Abstract
Fast proliferation of mobile cameras and the deteriorating trust on digital images have created needs in determining the integrity of photos captured by mobile devices. As tampering often creates some inconsistencies, we propose in this paper a novel framework to statistically detect the image tampering inconsistency using accurately detected demosaicing weights features. By first cropping four non-overlapping blocks, each from one of the four quadrants in the mobile photo, we extract a set of demosaicing weights features from each block based on a partial derivative correlation model. Through regularizing the eigenspectrum of the within-photo covariance matrix and performing eigenfeature transformation, we further derive a compact set of eigen demosaicing weights features, which are sensitive to image signal mixing from different photo sources. A metric is then proposed to quantify the inconsistency based on the eigen weights features among the blocks cropped from different regions of the mobile photo. Through comparison, we show our eigen weights features perform better than the eigen features extracted from several other conventional sets of statistical forensics features in detecting the presence of tampering. Experimentally, our method shows a good confidence in tampering detection especially when one of the four cropped blocks is from a different camera model or brand with different demosaicing process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mosleh, F. (kodak): Cameras in Handsets Evolving from Novelty to DSC Performance, Despite Constraints. In: Embedded.com (2008)
Lewis, J.: Don’t Just Stand and Stare, Shoot it, Too. In: The Singapore Straits Times (April 28, 2007)
Li, X., Gunturk, B., Zhang, L.: Image Demosaicing: a Systematic Survey. In: Proc. of SPIE, vol. 6822 (2008)
Swaminathan, A., Wu, M., Liu, K.J.R.: Nonintrusive Component Forensics of Visual Sensors Using Output Images. IEEE Trans.on Information Forensics and Security 2(1), 91–106 (2007)
McKay, C., Swaminathan, A., Gou, H., Wu, M.: Image Acquisition Forensics: Forensic Analysis to Identify Imaging Source. In: Proc. of ICASSP, pp. 1657–1660 (2008)
Swaminathan, A., Wu, M., Liu, K.J.R.: Digital Image Forensics via Intrinsic Fingerprints. IEEE Trans. on Information Forensics and Security 3(1), 101–117 (2008)
Cao, H., Kot, A.C.: A Generalized Model for Detection of Demosaicing Characteristics. In: Proc. of ICME, pp. 1513–1516 (2008)
Cao, H., Kot, A.C.: Accurate Detection of Demosaicing Regularity for Digital Image Forensics. IEEE Trans. on Information Forensics and Security 4(4), 899–910 (2009)
Cao, H., Kot, A.C.: Mobile Camera Identification Using Demosaicing Features. In: Proc. of ISCAS, pp. 1683–1686 (2010)
Lucas, J., Fridrich, J., Goljan, M.: Digital Camera Identification from Sensor Pattern Noise. IEEE Trans. Information Forensics and Security 1(2), 205–214 (2006)
Chen, M., Fridrich, J., Goljan, M., Lucas, J.: Determining Image Origin and Integrity Using Sensor Noise. IEEE Trans. on Information Forensics and Security 3(1), 74–89 (2008)
Alles, E.J., Geradts, Z.J.M.H., Veenman, C.J.: Source Camera Identification for Low Resolution Heavily Compressed Images. In: Proc. of ICCSA, pp. 557–567 (2008)
Tsai, M.-J., Lai, C.-L., Liu, J.: Camera/Mobile Phone Source Identification for Digital Forensics. In: Proc. of ICASSP, vol. 2, pp. 221–224 (2007)
Avcibas, I., Kharrazi, M., Memon, N., Sankur, B.: Image Steganalysis with Binary Similarity Measures. EUROSIP Journal of Applied Signal Processing 17, 2749–2757 (2005)
Celiktutan, O., Sankur, B., Avcibas, I.: Blind Identification of Source Cell-Phone Model. IEEE Trans. on Information Forensics and Security 3(3), 553–566 (2008)
Avcibas, I., Bayram, S., Memon, N., Ramkumar, M., Sankur, B.: A Classifier Design for Detecting Image Manipulations. In: Proc. of Int. Conf. on Image Processing, vol. 4, pp. 2645–2648 (2004)
Bayram, S., Avcibas, I., Sankur, B., Memon, N.: Image Manipulation Detection. Journal of Electronic Imaging 15, 41102 (2006)
Ng, T.-T., Chang, S.-F., Sun, Q.: Blind Detection of Photomontage Using High Order Statistics. In: Proc. of ISCAS, vol. 5, pp. 688–691 (2004)
Johnson, M.K., Farid, H.: Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In: Proc. of ACM Multimedia Security Workshop, pp. 1–10 (2005)
Farid, H.: A Survey of Image Forgery Detection. IEEE Signal Processing Magazine 26(2), 16–25 (2009)
He, J., Lin, Z., Wang, L., Tang, X.: Detecting Doctored JPEG Images via DCT Coefficient Analysis. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, vol. 3953, pp. 423–435. Springer, Heidelberg (2006)
Fu, D., Shi, Y.Q., Su, W.: A Generalized Benford’s Law for JPEG Coefficients and its Applications in Image Forensics. In: Proc. of SPIE, vol. 6505, p. 65051L (2007)
Chen, W., Shi, Y.Q.: Image Splicing Detection Using 2-D Phase Congruency and Statistical Moments of Characteristic Function. In: Proc. of SPIE, vol. 6505, p. 65050R (2007)
Luo, W., Qu, Z., Huang, J., Qiu, G.: A Novel Method for Detecting Cropped and Recompressed Image Blocks. In: Proc. of ICASSP 2007, vol. 2, pp. 217–220 (2007)
Barni, M., Costanzo, L., Sabatini, L.: Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation. In: Proc. of ISCAS 2010, pp. 1687–1690 (2010)
Li, C.-T.: Source Camera Identification Using Enhanced Sensor Pattern Noise. IEEE Trans. on Information Forensics and Security 5(2), 280–287 (2010)
Mahdian, B., Saic, S.: A Bibliography on Blind Methods for Identifying Image Forgery. Signal Processing: Image Communication 25(6), 389–399 (2010)
Jiang, X., Mandal, B., Kot, A.C.: Eigenfeature Regularization and Extraction in Face Recognition. IEEE Trans. on Pattern Analysis and Machine Intelligence 30(3), 383–394 (2008)
Duda, O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley & Sons, New York (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cao, H., Kot, A.C. (2011). Detection of Tampering Inconsistencies on Mobile Photos. In: Kim, HJ., Shi, Y.Q., Barni, M. (eds) Digital Watermarking. IWDW 2010. Lecture Notes in Computer Science, vol 6526. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18405-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-18405-5_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-18404-8
Online ISBN: 978-3-642-18405-5
eBook Packages: Computer ScienceComputer Science (R0)