A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms

This paper aims to give a contribute to the experimental evaluation of tampered image detection algorithms (i.e. Image Integrity algorithms), by describing a possible way to improve these experimentations with respect to the traditional approaches followed in this area. In particular, the paper focuses on the problem of choosing a proper test dataset allowing to keep low the bias on the experimental performance of these kind of algorithms. The paper first describes a JPEG image integrity algorithm, the Lin et al. algorithm, that has been used as benchmark during our experiments. Then, the experimental performance of this algorithm are presented and discussed. These performance have been measured by running it on the CASIA TIDE public dataset, which represents the de facto standard for the experimental evaluation of image integrity algorithms. The considered algorithm apparently performs very well on this dataset. However, a closer analysis reveals the existence of some statistical artifacts in the dataset that improve the performance of the algorithm. In order to confirm this observation, we assembled an alternative dataset. This new dataset has been conceived to not exhibit the statistical artifacts existing in the images of the CASIA TIDE dataset, while producing an uniform distribution of some physical image features such as the quality factor. Then, we repeated the same experiments conducted on the CASIA TIDE dataset, using this new dataset. As expected, we observed a performance degradation of the Lin et al. algorithm, thus confirming our hypotheses about the CASIA TIDE dataset being, in some way, flawed.

[1]  Umberto Ferraro Petrillo,et al.  Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[2]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[3]  Jing Dong,et al.  Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise , 2010, IWDW.

[4]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[5]  Umberto Ferraro Petrillo,et al.  A Scalable Approach to Source Camera Identification over Hadoop , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[6]  Umberto Ferraro Petrillo,et al.  Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images , 2014, ICT-EurAsia.

[7]  Chi-Keung Tang,et al.  Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..

[8]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[9]  Ee-Chien Chang,et al.  Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[10]  Wei Su,et al.  Rake transform and edge statistics for image forgery detection , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[11]  Hong Zhao,et al.  Markovian Rake Transform for Digital Image Tampering Detection , 2011, Trans. Data Hiding Multim. Secur..

[12]  Yvan Saeys,et al.  Java-ML: A Machine Learning Library , 2009, J. Mach. Learn. Res..

[13]  Muhammad Ghulam,et al.  Improving the detection and localization of duplicated regions in copy-move image forgery , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).

[14]  Jan P. Allebach,et al.  Scanner identification using sensor pattern noise , 2007, Electronic Imaging.

[15]  Tieniu Tan,et al.  Image tampering detection based on stationary distribution of Markov chain , 2010, 2010 IEEE International Conference on Image Processing.