10 November 2023 Improved image forgery localization method from a statistical perspective
Lei Liu, Peng Sun, Yubo Lang, Jingjiao Li, Hong Guo, Qimeng Lu
Author Affiliations +
Abstract

Powerful image editing software makes the process of image manipulation easy, which increases security risks. Therefore, it is urgent to locate the tampered region to uncover the processing history. However, previous research has mainly focused on feature extraction, with little discussion on classifiers for classifying original and tampered regions. We improve the splicing forgery localization method from a statistical perspective. The refined color filter array feature provides sufficient data for statistical analysis, and the geometric mean is used to eliminate anomalous data. Subsequently, a classifier that combines the expectation–maximization algorithm and Bayesian theory is proposed to binarize the original and tampered regions. The two steps of feature extraction and feature classification are associated from a statistical perspective, which ultimately improve the performance of the method effectively. Extensive experimental results demonstrate that the refined feature used for classification has several advantages, and the proposed classifier is appropriate for handling complex image manipulation across different statistical distributions. The proposed method outperforms the reference methods in both the Columbia and Korus datasets.

© 2023 SPIE and IS&T
Lei Liu, Peng Sun, Yubo Lang, Jingjiao Li, Hong Guo, and Qimeng Lu "Improved image forgery localization method from a statistical perspective," Journal of Electronic Imaging 32(6), 063006 (10 November 2023). https://doi.org/10.1117/1.JEI.32.6.063006
Received: 6 July 2023; Accepted: 24 October 2023; Published: 10 November 2023
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Interpolation

Feature extraction

Histograms

Counterfeit detection

Statistical analysis

Expectation maximization algorithms

Binary data

Back to Top