Skip to main content
Log in

Smoothing identification for digital image forensics

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the explosive development in digital techniques, ordinary people without professional training are capable to edit digital images with applications. As a common image processing manipulation, smoothing is important in editing digital images for denoising and producing blur effect. Besides, in recent years, people prefer to retouch images with smoothing algorithms to pursue better appearance. Hence it is required to expose such manipulations in digital image forensics. In this paper, a new scheme for detecting the operation of smoothing is proposed. The proposed scheme is based on analyzing the statistical property which can be considered as computation efficiently when compares to machine learning algorithms. Furthermore, a method for texture analysis is also proposed to specify the algorithm that used for smoothing. The second method adopt the features extracted from edge area. The features are fed into support vector machine for classification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Bayar B, Stamm MC (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM workshop on information hiding and multimedia security. ACM, pp 5–10

  2. Canny J (1987) A computational approach to edge detection. In: Readings in computer vision. Elsevier, pp 184–203

  3. Cao G, Zhao Y, Ni R (2010) Edge-based blur metric for tamper detection. Journal of Information Hiding and Multimedia Signal Processing 1(1):20–27

    Google Scholar 

  4. Cao G, Zhao Y, Ni R, Yu L, Tian H (2010) Forensic detection of median filtering in digital images. In: 2010 IEEE international conference on multimedia and expo (ICME). IEEE, pp 89–94

  5. Cao G, Zhao Y, Ni R, Li X (2014) Contrast enhancement-based forensics in digital images. IEEE Trans Inf Forensics Secur 9(3):515–525

    Article  Google Scholar 

  6. Chang T, Kuo C-C (1993) Texture analysis and classification with tree-structured wavelet transform. IEEE Trans Image Process 2(4):429–441

    Article  Google Scholar 

  7. Chen C, Ni J, Huang J (2013) Blind detection of median filtering in digital images: A difference domain based approach. IEEE Trans Image Process 22 (12):4699–4710

    Article  MathSciNet  Google Scholar 

  8. Ding F, Zhu G, Yang J, Xie J, Shi Y-Q (2015) Edge perpendicular binary coding for usm sharpening detection. IEEE Signal Process Lett 22(3):327–331

    Article  Google Scholar 

  9. Ding F, Zhu G, Dong W, Shi Y-Q (2018) An efficient weak sharpening detection method for image forensics. J Vis Commun Image Represent 50:93–99

    Article  Google Scholar 

  10. Drucker H, Wu D, Vapnik VN (1999) Support vector machines for spam categorization. IEEE Trans Neural Netw 10(5):1048–1054

    Article  Google Scholar 

  11. Elad M (2002) On the origin of the bilateral filter and ways to improve it. IEEE Trans Image Process 11(10):1141–1151

    Article  MathSciNet  Google Scholar 

  12. Farid H (2008) Digital image forensics. Sci Am 298(6):66–71

    Article  Google Scholar 

  13. Fridrich J (2004) Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: International workshop on information hiding. Springer, pp 67–81

  14. Fridrich J (2009) Digital image forensics. IEEE Signal Process Mag 26(2):26–37

    Article  Google Scholar 

  15. Fridrich J, Soukal D, Lukáš J (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop. Citeseer

  16. Gonzalez RC, Woods RE (2002) Digital image processing, 2nd edn. Prentice-Hall, Upper Saddle River

    Google Scholar 

  17. Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient jpeg steganography. IEEE Trans Inf Forensics Secur 9(5):814–825

    Article  Google Scholar 

  18. Haddock LJ, Kim DY, Mukai S (2013) Simple, inexpensive technique for high-quality smartphone fundus photography in human and animal eyes. J Ophthalmol 2013:5

    Article  Google Scholar 

  19. Hu R, Li X, Guo Z (2018) Decorrelated local binary patterns for efficient texture classification. Multimed Tools Appl 77(6):6863–6882

    Article  Google Scholar 

  20. Idaho N, et al. (2012) The plants database. In: NRCS, national plant data team. Citeseer

  21. Kang X, Stamm MC, Peng A, Liu KR (2013) Robust median filtering forensics using an autoregressive model. IEEE Trans Inf Forensics Secur 8(9):1456–1468

    Article  Google Scholar 

  22. Kirchner M, Fridrich J (2010) On detection of median filtering in digital images. In: Media forensics and security II, vol 7541. International society for optics and photonics, p 754110

  23. Kuan DT, Sawchuk AA, Strand TC, Chavel P (1985) Adaptive noise smoothing filter for images with signal-dependent noise. IEEE Trans Pattern Anal Mach Intell 2:165–177

