Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization

Accurate unsupervised tampering localization is one of the most challenging problems in digital image forensics. In this paper, we consider a photo response non-uniformity analysis and focus on the detection of small forgeries. For this purpose, we adopt a recently proposed paradigm of multi-scale analysis and discuss various strategies for its implementation. First, we consider a multi-scale fusion approach, which involves combination of multiple candidate tampering probability maps into a single, more reliable decision map. The candidate maps are obtained with sliding windows of various sizes and thus allow to exploit the benefits of both the small- and large-scale analyses. We extend this approach by introducing modulated threshold drift and content-dependent neighborhood interactions, leading to improved localization performance with superior shape representation and easier detection of small forgeries. We also discuss two novel alternative strategies: a segmentation-guided approach, which contracts the decision statistic to a central segment within each analysis window and an adaptive-window approach, which dynamically chooses analysis window size for each location in the image. We perform extensive experimental evaluation on both synthetic and realistic forgeries and discuss in detail practical aspects of parameter selection. Our evaluation shows that the multi-scale analysis leads to significant performance improvement compared with the commonly used single-scale approach. The proposed multi-scale fusion strategy delivers stable results with consistent improvement in various test scenarios.

[1]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[2]  Kannan Ramchandran,et al.  Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[3]  Bin Li,et al.  Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation , 2015, IEEE Transactions on Image Processing.

[4]  Jiwu Huang,et al.  Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.

[5]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[6]  Chang-Tsun Li Source camera identification using enhanced sensor pattern noise , 2010, IEEE Trans. Inf. Forensics Secur..

[7]  Alessandro Foi,et al.  Image Denoising by Sparse 3-D Transform-Domain Collaborative Filtering , 2007, IEEE Transactions on Image Processing.

[8]  Chi-Keung Tang,et al.  Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..

[9]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[10]  Davide Cozzolino,et al.  Multiple Classifier Systems for Image Forgery Detection , 2013, ICIAP.

[11]  Carsten Rother,et al.  DenseCut: Densely Connected CRFs for Realtime GrabCut , 2015, Comput. Graph. Forum.

[12]  Giulia Boato,et al.  Detecting photo manipulation on signs and billboards , 2010, 2010 IEEE International Conference on Image Processing.

[13]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[14]  Xiaochun Cao,et al.  Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut , 2010, IEEE Transactions on Information Forensics and Security.

[15]  Jian Sun,et al.  Guided Image Filtering , 2010, ECCV.

[16]  Alex ChiChung Kot,et al.  Manipulation Detection on Image Patches Using FusionBoost , 2012, IEEE Transactions on Information Forensics and Security.

[17]  Davide Cozzolino,et al.  Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[18]  Bin Li,et al.  Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[19]  Jiwu Huang,et al.  Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk , 2016, IEEE Signal Processing Letters.

[20]  J. Fridrich,et al.  Digital image forensics , 2009, IEEE Signal Processing Magazine.

[21]  Vladimir Kolmogorov,et al.  An experimental comparison of min-cut/max- flow algorithms for energy minimization in vision , 2001, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[22]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[23]  Alex ChiChung Kot,et al.  Blurred Image Splicing Localization by Exposing Blur Type Inconsistency , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[25]  Mauro Barni,et al.  A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence , 2013, IEEE Transactions on Information Forensics and Security.

[26]  Guna Seetharaman,et al.  Harnessing Motion Blur to Unveil Splicing , 2014, IEEE Transactions on Information Forensics and Security.

[27]  Shaziya .P.S. Khan,et al.  Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .

[28]  Davide Cozzolino,et al.  Guided filtering for PRNU-based localization of small-size image forgeries , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[29]  Luisa Verdoliva,et al.  A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.

[30]  Jiwu Huang,et al.  Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise , 2012, IEEE Transactions on Information Forensics and Security.

[31]  Olga Veksler,et al.  Fast Approximate Energy Minimization via Graph Cuts , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[32]  Mauro Barni,et al.  Dealing with uncertainty in image forensics: A fuzzy approach , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[33]  S. Prasad,et al.  On Resampling Detection and its Application to Detect Image Tampering , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[34]  A. De Rosa,et al.  Unsupervised fusion for forgery localization exploiting background information , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[35]  Hai-Dong Yuan,et al.  Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.

[36]  Nasir D. Memon,et al.  Image manipulation detection , 2006, J. Electronic Imaging.

[37]  L. Verdoliva,et al.  PRNU-based detection of small-size image forgeries , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).

[38]  Timothy K. Shih,et al.  Tamper Detection of JPEG Image Due to Seam Modifications , 2015, IEEE Transactions on Information Forensics and Security.

[39]  Jessica J. Fridrich,et al.  Camera identification from cropped and scaled images , 2008, Electronic Imaging.

[40]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[41]  Kai Wang,et al.  General-purpose image forensics using patch likelihood under image statistical models , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[42]  Jessica J. Fridrich,et al.  Sensor-fingerprint based identification of images corrected for lens distortion , 2012, Other Conferences.

[43]  Martial Hebert,et al.  Exploiting Inference for Approximate Parameter Learning in Discriminative Fields: An Empirical Study , 2005, EMMCVPR.

[44]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[45]  Shih-Fu Chang,et al.  Camera Response Functions for Image Forensics: An Automatic Algorithm for Splicing Detection , 2010, IEEE Transactions on Information Forensics and Security.

[46]  Jiwu Huang,et al.  A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.

[47]  Xufeng Lin,et al.  Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization , 2016, IEEE Transactions on Information Forensics and Security.

[48]  Nasir D. Memon,et al.  Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[49]  Chang-Tsun Li,et al.  Using improved imaging sensor pattern noise for source camera identification , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[50]  Davide Cozzolino,et al.  A feature-based approach for image tampering detection and localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[51]  Chiou-Ting Hsu,et al.  What has been tampered? From a sparse manipulation perspective , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[52]  Xinpeng Zhang,et al.  Detecting Image Splicing Based on Noise Level Inconsistency , 2017, Multimedia Tools and Applications.

[53]  Giulia Boato,et al.  RAISE: a raw images dataset for digital image forensics , 2015, MMSys.

[54]  Paolo Bestagini,et al.  Multi-Clue Image Tampering Localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).