Skip to main content

A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-Pair Histogram

  • Conference paper
  • First Online:
Advances in Image and Graphics Technologies (IGTA 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 525))

Included in the following conference series:

Abstract

A novel image forensic method based on generalized coefficient-pair histogram in DCT domain was proposed. In the proposed method, firstly, the image is transformed by DCT, and then the differential DCT coefficient matrix of two directions, such as horizontal and vertical direction are computed, the following is to compute the coefficient-pair histogram for each differential DCT coefficient matrix within the given threshold. Finally, support vector machine (SVM) is used to classify the authentic and spliced image through training the feature vectors of authentic and tampered image. The experimental results show that the proposed approach has not only the lower computing complexity; it also outperforms all the state-of-the-art methods in detection rate with the same test database.

An erratum to this chapter is available at DOI: 10.1007/978-3-662-47791-5_51

An erratum to this chapter can be found at http://dx.doi.org/10.1007/978-3-662-47791-5_51

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ng, T.-T., Chang, S.-F., Sun, Q.: Blind detection of photomontage using higher order statistics. In: IEEE ISCAS, Vancouver, Canada, pp. 688–691 (2004)

    Google Scholar 

  2. Fu, D., Shi, Y.Q., Su, W.: Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 177–187. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Chen, W., Shi, Y.Q., Su, W.: Image splicing detection using 2-d phase congruency and statistical moments of characteristic function. In: Imaging: Security, Steganography,and Watermarking of Multimedia Contents (2007). 6505R

    Google Scholar 

  4. Dong, J., Wang, W., Tan, T., Shi, Y.Q.: Run-length and edge statistics based approach for image splicing detection. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 76–87. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. He, Z., Sun, W., Wei, L., Hongtao, L.: Digital image splicing detection based on approximate run length. Pattern Recognition Letters 32(12), 1591–1597 (2011)

    Article  Google Scholar 

  6. Shi, Y.Q., Chen, C., Chen, W.: A natural image model approaches to splicing detection. In: Proceedings of the 9th Workshop on Multimedia & Security, pp. 51–62 (2007)

    Google Scholar 

  7. Sutthiwan, P., Shi, Y.Q., Dong, J., et. al.: New developments in color image tampering detection. In: Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 3064–3067 (2010)

    Google Scholar 

  8. He, Z., lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition 45, 4292–4299 (2012)

    Article  Google Scholar 

  9. Saleh, S.Q., Hussain, M., Muhammad, G., Bebis, G.: Evaluation of image forgery detection using multi-scale weber local descriptors. In: Bebis, G., Boyle, R., Parvin, B., Koracin, D., Li, B., Porikli, F., Zordan, V., Klosowski, J., Coquillart, S., Luo, X., Chen, M., Gotz, D. (eds.) ISVC 2013, Part II. LNCS, vol. 8034, pp. 416–424. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  10. Alahmadi1, A.A., Hussain1, M., Aboalsamh, H.: Splicing image forgery detection based on DCT and Local Binary Pattern. In: Proceedings of IEEE Global Conference on Signal and Information Processing, pp. 253–256 (2013)

    Google Scholar 

  11. Qian-lan, D.: The blind detection of information hiding in color image. In: Proceedings of Second Int. conf. Computer Engineering and Technology, vol. 7, pp. 346–348 (2010)

    Google Scholar 

  12. Shabanifard, M., Shayesteh, M.G., Akhaee, M.A.: Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram. IET Image Process 7(9), 817–828 (2013)

    Article  Google Scholar 

  13. Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST) 2(3), 27 (2011)

    Google Scholar 

  14. Dong, J.: CASIA tampered image detection evaluation database (2011). http://forensics.idealtest.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tiegang Gao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fusheng, Y., Gao, T. (2015). A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-Pair Histogram. In: Tan, T., Ruan, Q., Wang, S., Ma, H., Di, K. (eds) Advances in Image and Graphics Technologies. IGTA 2015. Communications in Computer and Information Science, vol 525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47791-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47791-5_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47790-8

  • Online ISBN: 978-3-662-47791-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics