JPEG image tampering localization based on normalized gray level co-occurrence matrix

To locate the tampered region of double compressed JPEG images, one of the most effective methods is based on the statistical characteristic of the images. After tampering operation, the tampered region and the original region will have different statistical distributions. And according to this cue, the histogram of DCT coefficients can be moded as the mixture of the distributions of DCT coefficients in tampered and untampered regions. By estimating each distribution of the mixture model, the probability of being tampered of each DCT block can be calculated and the final localization result can be obtained. Thus the mixture model will significant impact the result. In this paper, a novel mixture model based on normalized gray level co-occurrence matrix (NGLCM) is proposed for tampering localization in JPEG images. Firstly, NGLCM is used to measure the conditional probabilities of being tampered regions and being untampered regions for each 8 × 8 DCT coefficient block, which can take advantage of both the statistical characteristic of double quantization effect and the relationship among neighboring blocks. Then the Bayesian posterior probability map is generated by the conditional probabilities, which indicates the tampering probability of each block. Finally, the map is refined based on a inter-block connectivity and Gaussian weighted filter strategy to determine the final tampered region location. Experimental results demonstrate that the proposed approach can localize the tampered region of JPEG images with a satisfactory performance and outperforms the state-of-the-art methods.

[1]  Chien-Ping Chang,et al.  Detection of copy-move image forgery using histogram of orientated gradients , 2015, Inf. Sci..

[2]  Mohammad S. Obaidat,et al.  A comparative study of digital watermarking in JPEG and JPEG 2000 environments , 2003, Inf. Sci..

[3]  Babak Mahdian,et al.  Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .

[4]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[5]  Christoph Meinel,et al.  Deep Semantic Mapping for Cross-Modal Retrieval , 2015, 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI).

[6]  Xiangyang Wang,et al.  Blind optimum detector for robust image watermarking in nonsubsampled shearlet Domain , 2016, Inf. Sci..

[7]  Giovanni Maria Farinella,et al.  Robust Image Alignment for Tampering Detection , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[9]  Glenn Healey,et al.  Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Feng Zhao,et al.  Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms , 2010, 2010 International Conference on Multimedia Technology.

[11]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Z. Jane Wang,et al.  Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.

[13]  Xiangyang Wang,et al.  A new robust color image watermarking using local quaternion exponent moments , 2014, Inf. Sci..

[14]  Khaled Loukhaoukha,et al.  A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection , 2017, Inf. Sci..

[15]  William T. Freeman,et al.  Removing camera shake from a single photograph , 2006, SIGGRAPH 2006.

[16]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[17]  Christoph Meinel,et al.  Image Captioning with Deep Bidirectional LSTMs , 2016, ACM Multimedia.

[18]  Robert M. Haralick,et al.  Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..

[19]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[20]  Jing Dong,et al.  Exploring DCT Coefficient Quantization Effects for Local Tampering Detection , 2014, IEEE Transactions on Information Forensics and Security.

[21]  Alessandro Piva,et al.  Improved DCT coefficient analysis for forgery localization in JPEG images , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[22]  Christoph Meinel,et al.  A deep semantic framework for multimodal representation learning , 2016, Multimedia Tools and Applications.

[23]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[24]  Fei Xue,et al.  Natural image deblurring based on L0-regularization and kernel shape optimization , 2018, Multimedia Tools and Applications.

[25]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[26]  Christoph Meinel,et al.  Image Captioning with Deep Bidirectional LSTMs and Multi-Task Learning , 2018, ACM Trans. Multim. Comput. Commun. Appl..

[27]  Jing Dong,et al.  Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise , 2010, IWDW.

[28]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[29]  Xiangwei Kong,et al.  A Robust JPEG Image Tampering Detection Method Using GLCM Features , 2011 .

[30]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[31]  Chi-Keung Tang,et al.  Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..

[32]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.

[33]  Roberto Caldelli,et al.  Splicing forgeries localization through the use of first digit features , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[34]  Bin Li,et al.  Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[35]  Jialiang Chen,et al.  Binary image steganalysis based on local texture pattern , 2018, J. Vis. Commun. Image Represent..

[36]  Jiwu Huang,et al.  Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.

[37]  Ee-Chien Chang,et al.  Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact , 2007, 2007 IEEE International Conference on Multimedia and Expo.