Skip to main content

Detection of Tampering Inconsistencies on Mobile Photos

  • Conference paper
Digital Watermarking (IWDW 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6526))

Included in the following conference series:

Abstract

Fast proliferation of mobile cameras and the deteriorating trust on digital images have created needs in determining the integrity of photos captured by mobile devices. As tampering often creates some inconsistencies, we propose in this paper a novel framework to statistically detect the image tampering inconsistency using accurately detected demosaicing weights features. By first cropping four non-overlapping blocks, each from one of the four quadrants in the mobile photo, we extract a set of demosaicing weights features from each block based on a partial derivative correlation model. Through regularizing the eigenspectrum of the within-photo covariance matrix and performing eigenfeature transformation, we further derive a compact set of eigen demosaicing weights features, which are sensitive to image signal mixing from different photo sources. A metric is then proposed to quantify the inconsistency based on the eigen weights features among the blocks cropped from different regions of the mobile photo. Through comparison, we show our eigen weights features perform better than the eigen features extracted from several other conventional sets of statistical forensics features in detecting the presence of tampering. Experimentally, our method shows a good confidence in tampering detection especially when one of the four cropped blocks is from a different camera model or brand with different demosaicing process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mosleh, F. (kodak): Cameras in Handsets Evolving from Novelty to DSC Performance, Despite Constraints. In: Embedded.com (2008)

    Google Scholar 

  2. Lewis, J.: Don’t Just Stand and Stare, Shoot it, Too. In: The Singapore Straits Times (April 28, 2007)

    Google Scholar 

  3. Li, X., Gunturk, B., Zhang, L.: Image Demosaicing: a Systematic Survey. In: Proc. of SPIE, vol. 6822 (2008)

    Google Scholar 

  4. Swaminathan, A., Wu, M., Liu, K.J.R.: Nonintrusive Component Forensics of Visual Sensors Using Output Images. IEEE Trans.on Information Forensics and Security 2(1), 91–106 (2007)

    Article  Google Scholar 

  5. McKay, C., Swaminathan, A., Gou, H., Wu, M.: Image Acquisition Forensics: Forensic Analysis to Identify Imaging Source. In: Proc. of ICASSP, pp. 1657–1660 (2008)

    Google Scholar 

  6. Swaminathan, A., Wu, M., Liu, K.J.R.: Digital Image Forensics via Intrinsic Fingerprints. IEEE Trans. on Information Forensics and Security 3(1), 101–117 (2008)

    Article  Google Scholar 

  7. Cao, H., Kot, A.C.: A Generalized Model for Detection of Demosaicing Characteristics. In: Proc. of ICME, pp. 1513–1516 (2008)

    Google Scholar 

  8. Cao, H., Kot, A.C.: Accurate Detection of Demosaicing Regularity for Digital Image Forensics. IEEE Trans. on Information Forensics and Security 4(4), 899–910 (2009)

    Article  Google Scholar 

  9. Cao, H., Kot, A.C.: Mobile Camera Identification Using Demosaicing Features. In: Proc. of ISCAS, pp. 1683–1686 (2010)

    Google Scholar 

  10. Lucas, J., Fridrich, J., Goljan, M.: Digital Camera Identification from Sensor Pattern Noise. IEEE Trans. Information Forensics and Security 1(2), 205–214 (2006)

    Article  Google Scholar 

  11. Chen, M., Fridrich, J., Goljan, M., Lucas, J.: Determining Image Origin and Integrity Using Sensor Noise. IEEE Trans. on Information Forensics and Security 3(1), 74–89 (2008)

    Article  Google Scholar 

  12. Alles, E.J., Geradts, Z.J.M.H., Veenman, C.J.: Source Camera Identification for Low Resolution Heavily Compressed Images. In: Proc. of ICCSA, pp. 557–567 (2008)

    Google Scholar 

  13. Tsai, M.-J., Lai, C.-L., Liu, J.: Camera/Mobile Phone Source Identification for Digital Forensics. In: Proc. of ICASSP, vol. 2, pp. 221–224 (2007)

    Google Scholar 

  14. Avcibas, I., Kharrazi, M., Memon, N., Sankur, B.: Image Steganalysis with Binary Similarity Measures. EUROSIP Journal of Applied Signal Processing 17, 2749–2757 (2005)

    Article  MATH  Google Scholar 

  15. Celiktutan, O., Sankur, B., Avcibas, I.: Blind Identification of Source Cell-Phone Model. IEEE Trans. on Information Forensics and Security 3(3), 553–566 (2008)

    Article  Google Scholar 

  16. Avcibas, I., Bayram, S., Memon, N., Ramkumar, M., Sankur, B.: A Classifier Design for Detecting Image Manipulations. In: Proc. of Int. Conf. on Image Processing, vol. 4, pp. 2645–2648 (2004)

    Google Scholar 

  17. Bayram, S., Avcibas, I., Sankur, B., Memon, N.: Image Manipulation Detection. Journal of Electronic Imaging 15, 41102 (2006)

    Article  Google Scholar 

  18. Ng, T.-T., Chang, S.-F., Sun, Q.: Blind Detection of Photomontage Using High Order Statistics. In: Proc. of ISCAS, vol. 5, pp. 688–691 (2004)

    Google Scholar 

  19. Johnson, M.K., Farid, H.: Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In: Proc. of ACM Multimedia Security Workshop, pp. 1–10 (2005)

    Google Scholar 

  20. Farid, H.: A Survey of Image Forgery Detection. IEEE Signal Processing Magazine 26(2), 16–25 (2009)

    Article  Google Scholar 

  21. He, J., Lin, Z., Wang, L., Tang, X.: Detecting Doctored JPEG Images via DCT Coefficient Analysis. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, vol. 3953, pp. 423–435. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  22. Fu, D., Shi, Y.Q., Su, W.: A Generalized Benford’s Law for JPEG Coefficients and its Applications in Image Forensics. In: Proc. of SPIE, vol. 6505, p. 65051L (2007)

    Google Scholar 

  23. Chen, W., Shi, Y.Q.: Image Splicing Detection Using 2-D Phase Congruency and Statistical Moments of Characteristic Function. In: Proc. of SPIE, vol. 6505, p. 65050R (2007)

    Google Scholar 

  24. Luo, W., Qu, Z., Huang, J., Qiu, G.: A Novel Method for Detecting Cropped and Recompressed Image Blocks. In: Proc. of ICASSP 2007, vol. 2, pp. 217–220 (2007)

    Google Scholar 

  25. Barni, M., Costanzo, L., Sabatini, L.: Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation. In: Proc. of ISCAS 2010, pp. 1687–1690 (2010)

    Google Scholar 

  26. Li, C.-T.: Source Camera Identification Using Enhanced Sensor Pattern Noise. IEEE Trans. on Information Forensics and Security 5(2), 280–287 (2010)

    Article  Google Scholar 

  27. Mahdian, B., Saic, S.: A Bibliography on Blind Methods for Identifying Image Forgery. Signal Processing: Image Communication 25(6), 389–399 (2010)

    Google Scholar 

  28. Jiang, X., Mandal, B., Kot, A.C.: Eigenfeature Regularization and Extraction in Face Recognition. IEEE Trans. on Pattern Analysis and Machine Intelligence 30(3), 383–394 (2008)

    Article  Google Scholar 

  29. Duda, O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley & Sons, New York (2001)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cao, H., Kot, A.C. (2011). Detection of Tampering Inconsistencies on Mobile Photos. In: Kim, HJ., Shi, Y.Q., Barni, M. (eds) Digital Watermarking. IWDW 2010. Lecture Notes in Computer Science, vol 6526. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18405-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18405-5_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-18404-8

  • Online ISBN: 978-3-642-18405-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics