Skip to main content
Log in

Detection of content-aware image resizing based on Benford’s law

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Content-aware image resizing is currently widely used because it maintains the original appearance of important objects to the greatest extent when the aspect ratio of an image changes during resizing. Content-aware image resizing techniques, such as seam carving, are also used for image forgery. A new Benford’s law-based algorithm for detecting content-aware resized images is presented. The algorithm extracts features on the basis of the first digit distribution of the discrete cosine transform coefficients, which follow the standard Benford’s law. We trained these features from both normal images and content-aware resized images using a support vector machine. The experimental results show that the proposed method can efficiently distinguish a content-aware resized image from a normal image, and its precision is better than that of existing methods, including those based on Markov features and others.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with j-linkage. Signal Process Image Commun 28(6):659–669

  • Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forens Secur 6(3):1099–1110

  • Avidan S, Shamir A (2007) Seam carving for content-aware image resizing. In: ACM transactions on graphics (TOG), vol 26. ACM, New York, pp 10

  • Benford F (1938) The law of anomalous numbers. In: Proceedings of the American Philosophical Society, pp 551–572

  • Chang CC, Lin CJ (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27

  • Chi-Yao W, Hong Zhang Y, Chun Lin L, Wang SJ (2013) Visible watermarking images in high quality of data hiding. J Supercomput 66(2):1033–1048

  • Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297

  • Fillion C, Sharma G (2010) Detecting content adaptive scaling of images for forensic applications. In: IS&T/SPIE electronic imaging. International Society for Optics and Photonics, San Francisco, pp 75410Z–75410Z

  • Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, Citeseer

  • Fu D, Shi YQ, Su W (2006) Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition. In: Digital Watermarking. Springer, Berlin, pp 177–187

  • Hill TP (1995) A statistical derivation of the significant-digit law. In: Statistical science, pp 354–363

  • Jin Li, Qian Wang, Cong Wang, Kui Ren (2011) Enhancing attribute-based encryption with attribute hierarchy. Mob Netw Appl 16(5):553–561

    Article  Google Scholar 

  • Li J, Chen X, Li M, Li J, Lee PC, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. In: IEEE transactions on parallel and distributed systems 25(6):1615–1625

  • Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681–1689

  • Li J, Kim K, Zhang F, Chen X (2007) Aggregate proxy signature and verifiably encrypted proxy signature. In: Provable security. Springer, Berlin, pp 208–217

  • Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE. IEEE, New York, pp 1–5

  • Lu W, Wu M (2011) Seam carving estimation using forensic hash. In: Proceedings of the thirteenth ACM multimedia workshop on multimedia and security. ACM, New York, pp 9–14

  • Sarkar A, Nataraj L, Manjunath BS (2009) Detection of seam carving and localization of seam insertions in digital images. In: Proceedings of the 11th ACM workshop on multimedia and security. ACM, New York, pp 107–116

  • Shi YQ, Chen C, Chen W (2007) A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on multimedia & security. ACM, New York, pp 51–62

  • Simon Newcomb (1881) Note on the frequency of use of the different digits in natural numbers. Am J Math 4(1):39–40

    MathSciNet  Google Scholar 

  • Tian-Tsong N, Shih-Fu C, Sun Q (2004) A data set of authentic and spliced image blocks. Columbia University, ADVENT Technical Report, p 203

  • Tsung-Yuan Liu, Wen-Hsiang Tsai (2010) Generic lossless visible watermarking new approach. IEEE Trans Image Process 19(5):1224–1235

    Article  MathSciNet  Google Scholar 

  • Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2013) Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inf Syst 10(2):667–684

  • Yilei W, Wong DS, Zhao C, Xu Q (2015) Fair two-party computation with rational parties holding private types. Security and communication. Networks 8(2):284–297

Download references

Acknowledgments

This study was funded by National Natural Science Foundation of China (No. 61502218, 61232016, U1405254), Outstanding Young Scientists Foundation Grant of Shandong Province (No. BS2014DX016), Natural Science Foundation of Shandong Province (ZR2014FM005, ZR2013 FL008), Shandong Province Higher Educational Science and Technology Program (J14LN20), Shandong Province Science and Technology Plan Projects (2014 GGB01944, 2015GSF116001), Doctoral Foundation of Lu dong University (LY2014034, LY2013005, LY2015033), the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET), Guangzhou Scholars Project (No. 1201561613).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guorui Sheng.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sheng, G., Li, T., Su, Q. et al. Detection of content-aware image resizing based on Benford’s law. Soft Comput 21, 5693–5701 (2017). https://doi.org/10.1007/s00500-016-2146-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-016-2146-6

Keywords

Navigation