Abstract
Driven by the development of digital technology, manipulation towards digital images becomes simpler than ever before in recent years. Many smartphone applications bring the convenience for ordinary people to edit images in real-time without any professional skills. The digital forensics is an important research field in information security against the situation. In image forensics, it is necessary to validate all possible manipulation during the forming history of given images. Thus, many image forensics researchers focus on detecting certain manipulations to protect the integrity of images such as verifying Gaussian filtering. However, these works tend to make binary classification that if the image is processed by certain manipulation or not. The classification of same manipulation based on parameters are ignored. Here, we propose a method to estimate the parameters of Gaussian filtering to process images based on convolutional neural networks (CNN). Besides, in the modern world, it is also extremely important to enable the simulation in real-time to process with the given data immediately. The proposed method can also validate the given image in a quite short time. Our experiments show that the proposed method can provide excellent real-time performance in estimating the window size and standard deviation of Gaussian filterings. The well-trained model can satisfy us with not only the estimation accuracy, but also the validation time simultaneously.
Similar content being viewed by others
References
Farid, H.: Image forgery detection. IEEE Signal Process. Mag. 26(2), 16–25 (2009)
Fridrich, J.: Digital image forensics. IEEE Signal Process. Mag. 26, 2 (2009)
Piva, A.: An overview on image forensics. ISRN Signal Process 2013 (2013)
Swaminathan, A., et al.: Digital image forensics via intrinsic fingerprints. IEEE Trans. Inf. Forensic. Secur. 3.1, 101–117 (2008)
Qi, L., et al.: Time-aware distributed service recommendation with privacy-preservation. Inf. Sci. 480, 354–364 (2019)
Qi, L., et al.: A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Fut. Gen. Comput. Syst. 88, 636–643 (2018)
Jung, K.-H., Yoo, K.-Y.: Steganographic method based on interpolation and LSB substitution of digital images. Multimed. Tools Appl. 74(6), 2143–2155 (2015)
Meng, R., Rice, S.G., Wang, J., Sun, X.: A fusion steganographic algorithm based on faster R-CNN. Comput. Mater. Contin. 55(1), 1–16 (2018)
Lyu, S., Farid, H.: Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forensic. Secur. 1(1), 111–119 (2006)
Silva, E., Carvalho, T., Ferreira, A., Rocha, A.: Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J. Vis. Commun. Image Rep. 29, 16–32 (2015)
Lee, J.-C.: Copy-move image forgery detection based on Gabor magnitude. J. Vis. Commun. Image Rep. 31, 320–334 (2015)
Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensic. Secur. 1(2), 205–214 (2006)
Li, C.-T.: Source camera identification using enhanced sensor pattern noise. IEEE Trans. Inf. Forensic. Secur. 5(2), 280–287 (2010)
Ding, F., Zhu, G., Yang, J., Xie, J., Shi, Y.-Q.: Edge perpendicular binary coding for USM sharpening detection. IEEE Signal Process. Lett. 22(3), 327–331 (2014)
Ding, F., Zhu, G., Dong, W., Shi, Y.-Q.: An efficient weak sharpening detection method for image forensics. J. Vis. Commun. Image Rep. 50, 93–99 (2018)
Zhu, N., Deng, C., Gao, X.: Image sharpening detection based on multiresolution overshoot artifact analysis. Multimed. Tools Appl. 76(15), 16563–16580 (2017)
Guo, J.-M., Le, T.-N.: Secret communication using JPEG double compression. IEEE Signal Process. Lett. 17(10), 879–882 (2010)
Barni, M., Bondi, L., Bonettini, N., Bestagini, P., Costanzo, A., Maggini, M., Tondi, B., Tubaro, S.: Aligned and non-aligned double JPEG detection using convolutional neural networks. J. Vis. Commun. Image Rep. 49, 153–163 (2017)
Yang, J., et al.: An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Forensic. Secur. 9.11, 1933–1942 (2014)
Zhang, Y., Li, S., Wang, S., Shi, Y.Q.: Revealing the traces of median filtering using high-order local ternary patterns. IEEE Signal Process. Lett. 21(3), 275–279 (2014)
Boroumand, M., Fridrich, J.: Scalable processing history detector for JPEG images. Electron. Imaging 2017(7), 128–137 (2017)
Cao, G. et al.: Forensic detection of median filtering in digital images. Multimedia and Expo (ICME), 2010 IEEE International Conference on. IEEE (2010)
Ravi, H., Subramanyam, A.V., Emmanuel, S.: ACE—an effective anti-forensic contrast enhancement technique. IEEE Signal Process. Lett. 23(2), 212–216 (2015)
Stamm, M.C. et al.: Undetectable image tampering through JPEG compression anti-forensics. Image Processing (ICIP), 2010 17th IEEE International Conference on IEEE (2010)
Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensic. Secur. 10(3), 507–518 (2014)
Xu, J., Ling, Y., Zheng, X.: Forensic detection of Gaussian low-pass filtering in digital images. In: IEEE, 2015 8th International Congress on Image and Signal Processing (CISP), pp. 819–823 (2015)
Rhee, K.H.: Gaussian filtering detection using band pass residual and contrast of forgery image. In: Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2016 IEEE 7th Annual, IEEE (2016)
Paszke, A. et al.: Enet: a deep neural network architecture for real-time semantic segmentation. arXiv:1606.02147 (2016)
Xu, G., et al.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23.5, 708–712 (2016)
Chen, J.: Median filtering forensics based on convolutional neural networks. IEEE Signal Process. Lett. 22.11, 1849–1853 (2015)
Bondi, L., et al.: First steps toward camera model identification with convolutional neural networks. IEEE Signal Process. Lett. 24.3, 259–263 (2017)
Cui, Q., McIntosh, S., Sun, H.: Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs. Comput. Mater. Contin. 55(2), 229–241 (2018)
Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)
Ding, F. et al.: Smoothing identification for digital image forensics. Multimed. Tools Appl. pp. 1–21 (2018)
Yang, J., et al.: Estimating JPEG compression history of bitmaps based on factor histogram. Digit. Signal Process. 41, 90–97 (2015)
Zhou, Z. et al.: Multiple distance-based coding: toward scalable feature matching for large-scale web image search. IEEE Trans. Big Data (2019)
Ye, J., Shen, Z., Behrani, P., Ding, F., Shi, Y.-Q.: Detecting USM image sharpening by using CNN. Signal Process. Image Commun. 68, 258–264 (2018)
Yuan, C., Li, X., Wu, Q.M.J., Li, J., Sun, X.: Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis. Comput. Mater. Contin. 53(3), 357–371 (2017)
Slavkovikj, V. et al.: Hyperspectral image classification with convolutional neural networks. In: Proceedings of the 23rd ACM International Conference on Multimedia, ACM (2015)
Bas, P., Filler, T., Pevný, T.: “ Break Our Steganographic System”: The Ins and Outs of Organizing BOSS. International Workshop on Information Hiding. Springer, Berlin (2011)
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China under Grant 61872350 and Grant 61572489, in part by the Youth Innovation Promotion Association of CAS under Grant 2015299, in part by the Basic Research Program of Shenzhen under Grant JCYJ20170818163403748, and in part by the Shenzhen Discipline Construction Project for Urban Computing and Data Intelligence.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ding, F., Shi, Y., Zhu, G. et al. Real-time estimation for the parameters of Gaussian filtering via deep learning. J Real-Time Image Proc 17, 17–27 (2020). https://doi.org/10.1007/s11554-019-00907-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-019-00907-5