Abstract
With the advent of digital technology, digital image has gradually taken the place of the original analog photograph, and the forgery of digital image has become more and more easy and indiscoverable. Image splicing is a commonly used technique in image tampering. In this paper, we simply introduce the definition of image splicing and some methods of image splicing detection, mainly including the detection based on steganalysis model, the detection based on Hilbert-Huang transform (HHT) and moments of characteristic functions (CF) with wavelet decomposition. We focus on discussing our proposed approach based on image quality metrics (IQMs) and moment features. Especially we analyze the model creation and the extraction of features in digital image. In addition, we compare these approaches and analyze the future works of digital image forensics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fu, D.D., Shi, Y.Q., Su, W.: Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition approach, http://www.springerlink.com/index/fp36p770x04r9301.pdf
Chen, C., Shi, Y.Q.: Steganalyzing Texture Images. IEEE ICIP (2007)
Shi, Y.Q., Xuan, G., Zou, D., Gao, J., Yang, C., Zhang, Z., Chai, P., Chen, W., Chen, C.: Steganalysis Based on Moments of Characteristic Functions using Wavelet Decomposition, Prediction-error image, and Neural Network. In: IEEE ICME (2005)
Avcibas, I., Sankur, B., Sayood, K.: Statistical Analysis of Image Quality Measures. Journal of Electronic Imaging 11(4), 206–223 (2002)
Avcibas, I., Memon, N., Sankure, B.: Steganalysis using Image Quality Metrics. IEEE Trans. Image Processing 12(2), 221–229 (2003)
Columbia Image Splicing Detection Evaluation Dataset, DVMM, Columbia University, http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm
Alin, C.P., Hany, F.: Exposing Digital Forgeries by Detecting Duplicated Image Regions, http://www.cs.dartmouth.edfarid/pub1ications / tr04.pdf
Chang, C.C., Lin, C.J.: LIBSVM – a library for support vector machines (2008), http://www.csie.ntu.edu.tw/~cjlin/libsvm/index.html
Jessica, F., David, S., Jan, L.: Detection of Copy-Move Forgery in Digital Images. In: Proceedings of Digital Forensic Research Workshop, Cleveland, OH (2003)
Johnson, M.K., Farid, H.: Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In: ACM Multimedia and Security Workshop, New York, NY (2005)
Wang, Y.X.: Talking about the Original Examination of the Static Picture. Journal of Sichuan Police College 18(1) (February 2006)
Ng, T.T., Chang, S.F.: Blind Detection of Photomontage Using Higher Order Statistics. In: Proceedings of the 2004 International Symposium, V-688-V-69. IEEE, Vancouver (2004)
Ng, T.T., Chang, S.: A Model for Image Splicing. Image Processing, 2004. In: ICIP 2004. International Conference, pp. 1169–1172. IEEE, Singapore (2004)
Kovesi, P.: Image Features from Phase Congruency. Journal of Computer Vision Research 1(3), 1–26 (1999)
Chen, W., Shi, Y.Q., Su, W.: Image Splicing Detection using 2-D Phase Congruency and Statistical Moments of Characteristic Function. In: SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA (January 2007)
Shi, Y.Q., Chen, C., Chen, W.: A Natural Image Model Approach to Splicing Detection. ACM MM & Security (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, Z., Zhou, Y., Kang, J., Ren, Y. (2008). Study of Image Splicing Detection. In: Huang, DS., Wunsch, D.C., Levine, D.S., Jo, KH. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues. ICIC 2008. Lecture Notes in Computer Science, vol 5226. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87442-3_136
Download citation
DOI: https://doi.org/10.1007/978-3-540-87442-3_136
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-87440-9
Online ISBN: 978-3-540-87442-3
eBook Packages: Computer ScienceComputer Science (R0)