Abstract Image Statistical Frameworks for Digital Image Forensics Image Statistical Frameworks for Digital Image Forensics Image Statistical Frameworks for Digital Image Forensics Patchara Sutthiwan Markovian Rake Transform for Digital Image Tampering Detection, " Transactions on Data Hiding and Mul

The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specified conditions is that the photocopy or reproduction is not to be " used for any purpose other than private study, scholarship, or research. " If a, user makes a request for, or later uses, a photocopy or reproduction for purposes in excess of " fair use " that user may be liable for copyright infringement, This institution reserves the right to refuse to accept a copying order if, in its judgment, fulfillment of the order would involve violation of copyright law. Please Note: The author retains the copyright while the New Jersey Institute of Technology reserves the right to distribute this thesis or dissertation Printing note: If you do not wish to print this page, then select " Pages from: first page # to: last page # " on the print dialog screen The Van Houten library has removed some of the personal information and all signatures from the approval page and biographical sketches of theses and dissertations in order to protect the identity of NJIT graduates and faculty. tablet personal computers as well as high-speed networks have made a digital image a conventional medium for visual information. Creation, duplication, distribution, or tampering of such a medium can be easily done, which calls for the necessity to be able to trace back the authenticity or history of the medium. Digital image forensics is an emerging research area that aims to resolve the imposed problem and has grown in popularity over the past decade. On the other hand, anti-forensics has emerged over the past few years as a relatively new branch of research, aiming at revealing the weakness of the forensic technology. These two sides of research move digital image forensic technologies to the next higher level. Three major contributions are presented in this dissertation as follows. First, an effective multi-resolution image statistical framework for digital image forensics of passive-blind nature is presented in the frequency domain. The image statistical framework is generated by applying Markovian rake transform to image luminance component. Markovian rake transform is the applications of Markov process to difference arrays which are derived from the quantized block discrete cosine transform 2-D …

[1]  Robert M. Haralick,et al.  Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..

[2]  Azriel Rosenfeld,et al.  A Comparative Study of Texture Measures for Terrain Classification , 1975, IEEE Transactions on Systems, Man, and Cybernetics.

[3]  S. Leigh,et al.  Probability and Random Processes for Electrical Engineering , 1989 .

[4]  Richard C. Dubes,et al.  Performance evaluation for four classes of textural features , 1992, Pattern Recognit..

[5]  Guillermo Sapiro,et al.  LOCO-I: a low complexity, context-based, lossless image compression algorithm , 1996, Proceedings of Data Compression Conference - DCC '96.

[6]  Matti Pietikäinen,et al.  A comparative study of texture measures with classification based on featured distributions , 1996, Pattern Recognit..

[7]  Trevor Hastie,et al.  Additive Logistic Regression : a Statistical , 1998 .

[8]  Paul A. Viola,et al.  Boosting Image Retrieval , 2000, Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662).

[9]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[10]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.

[11]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[12]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[13]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[14]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[15]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[16]  Arjen P. de Vries,et al.  Detecting cartoons: a case study in automatic video-genre classification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[17]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[18]  Yun Q. Shi,et al.  A unified authentication framework for JPEG2000 , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[19]  Jian Sun,et al.  Lazy snapping , 2004, SIGGRAPH 2004.

[20]  Jiaya Jia,et al.  Poisson matting , 2004, SIGGRAPH 2004.

[21]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[22]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[23]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[24]  Nasir D. Memon,et al.  Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[25]  Shih-Fu Chang,et al.  Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.

[26]  Chengyun Yang,et al.  Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.

[27]  Rainer Böhme,et al.  Assessment of Steganalytic Methods Using Multiple Regression Models , 2005, Information Hiding.

[28]  B. S. Manjunath,et al.  Steganalysis of spread spectrum data hiding exploiting cover memory , 2005, IS&T/SPIE Electronic Imaging.

[29]  Shih-Fu Chang,et al.  Columbia Photographic Images and Photorealistic Computer Graphics Dataset , 2005 .

[30]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[31]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[32]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[33]  Wei-Ying Ma,et al.  Automatic Classification of Photographs and Graphics , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[34]  Wei Su,et al.  Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[35]  Wei Su,et al.  Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition , 2006, IWDW.

[36]  Maria Petrou,et al.  Image processing - dealing with texture , 2020 .

[37]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[38]  Shih-Fu Chang,et al.  Passive-blind Image Forensics , 2006 .

[39]  Shih-Fu Chang,et al.  Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[40]  Yun Q. Shi,et al.  A natural image model approach to splicing detection , 2007, MM&Sec.

[41]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[42]  Wei Su,et al.  Steganalysis Versus Splicing Detection , 2008, IWDW.

[43]  Yun Q. Shi,et al.  Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[44]  Wei Su,et al.  Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.

[45]  Yun Q. Shi,et al.  Steganalyzing Texture Images , 2007, 2007 IEEE International Conference on Image Processing.

[46]  Tian-Tsong Ng,et al.  Recaptured photo detection using specularity distribution , 2008, 2008 15th IEEE International Conference on Image Processing.

[47]  Jing Dong,et al.  Run-Length and Edge Statistics Based Approach for Image Splicing Detection , 2009, IWDW.

[48]  Wei Su,et al.  A machine learning based scheme for double JPEG compression detection , 2008, 2008 19th International Conference on Pattern Recognition.

[49]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[50]  Yun Q. Shi,et al.  Detection of digital image and video forgeries , 2008 .

[51]  Bin Li,et al.  Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[52]  Jing Dong,et al.  Effective image splicing detection based on image chroma , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[53]  Jiwu Huang,et al.  Detect Digital Image Splicing with Visual Cues , 2009, Information Hiding.

[54]  Yun Q. Shi,et al.  Computer graphics classification based on Markov process model and boosting feature selection technique , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[55]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[56]  Yun Q. Shi,et al.  An Enhanced Statistical Approach to Identifying Photorealistic Images , 2009, IWDW.

[57]  Nasir D. Memon,et al.  Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[58]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[59]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[60]  Jing Dong,et al.  New developments in color image tampering detection , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[61]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[62]  Fangjun Huang,et al.  Detecting Double JPEG Compression With the Same Quantization Matrix , 2010, IEEE Transactions on Information Forensics and Security.

[63]  K. J. Ray Liu,et al.  Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.

[64]  Tieniu Tan,et al.  Image tampering detection based on stationary distribution of Markov chain , 2010, 2010 IEEE International Conference on Image Processing.

[65]  Yun Q. Shi,et al.  A Smart Phone Image Database for Single Image Recapture Detection , 2010, IWDW.

[66]  Wei Su,et al.  Rake transform and edge statistics for image forgery detection , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[67]  Shih-Fu Chang,et al.  Single-view recaptured image detection based on physics-based features , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[68]  Alex ChiChung Kot,et al.  Identification of recaptured photographs on LCD screens , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[69]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[70]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[71]  Yun Q. Shi,et al.  Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.

[72]  Jessica J. Fridrich,et al.  Breaking HUGO - The Process Discovery , 2011, Information Hiding.

[73]  Markovian Rake Transform for Digital Image Tampering Detection , 2011, Trans. Data Hiding Multim. Secur..

[74]  Fatih Kurugollu,et al.  A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO) , 2011, Information Hiding.

[75]  Jessica J. Fridrich,et al.  Steganalysis of Content-Adaptive Steganography in Spatial Domain , 2011, Information Hiding.

[76]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[77]  Yun Q. Shi,et al.  Textural Features for Steganalysis , 2012, Information Hiding.