Abstract
In this paper, we propose a novel framework to statistically measure the correlation inconsistency in mobile images for tamper detection. By first sampling a number of blocks at different image locations, we extract a set of derivative weights as features from each block using partial derivative correlation models. Through regularizing the within-image covariance eigenspectrum and performing eigenfeature transformation, we derive a compact set of eigen weights, which are sensitive to image signal mixing from different source models. A metric is then proposed to quantify the inconsistency among the sampled blocks at different image locations. Through comparison, our eigen weights features show better performance than the eigenfeatures from several other types of forensics features in detecting the presence of tampering. Experimentally, our method shows good tamper detection performance especially when a small percentage of sampled blocks are from a different camera model or brand with different demosaicing processing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mosleh, F. (kodak): Cameras in Handsets Evolving from Novelty to DSC Performance, Despite Constraints. Embedded.com (2008)
Lewis, J.: Don’t Just Stand and Stare, Shoot it, Too. The Singapore Straits Times, April 28 (2007)
Li, X., Gunturk, B., Zhang, L.: Image Demosaicing: a Systematic Survey. In: Proc. of SPIE, vol. 6822 (2008)
Swaminathan, A., Wu, M., Liu, K.J.R.: Nonintrusive Component Forensics of Visual Sensors Using Output Images. IEEE Trans. on Information Forensics and Security 2(1), 91–106 (2007)
McKay, C., Swaminathan, A., Gou, H., Wu, M.: Image Acquisition Forensics: Forensic Analysis to Identify Imaging Source. In: Proc. of ICASSP, pp. 1657–1660 (2008)
Swaminathan, A., Wu, M., Liu, K.J.R.: Digital Image Forensics via Intrinsic Fingerprints. IEEE Trans. on Information Forensics and Security 3(1), 101–117 (2008)
Cao, H., Kot, A.C.: A Generalized Model for Detection of Demosaicing Characteristics. In: Proc. of ICME, pp. 1513–1516 (2008)
Cao, H., Kot, A.C.: Accurate Detection of Demosaicing Regularity for Digital Image Forensics. IEEE Trans. on Information Forensics and Security 4(4), 899–910 (2009)
Cao, H., Kot, A.C.: Mobile Camera Identification Using Demosaicing Features. In: Proc. of ISCAS, pp. 1683–1686 (2010)
Lucas, J., Fridrich, J., Goljan, M.: Digital Camera Identification from Sensor Pattern Noise. IEEE Trans. Information Forensics and Security 1(2), 205–214 (2006)
Chen, M., Fridrich, J., Goljan, M., Lucas, J.: Determining Image Origin and Integrity Using Sensor Noise. IEEE Trans. on Information Forensics and Security 3(1), 74–89 (2008)
Alles, E.J., Geradts, Z.J.M.H., Veenman, C.J.: Source Camera Identification for Low Resolution Heavily Compressed Images. In: Proc. of ICCSA, pp. 557–567 (2008)
Tsai, M.-J., Lai, C.-L., Liu, J.: Camera/Mobile Phone Source Identification for Digital Forensics. In: Proc. of ICASSP, vol. 2, pp. 221–224 (2007)
Avcibas, I., Kharrazi, M., Memon, N., Sankur, B.: Image Steganalysis with Binary Similarity Measures. EUROSIP Journal of Applied Signal Processing 17, 2749–2757 (2005)
Celiktutan, O., Sankur, B., Avcibas, I.: Blind Identification of Source Cell-Phone Model. IEEE Trans. on Information Forensics and Security 3(3), 553–566 (2008)
Avcibas, I., Bayram, S., Memon, N., Ramkumar, M., Sankur, B.: A Classifier Design for Detecting Image Manipulations. In: Proc. of ICIP, vol. 4, pp. 2645–2648 (2004)
Bayram, S., Avcibas, I., Sankur, B., Memon, N.: Image Manipulation Detection. Journal of Electronic Imaging 15, 41102 (2006)
Ng, T.-T., Chang, S.-F., Sun, Q.: Blind Detection of Photomontage Using High Order Statistics. In: Proc. of ISCAS, vol. 5, pp. 688–691 (2004)
Johnson, M.K., Farid, H.: Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In: Proc. of ACM Multimedia Security Workshop, pp. 1–10 (2005)
Farid, H.: A Survey of Image Forgery Detection. IEEE Signal Processing Magazine 26(2), 16–25 (2009)
He, J., Lin, Z., Wang, L., Tang, X.: Detecting Doctored JPEG Images via DCT Coefficient Analysis. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006, Part III. LNCS, vol. 3953, pp. 423–435. Springer, Heidelberg (2006)
Fu, D., Shi, Y.Q., Su, W.: A Generalized Benford’s Law for JPEG Coefficients and its Applications in Image Forensics. In: Proc. of SPIE, vol. 6505, p. 65051L (2007)
Chen, W., Shi, Y.Q.: Image Splicing Detection Using 2-D Phase Congruency and Statistical Moments of Characteristic Function. In: Proc. of SPIE, vol. 6505, p. 65050R (2007)
Luo, W., Qu, Z., Huang, J., Qiu, G.: A Novel Method for Detecting Cropped and Recompressed Image Blocks. In: Proc. of ICASSP 2007, vol. 2, pp. 217–220 (2007)
Barni, M., Costanzo, L., Sabatini, L.: Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation. In: Proc. of ISCAS 2010, pp. 1687–1690 (2010)
Li, C.-T.: Source Camera Identification Using Enhanced Sensor Pattern Noise. IEEE Trans. on Information Forensics and Security 5(2), 280–287 (2010)
Mahdian, B., Saic, S.: A Bibliography on Blind Methods for Identifying Image Forgery. Signal Processing: Image Communication 25(6), 389–399 (2010)
Jiang, X., Mandal, B., Kot, A.C.: Eigenfeature Regularization and Extraction in Face Recognition. IEEE Trans. on Pattern Analysis and Machine Intelligence 30(3), 383–394 (2008)
Duda, O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley & Sons, New York (2001)
Kharrazi, M., Sencar, H.T., Memon, N.: Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. In: Shi, Y.Q. (ed.) Transactions on DHMS I. LNCS, vol. 4300, pp. 123–137. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cao, H., Kot, A.C. (2012). Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security VII. Lecture Notes in Computer Science, vol 7110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28693-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-28693-3_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28692-6
Online ISBN: 978-3-642-28693-3
eBook Packages: Computer ScienceComputer Science (R0)