Skip to main content

Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

Abstract

Currently, many forensic techniques have been developed to determine which processing operations were used to tamper multimedia contents. Determining the order of these operations, however, remains an open challenge. It is important to detect image operation order, because we can obtain the complete processing history of multimedia content, and even identify who manipulated the multimedia content and when it was manipulated. In this paper, we investigate the detection for the order of contrast enhancement and resizing. Two new algorithms are proposed to detect contrast enhancement and resizing respectively. We use the SVM to extract fingerprint of digital images and then detect the image operation of resizing and contrast enhancement. Experimental results show that the average classification accuracy of the proposed method is 88.97%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stamm, M., Wu, M., Liu, K.: Information forensics: an overview of the first decade. IEEE Access 1, 167–200 (2013)

    Article  Google Scholar 

  2. Bianchi, T., Piva, A.: Reverse engineering of double JPEG compression in the presence of image resizing. In: IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, pp. 127–132 (2012)

    Google Scholar 

  3. Huang, F., Huang, J., Shi, Y.: Detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Forensics Secur. 5(4), 848–856 (2014)

    Article  Google Scholar 

  4. Stamm, M., Liu, K.: Blind forensics of contrast enhancement in digital images. In: 15th IEEE International Conference on Image Processing, San Diego, CA, USA, pp. 3112–3115, October 2008

    Google Scholar 

  5. Stamm, M., Liu, K.: Forensic estimation and reconstruction of a contrast enhancement mapping. In: IEEE International Conference on Acoustics Speech and Signal Processing, Dallas, TX, USA, pp. 1698–1701, March 2010

    Google Scholar 

  6. Cao, G., Zhao, Y., Ni, R.: Forensic estimation of gamma correction in digital images. IN: 17th IEEE International Conference on Image Processing, Hong Kong, China, pp. 2097–2100, September 2010

    Google Scholar 

  7. Cao, G., Zhao, Y., Ni, R., et al.: Contrast enhancement-based forensics in digital images. IEEE Trans. Inf. Forensics Secur. 9(3), 515–525 (2014)

    Article  Google Scholar 

  8. Popescu, A., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Sig. Process. 53(2), 758–767 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  9. Kirchner, M.: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: 10th ACM Workshop on Multimedia and Security, Oxford, United Kingdom, pp. 11–20 (2008)

    Google Scholar 

  10. Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. In: Media Forensics and Security II, February 2010

    Google Scholar 

  11. Su, B., Lu, S., Tan, C.: Blurred image region detection and classification. In: 19th ACM International Conference on Multimedia, Scottsdale, AZ, USA, pp. 1397–1400, November 2011

    Google Scholar 

  12. Cao, G., Zhao, Y., Ni, R.: Edge-based blur metric for tamper detection. J. Inf. Hiding Multimedia Sig. Process. 1(1), 20–27 (2010)

    Google Scholar 

  13. Ferrara, P., Bianchi, T., Rosa, A., et al.: Reverse engineering of double compressed images in the presence of contrast enhancement. In: 15th IEEE International Workshop on Multimedia Signal Processing, Pula, Italy, pp. 141–146 (2013)

    Google Scholar 

  14. Chu, X., Chen, Y., Liu, K.J.R.: Detectability of the order of operations: an information theoretic approach. IEEE Trans. Inf. Forensics Secur. 11, 823–856 (2016)

    Article  Google Scholar 

  15. Schaefer, G.: UCID: an uncompressed color image database. Storage Retr. Methods Appl. Multimedia 5307, 472–480 (2004)

    Google Scholar 

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (Grant Nos. 61402162, 61472129, 61572182, 61370225, 61472131, 61272546), Hunan Provincial Natural Science Foundation of China (Grant No. 2017JJ3040), Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK201605), Science and Technology Key Projects of Hunan Province (Grant Nos. 2015TP1004, 2016JC2012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Liao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, S., Liao, X., Guo, S., Li, X., Vijayakumar, P. (2017). Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_52

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics