Abstract
Content-aware image resizing is currently widely used because it maintains the original appearance of important objects to the greatest extent when the aspect ratio of an image changes during resizing. Content-aware image resizing techniques, such as seam carving, are also used for image forgery. A new Benford’s law-based algorithm for detecting content-aware resized images is presented. The algorithm extracts features on the basis of the first digit distribution of the discrete cosine transform coefficients, which follow the standard Benford’s law. We trained these features from both normal images and content-aware resized images using a support vector machine. The experimental results show that the proposed method can efficiently distinguish a content-aware resized image from a normal image, and its precision is better than that of existing methods, including those based on Markov features and others.
Similar content being viewed by others
References
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with j-linkage. Signal Process Image Commun 28(6):659–669
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forens Secur 6(3):1099–1110
Avidan S, Shamir A (2007) Seam carving for content-aware image resizing. In: ACM transactions on graphics (TOG), vol 26. ACM, New York, pp 10
Benford F (1938) The law of anomalous numbers. In: Proceedings of the American Philosophical Society, pp 551–572
Chang CC, Lin CJ (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27
Chi-Yao W, Hong Zhang Y, Chun Lin L, Wang SJ (2013) Visible watermarking images in high quality of data hiding. J Supercomput 66(2):1033–1048
Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297
Fillion C, Sharma G (2010) Detecting content adaptive scaling of images for forensic applications. In: IS&T/SPIE electronic imaging. International Society for Optics and Photonics, San Francisco, pp 75410Z–75410Z
Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, Citeseer
Fu D, Shi YQ, Su W (2006) Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition. In: Digital Watermarking. Springer, Berlin, pp 177–187
Hill TP (1995) A statistical derivation of the significant-digit law. In: Statistical science, pp 354–363
Jin Li, Qian Wang, Cong Wang, Kui Ren (2011) Enhancing attribute-based encryption with attribute hierarchy. Mob Netw Appl 16(5):553–561
Li J, Chen X, Li M, Li J, Lee PC, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. In: IEEE transactions on parallel and distributed systems 25(6):1615–1625
Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681–1689
Li J, Kim K, Zhang F, Chen X (2007) Aggregate proxy signature and verifiably encrypted proxy signature. In: Provable security. Springer, Berlin, pp 208–217
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE. IEEE, New York, pp 1–5
Lu W, Wu M (2011) Seam carving estimation using forensic hash. In: Proceedings of the thirteenth ACM multimedia workshop on multimedia and security. ACM, New York, pp 9–14
Sarkar A, Nataraj L, Manjunath BS (2009) Detection of seam carving and localization of seam insertions in digital images. In: Proceedings of the 11th ACM workshop on multimedia and security. ACM, New York, pp 107–116
Shi YQ, Chen C, Chen W (2007) A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on multimedia & security. ACM, New York, pp 51–62
Simon Newcomb (1881) Note on the frequency of use of the different digits in natural numbers. Am J Math 4(1):39–40
Tian-Tsong N, Shih-Fu C, Sun Q (2004) A data set of authentic and spliced image blocks. Columbia University, ADVENT Technical Report, p 203
Tsung-Yuan Liu, Wen-Hsiang Tsai (2010) Generic lossless visible watermarking new approach. IEEE Trans Image Process 19(5):1224–1235
Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2013) Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inf Syst 10(2):667–684
Yilei W, Wong DS, Zhao C, Xu Q (2015) Fair two-party computation with rational parties holding private types. Security and communication. Networks 8(2):284–297
Acknowledgments
This study was funded by National Natural Science Foundation of China (No. 61502218, 61232016, U1405254), Outstanding Young Scientists Foundation Grant of Shandong Province (No. BS2014DX016), Natural Science Foundation of Shandong Province (ZR2014FM005, ZR2013 FL008), Shandong Province Higher Educational Science and Technology Program (J14LN20), Shandong Province Science and Technology Plan Projects (2014 GGB01944, 2015GSF116001), Doctoral Foundation of Lu dong University (LY2014034, LY2013005, LY2015033), the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET), Guangzhou Scholars Project (No. 1201561613).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants performed by any of the authors.
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Sheng, G., Li, T., Su, Q. et al. Detection of content-aware image resizing based on Benford’s law. Soft Comput 21, 5693–5701 (2017). https://doi.org/10.1007/s00500-016-2146-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-016-2146-6