DOI QR코드

DOI QR Code

재보간의 특성을 이용한 디지털 이미지의 합성 영역 및 필터링 영역 검출

Detection of Forged Regions and Filtering Regions of Digital Images Using the Characteristics of Re-interpolation

  • 황민구 (중앙대학교 첨단영상대학원) ;
  • 하동환 (중앙대학교 첨단영상대학원)
  • 투고 : 2011.08.29
  • 심사 : 2011.11.22
  • 발행 : 2012.02.29

초록

디지털 합성 이미지는 이미지가 담고 있는 진정성을 왜곡하기 때문에 사회적인 문제가 되고 있다. 이러한 디지털 합성 이미지들은 인터넷, 잡지 또는 정치적 광고를 위한 이미지들에서 흔히 볼 수 있다. 이러한 왜곡된 매체들은 이미지가 담고 있는 정보에 대한 신뢰도를 떨어트릴 수 있다. 본 논문에서는 이와 같이 대중에게 전달되는 정보의 혼란을 예방하기 위한 연구로써 디지털 합성 이미지를 판독하는데 목적이 있다. 대부분의 합성 이미지들은 이미지 크기 조절 및 회전을 이용하는 방법을 사용하기 때문에 합성 영역에 보간 (Interpolation)이 적용되게 된다. 본 논문은 보간의 흔적을 검출하는 연구로써 이미 보간이 적용된 영역과 그렇지 않은 영역에 재보간을 적용하여 두 영영간의 주파수 패턴을 검출하는 실험을 하였다. 이를 통해 합성에 사용된 보간 흔적을 검출하였으며 이미지 리터칭에 사용된 필터링 영역도 검출할 수 있었다.

Digital image forgery is becoming a topic of great interest with regard to honesty in imaging. We can often see forged digital images in a variety of places, such as the internet, and magazines, and in images used in political ads, etc. These can reduce the reliability and factual basis of the information contained in image. Therefore, objectivity is needed to determine if the image is forged so as to prevent confusion in the viewing public. Most digital forgeries consist of image resizing, rotating including the following interpolations. To find evidence of interpolation in forged images, this paper proposes a new method for detecting digital image forgery using general interpolation factors analyzed through re-interpolation algorithm of the forged images in order to determine the differences in the patterns. Through the re-interpolation algorithm we could detect the forged region and filtering region used image retouching included to interpolation.

키워드

참고문헌

  1. J. Fridrich, D. Soukal, and J. Lukas, "Detection of Copy-Move Forgery in Digital Images," Proceedings of Digital Forensic Research Workshop August, pp. 90-105, 2003.
  2. A.C. Popescu and H. Farid, "Exposing Digital Forgeries by Detecting Duplicated Image Regions," Department of Computer Science. Dartmouth College, Tech. Rep. TR2004-515, 2004.
  3. B. Mahdian and S. Saic, "Detection of Copy- Move Forgery using a Method Based on Blur Moment Invariants," Forensic Science International, Vol.171, No.2-3, pp. 180-189, 2007. https://doi.org/10.1016/j.forsciint.2006.11.002
  4. H. Farid, "Detecting Digital Forgeries using Bispectral Analysis," AL Lab, Mas-sachusetts Institute id Technology, Tech. Rep. AIM-1657, 1999.
  5. T.T. Ng, S.F. Chang and Q. Sun, "Blind Detection of Photomontage using Higher Order Statistics," IEEE International Symposium on Circuits and Systems, Vol.5, pp. 688-691, 2004.
  6. T.T. Ng and S.F. Chang, "A Model for Image Splicing," IEEE International Conference on Image Processing, Vol.2, pp. 1169-1172, 2004.
  7. H. Farid, "Exposing Digital Forgeries in Color Filter Array Interpolated Images," IEEE Transactions on Signal Processing, Vol.53, No.10, pp. 3948-3959, 2005. https://doi.org/10.1109/TSP.2005.855406
  8. J. Lukas, J. Fridrich, and M. Goljan, "Detecting Digital Image Forgeries using Sensor Pattern Noise," Proceedings of the SPIE, Vol. 6072, 1-11, 2006.
  9. H. Gou, A. Swaminathan, and M. Wu, "Noise Features for Image Tampering Detection and Steganalysis," Proceedings of IEEE International Conference Imaging Processing, Vol.6, pp. 97-100, 2007.
  10. M.K. Johnson and H. Farid, "Exposing Digital Forgeries Through Chromatic Aberration," ACM Multimedia and Security Workshop, pp. 48-55, 2006.
  11. H. Farid, "Exposing Digital Forgeries in Complex Lighting Environments," IEEE Transactions on Information Forensics and Security, Vol.2, No.3, pp. 450-461, 2007. https://doi.org/10.1109/TIFS.2007.903848
  12. M.K. Johnson and H. Farid, "Exposing Digital Forgeries Through Specular Highlights on the Eye." The 9th International Workshop on Information Hiding, pp. 311-325, 2007.
  13. M.K. Johnson and H. Farid, "Exposing Digital Forgeries by Detecting Inconsistencies in Lighting," Proceedings of ACM Multimedia and Security Workshop, pp. 1-10, 2005.
  14. A.C. Popescu and H. Farid, "Exposing Digital Forgeries from JPEG Ghosts," IEEE Transactions on Information Forensic and Security, Vol.4, No.1, pp. 154-160, 2009. https://doi.org/10.1109/TIFS.2008.2012215
  15. A.C. Popescu and H. Farid, "Exposing Digital Forgeries by Detecting Traces of Re-Sampling," IEEE Transactions on Signal Processing, Vol.53, No.2, pp. 758-767, 2005. https://doi.org/10.1109/TSP.2004.839932
  16. M. Kirchner and T. Gloe, "On Sampling Detection in Re-Compressed Images," Proceedings of IEEE International Workshop on Information Forensics and Security, pp. 21-25, 2009.
  17. A.C. Popescu and H. Farid, "Statistical Tools for Digital Forensic," The 6th International Workshop on Information Hiding, pp. 128- 147, 2004.
  18. A.C. Gallafher, "Detection of Linear and Cubic Interpolation in JPEG Compressed Images," The 2nd Canadian Conference on Computer and Robot Vision, pp. 65-72, 2005.
  19. S. Prasad and K.R. Ramakrishnan, "One- Sampling Detection and Its Application to Image Tampering," Proceeding of the IEEE International Conference on Multimedia and Expo, pp. 1325-1328, 2006.
  20. B. Mahdian and S. Saic, "Blind Authentication using Periodic Properties of Interpolation," IEEE Transactions on Information Forensics and Security, Vol.3, No.3, pp. 529-538, 2008. https://doi.org/10.1109/TIFS.2004.924603
  21. B. Mahdian and S. Saic, "Blind Methods for Detecting Image Fakery," IEEE International Carnahan Conference on Security Technology, pp. 280-286, 2008.
  22. G.S. Song, Y.I. Yun, and W.H. Lee, "Analysis on Digital Image Composite Using Interpolation," Journal of Korea Multimedia Society, Vol.13, No.3, pp. 457-466, 2010.
  23. G.S. Song, Y.I. Yun, and W.H. Lee, "Detection of Digital Forgeries for the Filtering Images," AURA: The Society of Korean Photography, Vol.22, pp. 37-45, 2010.

피인용 문헌

  1. Identification Method of Geometric and Filtering Change Regions in Modified Digital Images vol.15, pp.11, 2012, https://doi.org/10.9717/kmms.2012.15.11.1292