A Passive-Blind Forgery Detection Scheme Based on Content-Adaptive Quantization Table Estimation

In this paper, we propose a passive-blind scheme for detecting forged images. The scheme leverages quantization table estimation to measure the inconsistency among images. To improve the accuracy of the estimation process, each AC DCT coefficient is first classified into a specific type; then the corresponding quantization step size is measured adaptively from its energy density spectrum (EDS) and the EDS's Fourier transform. The proposed content-adaptive quantization table estimation scheme is comprised of three phases: pre-screening, candidate region selection, and tampered region identification. In the pre-screening phase, we determine whether an input image has been JPEG compressed, and count the number of quantization steps whose size is equal to one. To select candidate regions for estimating the quantization table, we devise a candidate region selection algorithm based on seed region generation and region growing. First, the seed region generation operation finds a suitable region by removing suspect regions, after which the selected seed region is merged with other suitable regions to form a candidate region. To avoid merging suspect regions, a candidate region refinement operation is performed in the region growing step. After estimating the quantization table from the candidate region, an maximum-likelihood-ratio classifier exploits the inconsistency of the quantization table to identify tampered regions block by block. To evaluate the scheme's performance in terms of tampering detection, three common forgery techniques, copy-paste tampering, inpainting, and composite tampering, are used. Experiment results demonstrate that the proposed scheme can estimate quantization tables and identify tampered regions effectively.

[1]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.

[2]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[3]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[4]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[5]  Jessica J. Fridrich,et al.  On detection of median filtering in digital images , 2010, Electronic Imaging.

[6]  Rafael C. González,et al.  Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[7]  Nasir D. Memon,et al.  Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.

[8]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[9]  Husrev T. Sencar,et al.  Overview of State-of-the-Art in Digital Image Forensics , 2007 .

[10]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Ee-Chien Chang,et al.  Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[12]  Norman Morrison,et al.  Introduction to Fourier Analysis , 1994, An Invitation to Modern Number Theory.

[13]  Chia-Wen Lin,et al.  Video forgery detection using correlation of noise residue , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[14]  Nenghai Yu,et al.  Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..

[15]  Jiangbin Zheng,et al.  A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering , 2008, IWDW.

[16]  Atam P. Dhawan Medical Image Analysis , 2003 .

[17]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[18]  Jing Dong,et al.  A Survey of Passive Image Tampering Detection , 2009, IWDW.

[19]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[20]  Rodger E. Ziemer,et al.  Elements of Engineering Probability and Statistics , 1996 .

[21]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[22]  Soo-Chang Pei,et al.  Detecting digital tampering by blur estimation , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).

[23]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[24]  Guo-Shiang Lin,et al.  Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques , 2006, IEEE Transactions on Information Forensics and Security.

[25]  Shih-Fu Chang,et al.  Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[26]  Mohan S. Kankanhalli,et al.  A Survey on Digital Camera Image Forensic Methods , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[27]  Chiou-Ting Hsu,et al.  Image tampering detection by blocking periodicity analysis in JPEG compressed images , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[28]  David G. Stork,et al.  Pattern Classification , 1973 .

[29]  Jiwu Huang,et al.  A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[30]  H. Farid A Survey of Image Forgery Detection , 2008 .

[31]  Mahalingam Ramkumar,et al.  A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[32]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[33]  H. Farid Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act , 2004 .

[34]  Nasir D. Memon,et al.  Image manipulation detection , 2006, J. Electronic Imaging.

[35]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[36]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.