Blind Detection of Digital Photomontage using Higher Order Statistics

The advent of the modern digital technology has not only brought about the prevalent use of digital images in our daily activities but also the ease of creating image forgery such as digital photomontages using publicly accessible and userfriendly image processing tools such as Adobe Photoshop. Among all operations involved in image photomontage, image splicing can be considered the most fundamental and essential operation. In this report, our goal is to detect spliced images by a passive-blind approach, which can do without any prior information, as well as without the need of embedding watermark or extracting image features at the moment of image acquisition. Bicoherence, a third-order moment spectra and an effective technique for detecting quadratic phase coupling (QPC), has been previously proposed for passive-blind detection of human speech splicing, based on the assumption that human speech signal is low in QPC. However, images originally have non-trivial level of bispectrum energy, which implies an originally significant level of QPC. Hence, we argue that straightforward applications of bicoherence features for detecting image splicing are not effective. Furthermore, the theoretical connection between bicoherence and image splicing is not clear. For this work, we created a data set, which contains 933 authentic and 912 spliced image blocks. Besides that, we proposed two general methods, i.e., characterizing the image features that bicoherence is sensitive to and estimating the splicinginvariant component, for improving the performance of the bicoherence technique. We also proposed a model of image splicing to explain the effectiveness of bicoherence for image-splicing detection. Finally, we evaluate the performance of the features derived from the proposed improvement methods by Support Vector Machine (SVM) classification on the data set. The results show a significant improvement in image splicing detection accuracy, from 62% to 72%.

[1]  Takuso Sato,et al.  Real‐time bispectral analysis of gear noise and its application to contactless diagnosis , 1977 .

[2]  Paul R. White,et al.  Practical Issues Concerning the Use of Bicoherence for the detection of quadratic phase coupling , 1995 .

[3]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[4]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[5]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[6]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[7]  E. Powers,et al.  Digital Bispectral Analysis and Its Applications to Nonlinear Wave Interactions , 1979, IEEE Transactions on Plasma Science.

[8]  Nasir D. Memon,et al.  Distortion-bounded authentication techniques , 2000, Electronic Imaging.

[9]  Stanley Osher,et al.  Modeling Textures with Total Variation Minimization and Oscillating Patterns in Image Processing , 2003, J. Sci. Comput..

[10]  G. Krieger,et al.  Higher-order statistics of natural images and their exploitation by operators selective to intrinsic dimensionality , 1997, Proceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics.

[11]  C Ginzburg,et al.  Morelli, Freud and Sherlock Holmes: clues and scientific method. , 1980, History workshop.

[12]  Mohan S. Kankanhalli,et al.  Robust image authentication using content based compression , 2003, Multimedia Systems.

[13]  Nasir Memon,et al.  Authentication techniques for multimedia content , 1999, Other Conferences.

[14]  Rafik A. Goubran,et al.  Robust voice activity detection using higher-order statistics in the LPC residual domain , 2001, IEEE Trans. Speech Audio Process..

[15]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[16]  James D. Hamilton Time Series Analysis , 1994 .

[17]  Shaul Hanany,et al.  An estimate of the Cosmological Bispectrum from the MAXIMA-1 CMB map , 2001 .

[18]  Stephen McLaughlin,et al.  Detecting Nonlinearities In Speech Sounds Using The Bicoherence , 1996 .

[19]  Jean-Luc Dugelay,et al.  Blind detection of malicious alterations on still images using robust watermarks , 2000 .

[20]  Hany Farid,et al.  Detecting Digital Forgeries Using Bispectral Analysis , 1999 .

[21]  Min Wu,et al.  Reading Between the Lines: Lessons from the SDMI Challenge , 2001, USENIX Security Symposium.

[22]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[23]  T. Bullock,et al.  Bicoherence of intracranial EEG in sleep, wakefulness and seizures. , 1997, Electroencephalography and clinical neurophysiology.

[24]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[25]  Georgios B. Giannakis,et al.  Polyspectral analysis of mixed processes and coupled harmonics , 1996, IEEE Trans. Inf. Theory.

[26]  Annabel M. Patterson Reading Between the Lines , 1992 .

[27]  Paul R. White,et al.  The interpretation of the bispectra of vibration signals—: I. Theory , 1995 .

[28]  H. Farid A picture tells a thousand lies , 2003 .

[29]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[30]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[31]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[32]  A.V. Oppenheim,et al.  The importance of phase in signals , 1980, Proceedings of the IEEE.

[33]  J. Oliver,et al.  When seeing is believing. , 1948, Stanford medical bulletin.

[34]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[35]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[36]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[37]  Gerhard Krieger,et al.  Nonlinear image operators for the evaluation of local intrinsic dimensionality , 1996, IEEE Trans. Image Process..

[38]  Shih-Fu Chang,et al.  A Data Set of Authentic and Spliced Image Blocks , 2004 .

[39]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[40]  Emma Vere-Jones Picture perfect , 1991, Nature.