Signal Processing, 2005, 53(2): 758–767.

    Article  MathSciNet  Google Scholar 

  22. LUKAS J, FRIDRICH J. Estimation of primary quantization matrix in double compressed JPEG images [C]// Proceedings of Digital Forensic Research Workshop. Cleveland, OH, USA, 2003: 5–8.

  23. LI Bin, SHI Y Q, HUANG Ji-wu. Detecting doubly compressed JPEG images by using mode based first digit features [C]// IEEE International Workshop on Multimedia Signal Processing. Queensland, Australia, 2008: 730–735.

  24. POPESCU A C. Statistical tools for digital image forensics [D]. New Hampshire: Dartmouth College, USA, 2005.

    Google Scholar 

  25. OLMOS A, KINGDOM F A. McGill Calibrated Colour Image Database. http://tabby.vision.mcgill.ca, 2004.

  26. SCHAEFER G, STICH M. UCID — An uncompressed colour image database [R]. Technical Report, School of Computing and Mathematics, Nottingham Trent University, U.K., 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-qian Zhao  (赵于前).

Additional information

Foundation item: Project(61172184) supported by the National Natural Science Foundation of China; Project(200902482) supported by China Postdoctoral Science Foundation Specially Funded Project; Project(12JJ6062) supported by the Natural Science Foundation of Hunan Province, China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, Xh., Zhao, Yq., Liao, M. et al. Passive detection of copy-paste forgery between JPEG images. J. Cent. South Univ. 19, 2839–2851 (2012). https://doi.org/10.1007/s11771-012-1350-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-012-1350-5

Key words

Navigation