Skip to main content
Log in

Resampling parameter estimation via dual-filtering based convolutional neural network

  • Special Issue Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Resampling detection is an important problem in image forensics. Several exiting approaches have been proposed to solve it, but few of them focus on resampling parameter estimation. Especially, the estimation of downsampling scenarios is very challenging. In this paper, we propose a dual-filtering based convolutional neural network (CNN) to extract features directly from the images. First, we analyze the formulation of resampling parameter estimation and reformulate it as a multi-classification problem by regarding each resampling parameter as a distinct class. Then, we design a network structure based on the preprocessing operation to capture the specific resampling traces for classification. Two parallel filters with different highpass filters are deployed to the CNN architecture, which enlarges the resampling traces and makes it easier to achieve resampling parameter estimation. Next, concatenating the outputs of the two filters by a “concat” layer. Finally, the experimental results demonstrate our proposed method is effective and has better performance than state-of-the-art methods in resampling parameter estimation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Farid, H.: Image forgery detection. IEEE Signal Process Mag. 26(2), 16–25 (2009)

    Article  Google Scholar 

  2. Fridrich, J.: Digital image forensics. IEEE Signal Process Mag. 26(2), 26–37 (2009)

    Article  Google Scholar 

  3. Wang, C., Zhang, Z., Li, Q., Zhou, X.: An image copy-move forgery detection method based on SURF and PCET. IEEE Access. 7, 170032–170047 (2019)

    Article  Google Scholar 

  4. Zhang, Q., Wei, Z., Wang, R., Li, G.: Digital image splicing detection based on markov features in block dwt domain. Multimed Tools Appl. 77(23), 31239–31260 (2018)

    Article  Google Scholar 

  5. Kang, X., Stamm, M.C., Peng, A., Liu, K.J.R.: Robust median filtering forensics using an autoregressive model. IEEE Trans Inf Foren Secur. 8(9), 1456–1468 (2013)

    Article  Google Scholar 

  6. Feng, X., Cox, I.J., Doerr, G.: Normalized energy density-based forensic detection of resampled images. IEEE Trans Multim. 14(3), 536–545 (2012)

    Article  Google Scholar 

  7. Gao, S., Liao, X., Liu, X.: Real-time detecting one specific tampering operation in multiple operator chains. J Real Time Image Process. 16(3), 741–750 (2019)

    Article  Google Scholar 

  8. Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process. 53(2), 758–767 (2005)

    Article  MathSciNet  Google Scholar 

  9. Kirchner, M.: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: Proceedings of the 10th ACM workshop on Multimedia and security (ACM), pp. 11–20 (2008)

  10. Liao, X., Huang, Z.: A framework for parameters estimation of image operator chain. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2787–2791 (2020)

  11. Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett. 22(11), 1849–1853 (2015)

    Article  Google Scholar 

  12. Chen, Y., Lyu, Z., Kang, X., Wang. Z.J.: A rotation-invariant convolutional neural network for image enhancement forensics. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2111–2115 (2018)

  13. Liao, X., Li, K., Zhu, X., Liu, K.J.R.: Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process. 14(5), 955–968 (2020)

    Article  Google Scholar 

  14. Stamm, M.C., Liu, K.: Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans Inf Foren Secur. 5(3), 492–506 (2010)

    Article  Google Scholar 

  15. Ding, F., Zhu, G., Dong, W., Shi, Y.Q.: An efficient weak sharpening detection method for image forensics. J Vis Commun Image Represent. 50, 93–99 (2018)

    Article  Google Scholar 

  16. Gallagher, A.C.: Detection of linear and cubic interpolation in jpeg compressed images. In: Canadian Conference on Computer and Robot Vision (CRV), pp. 65–72 (2005)

  17. Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Trans Inf Foren Secur. 3(3), 529–538 (2008)

    Article  Google Scholar 

  18. Kirchner, M.: Linear row and column predictors for the analysis of resized images. In: Proceedings of the 12th ACM workshop on Multimedia and security (ACM), pp. 13–18 (2010)

  19. Vázquez-Padín, D., Comesaña, P.: Ml estimation of the resampling factor. In: International Workshop on Information Forensics and Security (WIFS), pp. 205–210 (2012)

  20. Zhu, N., Deng, C., Gao, X.: A learning-to-rank approach for image scaling factor estimation. Neurocomputing. 204, 33–40 (2016)

    Article  Google Scholar 

  21. Luo, C., Wang, X.: Hybrid modified function projective synchronization of two different dimensional complex nonlinear systems with parameters identification. J Franklin Inst. 350(9), 2646–2663 (2013)

    Article  MathSciNet  Google Scholar 

  22. Zhang, H., Wang, X., Lin, X.: Topology identification and module-phase synchronization of neural network with time delay. IEEE Trans Syst Man Cybern Syst 47(6), 1–8 (2017)

    Article  Google Scholar 

  23. Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (NIPS), pp. 1097–1105 (2012)

  24. Boroumand, M., Fridrich, J.: Deep learning for detecting processing history of images. J Electron Imaging. 2018, 213-1 (2018)

    Article  Google Scholar 

  25. Bayar, B., Stamm, M.C.: A generic approach towards image manipulation parameter estimation using convolutional neural networks. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security (ACM), pp. 147–157 (2017)

  26. LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature. 521(7553), 436–444 (2015)

    Article  Google Scholar 

  27. Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans Inf Foren Secur. 7(3), 868–882 (2012)

    Article  Google Scholar 

  28. Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Foren Secur. 5(2), 215–224 (2010)

    Article  Google Scholar 

  29. Bas, P., Filler, T., Pevný, T.: Break our steganographic system: The ins and outs of organizing BOSS. In: International Workshop on Information Hiding (IH), pp. 59–70 (2011)

  30. Schaefer, G., Stich, M.: UCID—an uncompressed color image database. In: Storage and Retrieval Methods and Applications for Multimedia, pp. 472–480 (2004)

  31. Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the 22nd ACM international conference on Multimedia (ACM), pp. 675–678 (2014)

Download references

Acknowledgements

This work is supported by National Natural Science Foundation of China (Grant Nos. 61972142, 61772191, 61672222), Hunan Provincial Natural Science Foundation of China (No. 2020JJ4212), Open Project Program of National Laboratory of Pattern Recognition (Grant No. 201900017).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Liao.

Ethics declarations

Conflict of interest

We declare that we do not have any conflict of interest in connection with the work submitted.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Peng, L., Liao, X. & Chen, M. Resampling parameter estimation via dual-filtering based convolutional neural network. Multimedia Systems 27, 363–370 (2021). https://doi.org/10.1007/s00530-020-00697-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-020-00697-y

Keywords

Navigation