CASIA Image Tampering Detection Evaluation Database

Image forensics has now raised the anxiety of justice as increasing cases of abusing tampered images in newspapers and court for evidence are reported recently. With the goal of verifying image content authenticity, passive-blind image tampering detection is called for. More realistic open benchmark databases are also needed to assist the techniques. Recently, we collect a natural color image database with realistic tampering operations. The database is made publicly available for researchers to compare and evaluate their proposed tampering detection techniques. We call this database CASI-A Image Tampering Detection Evaluation Database. We describe the purpose, the design criterion, the organization and self-evaluation of this database in this paper.

[1]  Shih-Fu Chang,et al.  A Data Set of Authentic and Spliced Image Blocks , 2004 .

[2]  Shih-Fu Chang,et al.  Discrimination of Computer Synthesized or Recaptured Images from Real Images , 2013 .

[3]  K.J.R. Liu,et al.  Component Forensics of Digital Cameras: A Non-Intrusive Approach , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[4]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[5]  H. Farid A Survey of Image Forgery Detection , 2008 .

[6]  Gwenaël J. Doërr,et al.  JPEG recompression detection , 2010, Electronic Imaging.

[7]  Nasir D. Memon,et al.  Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[8]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[9]  Jing Dong,et al.  Effective image splicing detection based on image chroma , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[10]  Yao Zhao,et al.  Edge-based Blur Metric for Tamper Detection , 2010, J. Inf. Hiding Multim. Signal Process..

[11]  Jiwu Huang,et al.  Detect Digital Image Splicing with Visual Cues , 2009, Information Hiding.

[12]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[13]  Jing Dong,et al.  A Survey of Passive Image Tampering Detection , 2009, IWDW.