Skip to main content

Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection

  • Conference paper
Book cover Transactions on Data Hiding and Multimedia Security VII

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 7110))

Abstract

In this paper, we propose a novel framework to statistically measure the correlation inconsistency in mobile images for tamper detection. By first sampling a number of blocks at different image locations, we extract a set of derivative weights as features from each block using partial derivative correlation models. Through regularizing the within-image covariance eigenspectrum and performing eigenfeature transformation, we derive a compact set of eigen weights, which are sensitive to image signal mixing from different source models. A metric is then proposed to quantify the inconsistency among the sampled blocks at different image locations. Through comparison, our eigen weights features show better performance than the eigenfeatures from several other types of forensics features in detecting the presence of tampering. Experimentally, our method shows good tamper detection performance especially when a small percentage of sampled blocks are from a different camera model or brand with different demosaicing processing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mosleh, F. (kodak): Cameras in Handsets Evolving from Novelty to DSC Performance, Despite Constraints. Embedded.com (2008)

    Google Scholar 

  2. Lewis, J.: Don’t Just Stand and Stare, Shoot it, Too. The Singapore Straits Times, April 28 (2007)

    Google Scholar 

  3. Li, X., Gunturk, B., Zhang, L.: Image Demosaicing: a Systematic Survey. In: Proc. of SPIE, vol. 6822 (2008)

    Google Scholar 

  4. Swaminathan, A., Wu, M., Liu, K.J.R.: Nonintrusive Component Forensics of Visual Sensors Using Output Images. IEEE Trans. on Information Forensics and Security 2(1), 91–106 (2007)

    Article  Google Scholar 

  5. McKay, C., Swaminathan, A., Gou, H., Wu, M.: Image Acquisition Forensics: Forensic Analysis to Identify Imaging Source. In: Proc. of ICASSP, pp. 1657–1660 (2008)

    Google Scholar 

  6. Swaminathan, A., Wu, M., Liu, K.J.R.: Digital Image Forensics via Intrinsic Fingerprints. IEEE Trans. on Information Forensics and Security 3(1), 101–117 (2008)

    Article  Google Scholar 

  7. Cao, H., Kot, A.C.: A Generalized Model for Detection of Demosaicing Characteristics. In: Proc. of ICME, pp. 1513–1516 (2008)

    Google Scholar 

  8. Cao, H., Kot, A.C.: Accurate Detection of Demosaicing Regularity for Digital Image Forensics. IEEE Trans. on Information Forensics and Security 4(4), 899–910 (2009)

    Article  Google Scholar 

  9. Cao, H., Kot, A.C.: Mobile Camera Identification Using Demosaicing Features. In: Proc. of ISCAS, pp. 1683–1686 (2010)

    Google Scholar 

  10. Lucas, J., Fridrich, J., Goljan, M.: Digital Camera Identification from Sensor Pattern Noise. IEEE Trans. Information Forensics and Security 1(2), 205–214 (2006)

    Article  Google Scholar 

  11. Chen, M., Fridrich, J., Goljan, M., Lucas, J.: Determining Image Origin and Integrity Using Sensor Noise. IEEE Trans. on Information Forensics and Security 3(1), 74–89 (2008)

    Article  Google Scholar 

  12. Alles, E.J., Geradts, Z.J.M.H., Veenman, C.J.: Source Camera Identification for Low Resolution Heavily Compressed Images. In: Proc. of ICCSA, pp. 557–567 (2008)

    Google Scholar 

  13. Tsai, M.-J., Lai, C.-L., Liu, J.: Camera/Mobile Phone Source Identification for Digital Forensics. In: Proc. of ICASSP, vol. 2, pp. 221–224 (2007)

    Google Scholar 

  14. Avcibas, I., Kharrazi, M., Memon, N., Sankur, B.: Image Steganalysis with Binary Similarity Measures. EUROSIP Journal of Applied Signal Processing 17, 2749–2757 (2005)

    Article  Google Scholar 

  15. Celiktutan, O., Sankur, B., Avcibas, I.: Blind Identification of Source Cell-Phone Model. IEEE Trans. on Information Forensics and Security 3(3), 553–566 (2008)

    Article  Google Scholar 

  16. Avcibas, I., Bayram, S., Memon, N., Ramkumar, M., Sankur, B.: A Classifier Design for Detecting Image Manipulations. In: Proc. of ICIP, vol. 4, pp. 2645–2648 (2004)

    Google Scholar 

  17. Bayram, S., Avcibas, I., Sankur, B., Memon, N.: Image Manipulation Detection. Journal of Electronic Imaging 15, 41102 (2006)

    Article  Google Scholar 

  18. Ng, T.-T., Chang, S.-F., Sun, Q.: Blind Detection of Photomontage Using High Order Statistics. In: Proc. of ISCAS, vol. 5, pp. 688–691 (2004)

    Google Scholar 

  19. Johnson, M.K., Farid, H.: Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In: Proc. of ACM Multimedia Security Workshop, pp. 1–10 (2005)

    Google Scholar 

  20. Farid, H.: A Survey of Image Forgery Detection. IEEE Signal Processing Magazine 26(2), 16–25 (2009)

    Article  Google Scholar 

  21. He, J., Lin, Z., Wang, L., Tang, X.: Detecting Doctored JPEG Images via DCT Coefficient Analysis. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006, Part III. LNCS, vol. 3953, pp. 423–435. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  22. Fu, D., Shi, Y.Q., Su, W.: A Generalized Benford’s Law for JPEG Coefficients and its Applications in Image Forensics. In: Proc. of SPIE, vol. 6505, p. 65051L (2007)

    Google Scholar 

  23. Chen, W., Shi, Y.Q.: Image Splicing Detection Using 2-D Phase Congruency and Statistical Moments of Characteristic Function. In: Proc. of SPIE, vol. 6505, p. 65050R (2007)

    Google Scholar 

  24. Luo, W., Qu, Z., Huang, J., Qiu, G.: A Novel Method for Detecting Cropped and Recompressed Image Blocks. In: Proc. of ICASSP 2007, vol. 2, pp. 217–220 (2007)

    Google Scholar 

  25. Barni, M., Costanzo, L., Sabatini, L.: Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation. In: Proc. of ISCAS 2010, pp. 1687–1690 (2010)

    Google Scholar 

  26. Li, C.-T.: Source Camera Identification Using Enhanced Sensor Pattern Noise. IEEE Trans. on Information Forensics and Security 5(2), 280–287 (2010)

    Article  Google Scholar 

  27. Mahdian, B., Saic, S.: A Bibliography on Blind Methods for Identifying Image Forgery. Signal Processing: Image Communication 25(6), 389–399 (2010)

    Article  Google Scholar 

  28. Jiang, X., Mandal, B., Kot, A.C.: Eigenfeature Regularization and Extraction in Face Recognition. IEEE Trans. on Pattern Analysis and Machine Intelligence 30(3), 383–394 (2008)

    Article  Google Scholar 

  29. Duda, O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley & Sons, New York (2001)

    MATH  Google Scholar 

  30. Kharrazi, M., Sencar, H.T., Memon, N.: Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. In: Shi, Y.Q. (ed.) Transactions on DHMS I. LNCS, vol. 4300, pp. 123–137. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cao, H., Kot, A.C. (2012). Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security VII. Lecture Notes in Computer Science, vol 7110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28693-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28693-3_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28692-6

  • Online ISBN: 978-3-642-28693-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics