• Title/Summary/Keyword: Forgery detection

Search Result 80, Processing Time 0.027 seconds

Forgery Detection Scheme Using Enhanced Markov Model and LBP Texture Operator in Low Quality Images (저품질 이미지에서 확장된 마르코프 모델과 LBP 텍스처 연산자를 이용한 위조 검출 기법)

  • Agarwal, Saurabh;Jung, Ki-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1171-1179
    • /
    • 2021
  • Image forensic is performed to check image limpidness. In this paper, a robust scheme is discussed to detect median filtering in low quality images. Detection of median filtering assists in overall image forensic. Improved spatial statistical features are extracted from the image to classify pristine and median filtered images. Image array data is rescaled to enhance the spatial statistical information. Features are extracted using Markov model on enhanced spatial statistics. Multiple difference arrays are considered in different directions for robust feature set. Further, texture operator features are combined to increase the detection accuracy and SVM binary classifier is applied to train the classification model. Experimental results are promising for images of low quality JPEG compression.

Forensic Classification of Median Filtering by Hough Transform of Digital Image (디지털 영상의 허프 변환에 의한 미디언 필터링 포렌식 분류)

  • RHEE, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.5
    • /
    • pp.42-47
    • /
    • 2017
  • In the distribution of digital image, the median filtering is used for a forgery. This paper proposed the algorithm of a image forensics detection for the classification of median filtering. For the solution of this grave problem, the feature vector is composed of 42-Dim. The detected quantity 32, 64 and 128 of forgery image edges, respectively, which are processed by the Hough transform, then it extracted from the start-end point coordinates of the Hough Lines. Also, the Hough Peaks of the Angle-Distance plane are extracted. Subsequently, both of the feature vectors are composed of the proposed scheme. The defined 42-Dim. feature vector is trained in SVM (Support Vector Machine) classifier for the MF classification of the forged images. The experimental results of the proposed MF detection algorithm is compared between the 10-Dim. MFR and the 686-Dim. SPAM. It confirmed that the MF forensic classification ratio of the evaluated performance is 99% above with the whole test image types: the unaltered, the average filtering ($3{\times}3$), the JPEG (QF=90 and 70)) compression, the Gaussian filtered ($3{\times}3$ and $5{\times}5$) images, respectively.

Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks

  • Deng, Jiehang;Yang, Jixiang;Weng, Shaowei;Gu, Guosheng;Li, Zheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4467-4486
    • /
    • 2018
  • Trying to deal with the problem of low robustness of Copy-Move Forgery Detection (CMFD) under various transformation and degradation attacks, a novel CMFD method is proposed in this paper. The main advantages of proposed work include: (1) Discrete Analytical Fourier-Mellin Transform (DAFMT) and Locality Sensitive Hashing (LSH) are combined to extract the block features and detect the potential copy-move pairs; (2) The Euclidian distance is incorporated in the pixel variance to filter out the false potential copy-move pairs in the post-verification step. In addition to extracting the effective features of an image block, the DAMFT has the properties of rotation and scale invariance. Unlike the traditional lexicographic sorting method, LSH is robust to the degradations of Gaussian noise and JEPG compression. Because most of the false copy-move pairs locate closely to each other in the spatial domain or are in the homogeneous regions, the Euclidian distance and pixel variance are employed in the post-verification step. After evaluating the proposed method by the precision-recall-$F_1$ model quantitatively based on the Image Manipulation Dataset (IMD) and Copy-Move Hard Dataset (CMHD), our method outperforms Emam et al.'s and Li et al.'s works in the recall and $F_1$ aspects.

Efficient Markov Feature Extraction Method for Image Splicing Detection (접합영상 검출을 위한 효율적인 마코프 특징 추출 방법)

  • Han, Jong-Goo;Park, Tae-Hee;Eom, Il-Kyu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.111-118
    • /
    • 2014
  • This paper presents an efficient Markov feature extraction method for detecting splicing forged images. The Markov states used in our method are composed of the difference between DCT coefficients in the adjacent blocks. Various first-order Markov state transition probabilities are extracted as features for splicing detection. In addition, we propose a feature reduction algorithm by analysing the distribution of the Markov probability. After training the extracted feature vectors using the SVM classifier, we determine whether the presence of the image splicing forgery. Experimental results verify that the proposed method shows good detection performance with a smaller number of features compared to existing methods.

A Study on Forgery Techniques of Smartphone Voice Recording File Structure and Metadata (스마트폰 음성녹음 파일 구조 및 메타데이터의 위변조 기법에 관한 연구)

  • Park, Jae Wan;Kwak, Won Jun;Lee, John Sanghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.807-812
    • /
    • 2022
  • Recently, as the number of voice recording files submitted as court evidence increases, the number of cases claiming forgery is also increasing. If the audio recording file structure and metadata, which are objective grounds, are completely forged, it is actually impossible to detect forgery of the sophisticated audio recording file. It is extremely rare for the court to reject the file structure and metadata analysis performed with the forged audio recording file. The purpose of this study is to prove that forgery of voice recording file structure and metadata is easily possible. To this end, in this study, it was introduced that forgery detection is impossible when the 'mixed paste' function, which enables sophisticated editing based on the typification of the editing method of voice recording files, is applied. Moreover, it has been proven through experiments that forgery of file structure and metadata is possible. Therefore, a stricter standard for judging the admissibility of evidence is required when the audio recording file is adopted as digital evidence. This study will not only contribute to the standard of integrity in the adoption of digital evidence by judges, but will also contribute to the method of constructing a dataset for artificial intelligence in detecting forgery of recorded files that is expected to be developed in the future.

BubbleDoc: Document Forgery and Tamper Detection through the Agent-Free File System-Awareness in Cloud Environment (BubbleDoc: 클라우드 환경에서의 agent-free 파일시스템 분석을 통한 문서 위/변조 탐지)

  • Jeon, Woo-Jin;Hong, Dowon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.429-436
    • /
    • 2018
  • Electronic documents are efficient to be created and managed, but they are liable to lose their originality because copies are created during distribution and delivery. For this reason, various security technologies for electronic documents have been applied. However, most security technologies currently used are for document management such as file access privilege control, file version and history management, and therefore can not be used in environments where authenticity is absolutely required, such as confidential documents. In this paper, we propose a method to detect document forgery and tampering through analysis of file system without installing an agent inside the instance operating system in cloud computing environment. BubbleDoc monitors the minimum amount of virtual volume storage in an instance, so it can efficiently detect forgery and tampering of documents. Experimental results show that the proposed technique has 0.16% disk read operation overhead when it is set to 1,000ms cycle for monitoring for document falsification and modulation detection.

Compression history detection for MP3 audio

  • Yan, Diqun;Wang, Rangding;Zhou, Jinglei;Jin, Chao;Wang, Zhifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.662-675
    • /
    • 2018
  • Compression history detection plays an important role in digital multimedia forensics. Most existing works, however, mainly focus on digital image and video. Additionally, the existed audio compression detection algorithms aim to detect the trace of double compression. In real forgery scenario, multiple compression is more likely to happen. In this paper, we proposed a detection algorithm to reveal the compression history for MP3 audio. The statistics of the scale factor and Huffman table index which are the parameters of MP3 codec have been extracted as the detecting features. The experimental results have shown that the proposed method can effectively identify whether the testing audio has been previously treated with single/double/triple compression.

A Liveness Detection for Face Recognition System with Infrared Image (적외선 영상을 사용한 얼굴 인식 시스템에서의 위, 변조 영상 판별)

  • Kang, Ji-Woon;Cho, Sung-Won;Chung, Sun-Tae;Kim, Sang-Hoon;Chang, Un-Dong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2008.04a
    • /
    • pp.429-431
    • /
    • 2008
  • 생체 인식 기술이 사회 전반에 걸쳐 다양하게 사용되어짐에 따라 인식기술 중의 하나인 Face Recognition 은 하루가 다르게 발전하고 있다. 하지만, 그와 함께 해킹방법도 다양화되어지고 있다. 그럼에도 불구하고, 위, 변조 영상 판별(Liveness Detection) 분야에 관련된 연구들은 초기 단계를 벗어나지 못하고 있다. 본 논문에서는 적외선 영상을 이용하여 동공부분의 반사 정도를 이용하여 실제 이미지와 위, 변조 이미지를 판별하는 방법을 제안한다.

  • PDF

Selective Feature Extraction Method Between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection (접합 영상 검출을 위한 마르코프 천이 확률 및 동시발생 확률에 대한 선택적 특징 추출 방법)

  • Han, Jong-Goo;Eom, Il-Kyu;Moon, Yong-Ho;Ha, Seok-Wun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.833-839
    • /
    • 2016
  • In this paper, we propose a selective feature extraction algorithm between Markov transition probability and co-occurrence probability for an effective image splicing detection. The Features used in our method are composed of the difference values between DCT coefficients in the adjacent blocks and the value of Kullback-Leibler divergence(KLD) is calculated to evaluate the differences between the distribution of original image features and spliced image features. KLD value is an efficient measure for selecting Markov feature or Co-occurrence feature because KLD shows non-similarity of the two distributions. After training the extracted feature vectors using the SVM classifier, we determine whether the presence of the image splicing forgery. To verify our algorithm we used grid search and 6-folds cross-validation. Based on the experimental results it shows that the proposed method has good detection performance with a limited number of features compared to conventional methods.

Approximate Detection Method for Image Up-Sampling

  • Tu, Ching-Ting;Lin, Hwei-Jen;Yang, Fu-Wen;Chang, Hsiao-Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.462-482
    • /
    • 2014
  • This paper proposes a new resampling detection method for images that detects whether an image has been resampled and recovers the corresponding resampling rate. The proposed method uses a given set of zeroing masks for various resampling factors to evaluate the convolution values of the input image with the zeroing masks. Improving upon our previous work, the proposed method detects more resampling factors by checking for some periodicity with an approximate detection mechanism. The experimental results demonstrate that the proposed method is effective and efficient.