Open Access Open Access  Restricted Access Subscription or Fee Access

Detecting Digital Forgeries in Images by Using CFA Algorithm


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v9i8.370

Abstract


Image processing is one of the emerging techniques and many forgeries happen in the digital images nowadays.  Detecting forgeries in the digital images is the emerging paradigm in the recent of years. Due to the noisy scenery of convert coding, JPEG initiates distinctive traces in the condensed digital images. A forensic forecaster might divulge these forgery traces by analyzing the histogram techniques and utilize them to recognize local interfering, copy-move counterfeit, etc. At the similar time, it has been in recent times shown that conversances adversary can perhaps obscure the traces of digital JPEG compression, by adding an irresolute noise indication, in order to restore the histogram generation of the inventive figure in the digital system. With the arrival of lower cost and highly declaration digital cameras, and complicated digital image editing software, digital images can be effortlessly operated and distorted easily. Although good counterfeit may depart no illustration clues of having been interfered with them may nonetheless, alter the essential information of digital images. Most of the digital cameras are using today life is very effective and technically manufactured for the users, for example, utilize a solitary sensor in coincidence with a colour filter array (CFA), and then interrupt the misplaced colour illustrations to obtain a three conduit colour  digital image. This type of interpolation initiates explicit connections which are likely to be shattered when corrupting with a recent digital image. We enumerate the specific correlations introduced by Colour Filter Array exclamation, and describe how these correlations, or require thereof, can be repeatedly perceived in any parts of a digital image. We show the efficiency of this proposed approach in informative traces of digital altering in noiseless and noisy condensed colour images interpolated with numerous different Colour Filter Array algorithms. Our proposed techniques are effective and efficient when compared to the previous approaches through our experimental and simulation analysis.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Anti-Forensics; Digital Image Forgeries; JPEG Compression; Colour Filter Array; Correlations; Histogram; Digital Cameras

Full Text:

PDF


References


http://home.belkasoft.com/

G. Valenzise, M. Tagliasacchi, and S. Tubaro, The cost of JPEG compression anti-forensics, in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Prague, Czech Republic, May 2011.

Lin Wu,Yang Wang, Countering JPEG anti-forensics, in Proc. Int. Conf. on Image Process., Bruxelles, Belgium, Sep. 2011.

H. Farid, Image forgery detection, IEEE Signal Process. Mag., vol. 26, no. 2, pp. 16–25, Mar. 2009.
http://dx.doi.org/10.1109/MSP.2008.931079

S.Milani,M. Fontani, P. Bestagini, M. Barni, A. Piva,M. Tagliasacchi, and S. Tubaro, An overview on video forensics, APSIPA Trans. Signal Inf. Process., vol. 1, pp. 1–18, 2012.

M. Chen, J. Fridrich, M. Goljan, and J. Lukas, decisive image derivation and truthfulness using sensor noise, IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74–90, Mar. 2008.
http://dx.doi.org/10.1109/TIFS.2007.916285

Z. Fan and R. L. de Queiroz, recognition of bitmap firmness history: JPEG detection and quantizer evaluation, IEEE Trans. Image Process., vol. 12, no. 2, pp. 230–235, Feb. 2003.
http://dx.doi.org/10.1109/TIP.2002.807361

W. S. Lin, S. K. Tjoa, H. V. Zhao, and K. J. Liu, Digital image source coder forensics via intrinsic fingerprints, IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 460–475, Sep. 2009.
http://dx.doi.org/10.1109/TIFS.2009.2024715

A. C. Popescu and H. Farid, revealing digital images forgeries by identify traces of resampling, IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758–767, Feb. 2005.
http://dx.doi.org/10.1109/TSP.2004.839932

W. Luo, Z. Qu, J. Huang, and G. Qiu, A narrative technique for detecting gathered and recompressed image block, in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Apr. 2007, vol. 2, pp. 217–220.

M. C. Stamm and K. J. R. Liu, Forensic recognition of image exploitation using statistical native fingerprints, IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492–506, Sep. 2010.
http://dx.doi.org/10.1109/TIFS.2010.2053202

H. Farid, Digital Image Ballistics From JPEG Quantization, Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2006-583, 2006.

C. Chen, Y. Q. Shi, and W. Su, A machine learning based scheme for double JPEG compression detection, in Proc. Int. Conf. Pattern Recognition, 2008, pp. 1–4.

J. Lukáš and J. Fridrich, evaluation of principal quantization medium in double compressed JPEG images, in Proc. Digital Forensic Research Workshop, 2003.

F. Huang, J. Huang, and Y. Q. Shi, Detecting double JPEG compression with the same quantization matrix, IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 848–856, Dec. 2010.
http://dx.doi.org/10.1109/TIFS.2010.2072921

Vishnu Priyan, S., Srivatsa, S.K., A novel algorithm for quantization matrix estimation for JPEG error analysis to digital image forensics, (2014) International Review on Computers and Software (IRECOS), 9 (6), pp. 1027-1034.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize