Skip to main content
Log in

The detecting system of image forgeries with noise features and EXIF information

  • Published:
Journal of Systems Science and Complexity Aims and scope Submit manuscript

Abstract

Recently, the digital image blind forensics technology has received an increasing attention in academic community. This paper aims at developing a new identification approach based on the statistical noise and exchangeable image file format (EXIF) information of image for images authentication. In particular, the authors can identify whether the current image has been modified or not by utilizing the relevance between noise and EXIF parameters and comparing the real values with the estimated values of the EXIF parameters. Experimental results validate the proposed method. That is, the detecting system can identify the doctored image effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Hussain M, Muhammad G, Saleh S Q, et al., Copy-move image forgery detection using multiresolution weber descriptors, The 8th International Conference on Singnal Image Technology and Internet Based Systems, 2012, 395–401.

    Google Scholar 

  2. Bora R M and Shahane N M, Image forgery detection through motion blur estimates, IEEE International Conference on Computational Intelligence and Computing Research, 2012, 1–4.

    Google Scholar 

  3. Li Y Z, Wu X M, Niu S Z, et al., Detecting forgeries of Chinese character based on camera calibration, The Journal of Beijing Universities of Posts and Telecommunications, 2012, 35(6): 16–19.

    Article  Google Scholar 

  4. Johnson M K and Farid H, Exposing digital forgeries in complex lighting environments, IEEE Transactions on Information Forensics and Security, 2007, 2: 450–461.

    Article  Google Scholar 

  5. Popescu A C and Farid H, Exposing digital forgeries by detecting traces of re-sampling, IEEE Trans. Signal Processing, 2005, 53(2): 758–767.

    Article  MathSciNet  Google Scholar 

  6. Popescu A C and Farid H, Exposing digital forgeries in color filter array interpolated images, IEEE Transactions on Signal Processing, 2005, 53(10): 3948–3959.

    Article  MathSciNet  Google Scholar 

  7. Valenzise G, Tagliasacchi M, and Tubaro S, Revealing the traces of JPEG compression antiforensics, IEEE Trans. Information Forensics and Security, 2013, 8(2): 335–349.

    Article  Google Scholar 

  8. Huang F, Huang J, and Yun Q, Detecting double JPEG compression with the same quantization matri, IEEE Trans. Information Forensics and Security, 2010, 5(4): 848–856.

    Article  Google Scholar 

  9. Johnson M K and Farid H, Detecting photographic composites of people, Digital Watermarking, Lecture Notes in Computer Science, 2008, 5041: 19–33.

    Article  Google Scholar 

  10. Kee E, O’Brien J, and Farid H, Exposing photo manipulation with inconsistent shadows, ACM Transaction on Graphics, 2013, 32(4): 1–11.

    Article  Google Scholar 

  11. Zhao J and Kang W, Detection algorithm of image forgery based on principal components analysis of projection data, Computer Engineering, 2012, 38(10): 203–205.

    MathSciNet  Google Scholar 

  12. Kee E, Johnson M K, and Farid H, Digital image authentication from jpeg headers, IEEE Trans. Inf. Forensics Security, 2011, 6(3): 1066–1075.

    Article  Google Scholar 

  13. Fan J Y, Cao H, and Sattar F, Modeling the EXIF-image correlation for image manipulation detection, IEEE Press, 2011, 1945–1948.

    Google Scholar 

  14. Lü J H, Chen G R, and Zhang S C, A unified chaotic system and its research, Journal of the Graduate School of the Chinese Academy of Science, 2003, 20(1): 123–129.

    Google Scholar 

  15. Lü J H, Mathematical models and synchronization criterions of complex dynamical networks, Journal of Systems Engineering — Theory and Practice, 2004, 24(4): 17–22.

    Google Scholar 

  16. Wang P, Li D M, Wu X Q, and Lv J H, Estimating the ultimate bound for the generalized quadratic autonomous chaotic systems, Proceedings of the 29th Chinese Control Conference, 2010, 791–795.

    Google Scholar 

  17. Holst G C and Lomheim T S, CMOS/CCD Sensors and Camera Systems, Society of Photo Optical, 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoting Sun.

Additional information

This work was supported by the National Natural Science Foundation of China under Grant Nos. 61370195 and 11101048, Beijing Natural Science Foundation under Grant No. 4132060, and the National Cryptography Development Foundation of China under Grant No. MMJJ201201002.

This paper was recommended for publication by Editor LÜ Jinhu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, X., Li, Y., Niu, S. et al. The detecting system of image forgeries with noise features and EXIF information. J Syst Sci Complex 28, 1164–1176 (2015). https://doi.org/10.1007/s11424-015-4023-2

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11424-015-4023-2

Keywords

Navigation