Skip to main content

Robust Median Filtering Detection Based on Filtered Residual

  • Conference paper
The International Workshop on Digital Forensics and Watermarking 2012 (IWDW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Included in the following conference series:

  • 2098 Accesses

Abstract

In multimedia forensics, exposing an image’s processing history draws much attention. Median filtering is a popular noise removal tool, which has been used as a popular anti-forensics tool recently. An image is usually saved in a compressed format such as the JPEG format. While the detection of median filtering from a JPEG compressed image is difficult because typical filter characteristics are suppressed by JPEG quantization and block artifacts. In this paper, we introduce a novel forensic trace – median filter residual. Median filtering is first applied on a test image, and the difference between the initial image and the filtered output image is called the median filter residual. The filtered residual is used as the forensic fingerprint. Thus, the interference from the image edge and texture which is regarded as a major limitation of the existing forensic methods can be reduced. Experimental results on a large image database show that the proposed method is very robust to JPEG post- compression, and achieves much better performance than the existing state-of-the-art works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. In: Proc. SPIE, Electronic Imaging, Media Forensics and Security II, vol. 7541, pp. 1–12 (2010)

    Google Scholar 

  2. Yuan, H.: Blind Forensics of Median Filtering in Digital Images. IEEE Trans. Inf. Forensics Security 6(4), 1335–1345 (2011)

    Article  Google Scholar 

  3. Cao, G., Zhao, Y., Ni, R., Yu, L., Tian, H.: Forensic detection of median filtering in digital images. In: Proc. 2010 IEEE Int. Conf. Multimedia and Expo. 2010, pp. 89–94 (2010)

    Google Scholar 

  4. Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of re-sampling. IEEE Transactions on Signal Processing 53(2), 758–767 (2005)

    Article  MathSciNet  Google Scholar 

  5. Luo, W.Q., Huang, J.W., Qiu, G.P.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Security 5(3), 480–491 (2010)

    Article  Google Scholar 

  6. Stamm, M., Liu, K.J.R.: Forensic estimation and reconstruction of a contrast enhancement mapping. In: International Conf. on Acoustics, Speech and Signal Processing, Dallas, Texas, USA (2010)

    Google Scholar 

  7. Stamm, M.C., Ray Liu, K.J.: Anti-Forensics of Digital Image Compression. IEEE Trans. Inf. Forensics Security 6(3), 1050–1065 (2011)

    Article  Google Scholar 

  8. Dirik, A.E., Memon, N.: Image tamper detection based on demosaicing artifacts. In: International Conference Proceedings on Image Processing, Cairo, pp. 1497–1500 (2009)

    Google Scholar 

  9. Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Security 3(4), 582–592 (2008)

    Article  Google Scholar 

  10. Ker, A.D., Bohme, R.: Revisiting weighted stego-image stegoanalysis. In: Proceedings of SPIE, Electronic Imaging: Security, Forensics, Steganography and Watermarking of Multimedia Contents X, vol. 6819, p. 5 (2008)

    Google Scholar 

  11. Bovik, A.C.: Streaking in median filtered images. IEEE Transactions on Acoustics, Speech and Signal Processing 35(4), 493–503 (1987)

    Article  MATH  Google Scholar 

  12. Swaminathan, A., Wu, M., Liu, K.J.: Digital image forensics via intrinsic fingerprints. IEEE Trans. Inf. Forensics Security 3(1), 101–117 (2008)

    Article  Google Scholar 

  13. Chuang, W.H., Swaminathan, A., Wu, M.: Tampering identification using empirical frequency response. In: Proc. IEEE Int. Conf. Acoust., Speech and Signal Processing, pp. 1517–1520 (2009)

    Google Scholar 

  14. Schaefer, G., Stich, M.: UCID-An uncompressed color image database. In: Proceedings of SPIE, Storage and Retrieval Methods and Applications for Multimedia, pp. 472–480 (2004)

    Google Scholar 

  15. Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2, 27:1–27:27 (2011)

    Google Scholar 

  16. Pevý, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Security 5(2), 215–224 (2010)

    Article  Google Scholar 

  17. Shi, Y.Q., Chen, C.-H., Chen, W.: A Markov Process Based Approach to Effective Attacking JPEG Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  18. Zo, D., Shi, Y.Q., Su, W., Xuan, G.: Steganalysis based on Markov model of thresholded prediction-error image. In: Proc. IEEE Int. Conf. Multimedia and Expo., Toronto, Canada, July 9-12, pp. 365–1368 (2006)

    Google Scholar 

  19. Chen, C., Ni, J., Huang, R., Huang, J.: Blind median filtering detection using statistics in difference domain. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 1–15. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Peng, A., Kang, X. (2013). Robust Median Filtering Detection Based on Filtered Residual. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics