Browse > Article
http://dx.doi.org/10.3837/tiis.2014.02.008

Approximate Detection Method for Image Up-Sampling  

Tu, Ching-Ting (Department of Computer Science and Information Engineering Tamkang University)
Lin, Hwei-Jen (Department of Computer Science and Information Engineering Tamkang University)
Yang, Fu-Wen (Department of Computer Science and Information Engineering Tamkang University)
Chang, Hsiao-Wei (Department of Computer Science and Information Engineering China University of Science of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.2, 2014 , pp. 462-482 More about this Journal
Abstract
This paper proposes a new resampling detection method for images that detects whether an image has been resampled and recovers the corresponding resampling rate. The proposed method uses a given set of zeroing masks for various resampling factors to evaluate the convolution values of the input image with the zeroing masks. Improving upon our previous work, the proposed method detects more resampling factors by checking for some periodicity with an approximate detection mechanism. The experimental results demonstrate that the proposed method is effective and efficient.
Keywords
image forgery; copy-move; resampling rate; resampling factor; zeroing mask;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Cheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou, "Fast Forgery Detection with the Intrinsic Resampling Properties," Journal of Information Security, 2010, 1, pp. 11-22.   DOI
2 Y. T. Kao, H. J. Lin, C. W. Wang, and Y. C. Pai, "Effective Detection for Linear Up-Resampling by Factor of Fraction," IEEE Transactions on Image Processing, Vol. 21, Issue 8, pp. 3443-3453, August, 2012.   DOI   ScienceOn
3 Hwei-Jen Lin, Chun-Wei Wang, and Yang-Ta Kao, "Fast copy-move forgery detection," WSEAS Transactions on Signal Processing, Vol. 5, No. 5, pp. 188-197, 2009.
4 A. N. Myna, M. G. Venkateshmurthy, and C. G. Patil, "Detection of region duplication forgery in digital images using Wavelets and Log-Polar Mapping," in Proc. of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007), pp. 371-377, December 13-15, 2007.
5 Phen Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, Vol. 38, Issue 12, pp. 2519-2529, 2005.   DOI   ScienceOn
6 Ming-Shi Wang and Wei-Che Chen, "A majority-voting based watermarking scheme for color image tamper detection and recovery," Computer Standards & Interfaces, Vol. 29, No. 5, pp. 561-570, July 2007.   DOI   ScienceOn
7 M. K. Johnson and H. Farid, "Exposing digital forgeries through chromatic aberration," in Proc. of ACM Multimedia and Security Workshop, New York, 2006, pp. 48-55.
8 N. Khanna, A. K. Mikkilineni, G. T. C. Chiu, J. P. Allebach, and E. J. Delp, "Scanner identification using sensor pattern noise," in Proc. of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505, No. 1, pp. 65051K, 2007.
9 J. Lukas, J. Fridich, and M. Goljan, "Detecting digital image forgeries using sensor pattern noise," in Proc. of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, pp. 362-372, Vol. 6072, January 2006.
10 J. Lukas, J. Fridrich, and M. Goljan, "Determining digital image origin using sensor imperfections," in Proc. of SPIE Electronic Imaging, Image and Video Communication and Processing, pp. 249-260, January 16-20, 2005. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.6754
11 N. Khanna, G. T. C. Chiu, J. P. Allebach, and E. J. Delp, "Scanner identification with extension to forgery detection," in Proc. of SPIE Electronic Imaging, San Jose, CA, Vol. 6819, Feb. 2008.
12 E. S. Gopi, N. Lakshmanan, T. Gokul, S. KumaraGanesh, and P. R. Shah, "Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients," in Proc. of Electrical and Computer Engineering, 2006 Canadian Conference (CCECE'06), pp. 194-197, May 7-10, 2006.
13 A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Technical Report, TR2004-515, Dartmouth College, Computer Science 2004.
14 Guohui Li, Qiong Wu, Dan Tu, and Shaojie Sun, "A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD," in Proc. of IEEE International Conference on Multimedia and Expo., Beijing China, pp. 1750-1753, July 2-5, 2007.
15 Weiqi Luo, Jiwu Huang, and Guiping Qiu, "Robust detection of region-duplication forgery in digital image," in Proc. of the 18th International Conference on Pattern Recognition, Vol. 4, 2006, pp. 746-749.
16 A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Transactions on Signal Processing, Vol. 53, pp. 758-767, 2005.   DOI   ScienceOn
17 M. Kirchner, "Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue," in Proc. of ACM Multimedia and Security Workshop, pp. 11-20, 2008.
18 Peter Nillius and Jan-Olof Eklundh, "Automatic estimation of the projected light source direction," in Proc. of 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Vol. 1, pp. 1076-1083, 2001.
19 M. K. Johnson and H. Farid, "Exposing digital forgeries by detecting inconsistencies in lighting," in Proc. of ACM Multimedia and Security Workshop, New York, pp. 1-9, 2005.
20 Kwang-Fu Li, Tung-Shou Chen, and Seng-Cheng Wu, "Image tamper detection and recovery system based on Discrete Wavelet Transformation," in Proc. of 2001 IEEE Pacific Rim Conference on Intelligent Conference Communications, Computers and Signal Processing, pp. 26-28, Vol. 1, 2001.