    Article  Google Scholar 

  24. Lee J-S (1983) Digital image smoothing and the sigma filter. Comput Vis, Graphics, Image Process 24(2):255–269

    Article  MathSciNet  Google Scholar 

  25. Li B, He J, Huang J, Shi Y-Q (2011) A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2 (2):142–172

    Google Scholar 

  26. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518

    Article  Google Scholar 

  27. Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205–214

    Article  Google Scholar 

  28. Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools and Appl 75(21):13557– 13583

    Article  Google Scholar 

  29. Ma Y, Luo X, Li X, Bao Z, Zhang Y Selection of rich model steganalysis features based on decision rough set α-positive region reduction, IEEE Transactions on Circuits and Systems for Video Technology, In press. https://doi.org/10.1109/TCSVT.2018.2799243

  30. Paris S, Durand F (2006) A fast approximation of the bilateral filter using a signal processing approach. In: European conference on computer vision. Springer, pp 568–580

  31. Pasquini C, Boato G, Perez-Gonzalez F (2014) Multiple jpeg compression detection by means of benford-fourier coefficients. In: 2014 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 113–118

  32. Schaefer G, Stich M (2003) Ucid: an uncompressed color image database. In: Storage and retrieval methods and applications for multimedia 2004, vol 5307, International Society for Optics and Photonics, pp 472–481

  33. Shi J, Xu L, Jia J (2014) Discriminative blur detection features. In: 2014 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 2965–2972

  34. Stamm MC, Wu M, Liu KR (2013) Information forensics: An overview of the first decade. IEEE Access 1:167–200

    Article  Google Scholar 

  35. Tang H, Ni R, Zhao Y, Li X (2018) Median filtering detection of small-size image based on cnn. J Vis Commun Image Represent 51:162–168

    Article  Google Scholar 

  36. Tomasi C, Manduchi R (1998) Bilateral filtering for gray and color images. In 1998 6th international conference on computer vision. IEEE, pp 839–846

  37. Tuceryan M, Jain AK (1993) Texture analysis. In Handbook of pattern recognition and computer vision. World Scientific, pp 235–276

  38. Wang J, Li T, Shi Y-Q, Lian S, Ye J (2017) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools Appl 76(22):23721– 23737

    Article  Google Scholar 

  39. Wang P, Liu F, Yang C, Luo X (2018) Blind forensics of image gamma transformation and its application in splicing detection. Journal of Visual Communication and Image Representation

  40. Wang P, Liu F, Yang C, Luo X (2018) Parameter estimation of image gamma transformation based on zero-value histogram bin locations. Signal Process Image Commun 64:33–45

    Article  Google Scholar 

  41. Wu R, Li X, Yang B (2011) Identifying computer generated graphics via histogram features. In: 2011 18th IEEE international conference on image processing (ICIP). IEEE, pp 1933–1936

  42. Wu Y, Li X, Zhao Y, Ni R (2017) A new detector for jpeg decompressed bitmap identification. In: Asia-pacific signal and information processing association annual summit and conference (APSIPA ASC). IEEE, pp 842–845

  43. Yang J, Xie J, Zhu G, Kwong S, Shi Y-Q (2014) An effective method for detecting double jpeg compression with the same quantization matrix. IEEE Trans Inf Forensics Secur 9(11):1933– 1942

    Article  Google Scholar 

  44. Yuan H-D (2011) Blind forensics of median filtering in digital images. IEEE Trans Inf Forensics Secur 6(4):1335–1345

    Article  Google Scholar 

  45. Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111

    Article  Google Scholar 

Download references

Acknowledgments

The authors greatly appreciate the anonymous reviewers for their valuable comments. This work was supported in part by the National Natural Science Foundation of China under Grant 61572489 and Grant 61872350, in part by the Basic Research Program of Shenzhen under Grant JCYJ20170818163403748, in part by the Youth Innovation Promotion Association of CAS under Grant 2015299, in part by the CAS Light of West China Program under Grant 2016-QNXZ-A-5, in part by the Science and Technology Planning Project of Guangdong Province under Grant 2017A050501027, and in part by the Shenzhen Discipline Construction Project for Urban Computing and Data Intelligence.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guopu Zhu.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ding, F., Shi, Y., Zhu, G. et al. Smoothing identification for digital image forensics. Multimed Tools Appl 78, 8225–8245 (2019). https://doi.org/10.1007/s11042-018-6807-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6807-6

Keywords

Navigation