Browse > Article
http://dx.doi.org/10.3837/tiis.2015.09.026

Detection for Operation Chain: Histogram Equalization and Dither-like Operation  

Chen, Zhipeng (Institute of Information Science, & Beijing Key Laboratory of Advanced Information Science and Network Technology)
Zhao, Yao (Institute of Information Science, & Beijing Key Laboratory of Advanced Information Science and Network Technology)
Ni, Rongrong (Institute of Information Science, & Beijing Key Laboratory of Advanced Information Science and Network Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.9, 2015 , pp. 3751-3770 More about this Journal
Abstract
Many sorts of image processing software facilitate image editing and also generate a great number of doctored images. Forensic technology emerges to detect the unintentional or malicious image operations. Most of forensic methods focus on the detection of single operations. However, a series of operations may be used to sequentially manipulate an image, which makes the operation detection problem complex. Forensic investigators always want to know as much exhaustive information about a suspicious image's entire processing history as possible. The detection of the operation chain, consisting of a series of operations, is a significant and challenging problem in the research field of forensics. In this paper, based on the histogram distribution uniformity of a manipulated image, we propose an operation chain detection scheme to identify histogram equalization (HE) followed by the dither-like operation (DLO). Two histogram features and a local spatial feature are utilized to further determine which DLO may have been applied. Both theoretical analysis and experimental results verify the effectiveness of our proposed scheme for both global and local scenarios.
Keywords
Digital forensics; operation chain detection; histogram equalization; dither-like operation;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Q. Liu, X. Cao, C. Deng, X. Guo., “Identifying image composites through shadow matte consistency,” Information Forensics and Security, IEEE Transactions on 2011, 6(3): 1111-1122. Article (CrossRef Link).   DOI
2 J. Li, X. Li, B. Yang, X. Sun. “Segmentation-based Image Copy-move Forgery Detection Scheme,” Information Forensics and Security, IEEE Transactions on 10.3 (2015): 507-518. Article (CrossRef Link)   DOI
3 J. Yang, G. Zhu, J. Huang, X. Zhao. “Estimating JPEG compression history of bitmaps based on factor histogram,” Digital Signal Processing, 2015. Article (CrossRef Link).
4 M. C. Stamm and K. J. R. Liu, “Forensic detection of image manipulation using statistical intrinsic fingerprints,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492–506, Sep. 2010. Article (CrossRef Link).   DOI
5 X. Feng, Ingemar J. Cox and Gwenaël Doërr, “Normalized Energy Density-Based Forensic Detection of Resampled Images,” IEEE Transactions on Multimedia, 14:3(536-545), 2012. Article (CrossRef Link).   DOI
6 Matthias Kirchner and Jessica Fridrich, "On Detection of Median Filtering in Digital Images," in: SPIE Conference on Media Forensics and Security, San Jose, CA, 2010 2010,754110. Article (CrossRef Link).
7 G. Cao, Y. Zhao, R. Ni, L. Yu and H. Tian, “Forensic Detection of Median Filtering in Digital Images,” IEEE International Conference on Multimedia and Expo, Singapore, 2010. Article (CrossRef Link).
8 HD Yuan, "Identification of global histogram equalization by modeling gray-level cumulative distribution," IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP), pp.645-649, 2013. Article (CrossRef Link).
9 G. Cao, Y. Zhao, R. Ni, and H. Tian. "Anti-forensics of contrast enhancement in digital images," in Proc. of the 12th ACM workshop on Multimedia and security, pp. 25-34. ACM, 2010. Article (CrossRef Link).
10 Conotter, V., Comesaña, P., and Pérez-González, F., "Joint detection of full-frame linear filtering and JPEG compression in digital images," in Proc. of Information Forensics and Security (WIFS), 2013 IEEE International Workshop on. IEEE, 2013. Article (CrossRef Link).
11 T. Bianchi and A. Piva, "Reverse engineering of double JPEG compression in the presence of image resizing," in Proc. of 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 127-132, 2012. Article (CrossRef Link).
12 P. Ferrara, T. Bianchiy, A. De Rosaz, and A. Piva, "Reverse engineering of double compressed images in the presence of contrast enhancement," in Proc. of IEEE Workshop Multimedia Signal Process., Pula, Croatia, pp. 141-146, Sep./Oct. 2013. Article (CrossRef Link).
13 A. C. Gallagher, "Detection of linear and cubic interpolation in JPEG compressed images," in Proc. of the Canadian Conference on Computer and Robot Vision, pp. 65-72, May 2005. Article (CrossRef Link).
14 R. C. Gonzalez and R. E. Woods, Digital Image Processing. Boston, MA: Addison-Wesley, 2001.
15 H. Li, W. Luo, X. Qiu, J. Huang. “Identification of Image Operations Based on Steganalytic Features,” arXiv preprint arXiv:1503.04718 [cs.MM], 2015.
16 A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758–767, 2005. Article (CrossRef Link).   DOI
17 Conotter, V., Comesaña, P., and Pérez-González, F., “Forensic analysis of full-frame linearly filtered JPEG images,” International Conference on Image Processing (ICIP), 2013. Article (CrossRef Link).
18 C. Chang and C. Lin, "LIBSVM : a library for support vector machines," ACM Transactions on Intelligent Systems and Technology, 2:27:1 --27:27, 2011. Software available at http://www.csie.ntu.edu.tw/-cjlin/libsvm. Article (CrossRef Link).
19 M. C. Stamm, X Chu, K. J. Liu, "Forensically determining the order of signal processing operations," in Proc. Of 2013 IEEE International Workshop on Information Forensics and Security (WIFS), 2013. Article (CrossRef Link).
20 X. Hou, T. Zhang, G. Xiong, et al. “Forensics Aided Steganalysis of Heterogeneous Bitmap Images with Different Compression History,” KSII Transactions on Internet and Information Systems (TIIS), 6(8): 1926-1945, 2012. Article (CrossRef Link).   DOI
21 S. Bayram, I. Avcibas, B. Sankur, and N. Memon, “Image manipulation detection,” J. Electron. Imaging, vol. 15, no. 4, Dec. 2006. Article (CrossRef Link).   DOI
22 T. Ojala, M. Pietikainen, and T. Maenpaa, "Multiresolution Gray-Scale and Rotation Invariant Texture classification with Local Binary Patterns," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 24, pp. 971-987, 2002. Article (CrossRef Link).   DOI
23 Z. Xia, X. Wang, X. Sun, Q. Liu, N. Xiong. "Steganalysis of LSB matching using differences between nonadjacent pixels," Multimedia Tools and Applications (2014): 1-16. Article (CrossRef Link).
24 G. Schaefer and M. Stich, "UCID - An uncompressed color image database," in Proc. of SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, 2004. Article (CrossRef Link)