Skip to main content

A PNU-Based Technique to Detect Forged Regions in Digital Images

  • Conference paper
  • First Online:
Advanced Concepts for Intelligent Vision Systems (ACIVS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 9386))

Abstract

In this paper we propose a non-blind passive technique for image forgery detection. Our technique is a variant of a method presented in [8] and it is based on the analysis of the Sensor Pattern Noise (SPN). Its main features are the ability to detect small forged regions and to run in an automatic way. Our technique works by extracting the SPN from the image under scrutiny and, then, by correlating it with the reference SPN of a target camera. The two noises are partitioned into non-overlapping blocks before evaluating their correlation. Then, a set of operators is applied on the resulting Correlations Map to highlight forged regions and remove noise spikes. The result is processed using a multi-level segmentation algorithm to determine which blocks should be considered forged. We analyzed the performance of our technique by using a dataset of 4, 000 images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cattaneo, G., Faruolo, P., Ferraro Petrillo, U.: Experiments on improving sensor pattern noise extraction for source camera identification. In: Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 609–616. IEEE (2012)

    Google Scholar 

  2. Cattaneo, G., Roscigno, G.: A possible pitfall in the experimental analysis of tampering detection algorithms. In: 17th International Conference on Network-Based Information Systems (NBiS), pp. 279–286 (2014)

    Google Scholar 

  3. Cattaneo, G., Roscigno, G., Ferraro Petrillo, U.: Experimental evaluation of an algorithm for the detection of tampered JPEG images. In: Linawati, Mahendra, M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) ICT-EurAsia 2014. LNCS, vol. 8407, pp. 643–652. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  4. Cattaneo, G., Roscigno, G., Ferraro Petrillo, U.: A scalable approach to source camera identification over Hadoop. In: IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp. 366–373. IEEE (2014)

    Google Scholar 

  5. Chen, M., Fridrich, J., Lukáš, J., Goljan, M.: Imaging sensor noise as digital X-ray for revealing forgeries. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 342–358. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Chen, M., Fridrich, J., Goljan, M., Lukáš, J.: Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 3(1), 74–90 (2008)

    Google Scholar 

  7. Chierchia, G., Cozzolino, D., Poggi, G., Sansone, C., Verdoliva, L.: Guided filtering for PRNU-based localization of small-size image forgeries. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2014, pp. 6231–6235. IEEE (2014)

    Google Scholar 

  8. Fridrich, J., Goljan, M., Lukáš, J.: Detecting digital image forgeries using sensor pattern noise. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII. 6072, 1–11 (2006)

    Google Scholar 

  9. Fridrich, J., Goljan, M., Lukáš, J.: Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1(2), 205–214 (2006)

    Article  Google Scholar 

  10. Haralick, R.M., Sternberg, S.R., Zhuang, X.: Image analysis using mathematical morphology. IEEE Transactions on Pattern Analysis and Machine Intelligence 9(4), 532–550 (1987)

    Article  Google Scholar 

  11. Lin, Z., He, J., Tang, X., Tang, C.K.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition 42(11), 2492–2501 (2009)

    Article  MATH  Google Scholar 

  12. Otsu, N.: A threshold selection method from gray-level histograms. Automatica 11(285–296), 23–27 (1975)

    Google Scholar 

  13. Redi, J.A., Taktak, W., Dugelay, J.L.: Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1), 133–162 (2011)

    Article  Google Scholar 

  14. Sokolova, M.V., Japkowicz, N., Szpakowicz, S.: Beyond accuracy, F-Score and ROC: A family of discriminant measures for performance evaluation. In: Sattar, A., Kang, B.-H. (eds.) AI 2006. LNCS (LNAI), vol. 4304, pp. 1015–1021. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Yadav, P., Yadav, A.: Digital Image Processing. University Science Press, New Delhi (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gianluca Roscigno .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Cattaneo, G., Ferraro Petrillo, U., Roscigno, G., De Fusco, C. (2015). A PNU-Based Technique to Detect Forged Regions in Digital Images. In: Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D., Scheunders, P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2015. Lecture Notes in Computer Science(), vol 9386. Springer, Cham. https://doi.org/10.1007/978-3-319-25903-1_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25903-1_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25902-4

  • Online ISBN: 978-3-319-25903-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics