Skip to main content

A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix

  • Conference paper
  • First Online:
  • 2566 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Abstract

Seam carving is a popular content-aware image retargeting technique. However, it can also be used for malicious purposes such as object removal. In this paper, a robust blind forensics approach is proposed for seam-carved forgery detection. Since insignificant pixels along seams are removed for image resizing, the spatial neighborhood relations among pixels will be significantly changed, especially in smooth regions. Thus, joint density is exploited to model the change of spatially adjacent pixels’ distribution caused by seam carving, even in the case of low scaling ratios. Specifically, three-element joint density of difference matrix is computed to form general forensics features (GTJD). The GTJD features are combined with existing energy and noise features exacted in LBP domain for classification. Experimental results show that the proposed approach achieves better accuracies for both uncompressed images and JPEG images with different scaling ratios.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015)

    Article  Google Scholar 

  2. Li, C., Ma, Q., Xiao, L.: Image splicing detection based on Markov features in QDCT domain. Neurocomputing 228, 29–36 (2017)

    Article  Google Scholar 

  3. Avidan, S., Shamir, A.: Seam carving for content-aware image resizing. ACM Trans. Graph. (TOG) 26(3), 10–16 (2007)

    Article  Google Scholar 

  4. Fillion, C., Sharma, G.: Detecting content adaptive scaling of images for forensic application. In: Media Forensics and Security, p. 75410Z (2010)

    Google Scholar 

  5. Wei, J.D., Lin, Y.J., Wu, Y.J.: A patch analysis method to detect seam carved images. Pattern Recogn. Lett. 36, 100–106 (2014)

    Article  Google Scholar 

  6. Ryu, S.J., Lee, H.Y., Lee, H.K.: Detecting trace of seam carving for forensic analysis. IEICE Trans. Inf. Syst. 97(5), 1304–1311 (2014)

    Article  Google Scholar 

  7. Yin, T., Yang, G., Li, L.: Detecting seam carving based image resizing using local binary patterns. Comput. Secur. 55, 130–141 (2015)

    Article  Google Scholar 

  8. Ye, J., Shi, Y.-Q.: A local derivative pattern based image forensic framework for seam carving detection. In: Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. (eds.) IWDW 2016. LNCS, vol. 10082, pp. 172–184. Springer, Cham (2017). doi:10.1007/978-3-319-53465-7_13

    Chapter  Google Scholar 

  9. Sarkar, A., Nataraj, L., Manjunath, B.S.: Detection of seam carving and localization of seam insertions in digital images. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 107–116 (2009)

    Google Scholar 

  10. Liu, Q., Chen, Z.: Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images. ACM Trans. Intelligent Syst. Technol. 5(4), 63–93 (2015)

    Google Scholar 

  11. Wattanachote, K., Shih, T.K., Chang, W.L.: Tamper detection of JPEG image due to seam modifications. IEEE Trans. Inf. Forensics Secur. 10(12), 2477–2491 (2015)

    Article  Google Scholar 

  12. Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)

    Article  Google Scholar 

  13. LibSVM: a library for support vector machines. http://www.csie.ntu.edu.tw/cjlin/libsvm

  14. Schaefer, G., Stich, M.: UCID: an uncompressed color image database. Storage Retrieval Methods Appl. Multimedia 5307, 472–480 (2004)

    Google Scholar 

  15. Xia, Z., Wang, X., Sun, X., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947–1962 (2016)

    Article  Google Scholar 

  16. Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported in part by the National Natural Science Foundation of China (61572183, 61379143, 61672222), the Specialized Research Fund for the Doctoral Program of Higher Education (SRFDP) under grant 20120161110014, the Priority Academic Program Development of Jiangsu Higer Education Institutions (PAPD) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaobo Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gu, W., Yang, G., Zhang, D., Xia, M. (2017). A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics