Detection and localization of forgery using statistics of DCT and Fourier components

被引:19
|
作者
Dua, Shilpa [1 ]
Singh, Jyotsna [1 ]
Parthasarathy, Harish [1 ]
机构
[1] Netaji Subhas Inst Technol, Div Elect & Commun Engn, Multimedia Res Lab, New Delhi, India
关键词
Discrete cosine transform; Doubly stochastic model; Image forgery detection; JPEG compression; Phase congruency; DIGITAL IMAGES; PHASE; STEGANALYSIS; FEATURES; WAVELET; MODEL;
D O I
10.1016/j.image.2020.115778
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we present a comprehensive approach for investigating JPEG compressed test images, suspected of being tampered either by splicing or copy-move forgery (cmf). In JPEG compression, the image plane is divided into non-overlapping blocks of size 8 x 8 pixels. A unified approach based on block-processing of JPEG image is proposed to identify whether the image is authentic/forged and subsequently localize the tampered region in forged images. In the initial step, doubly stochastic model (dsm) of block-wise quantized discrete cosine transform (DCT) coefficients is exploited to segregate authentic and forged JPEG images from a standard dataset (CASIA). The scheme is capable of identifying both the types of forged images, spliced as well as copy-moved. Once the presence of tampering is detected, the next step is to localize the forged region according to the type of forgery. In case of spliced JPEG images, the tampered region is localized using block-wise correlation maps of dequantized DCT coefficients and its recompressed version at different quality factors. The scheme is able to identify the spliced region in images tampered by pasting uncompressed or JPEG image patch on a JPEG image or vice versa, with all possible combinations of quality factors. Alternatively, in the case of copy-move forgery, the duplication regions are identified using highly localized phase congruency features of each block. Experimental results are presented to consolidate the theoretical concept of the proposed technique and the performance is compared with the already existing state of art methods.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] AUTOMATED JPEG FORGERY DETECTION WITH CORRELATION BASED LOCALIZATION
    Tariangi, Diangarti Bhalang
    Royi, Aniket
    Chakraborty, Rajat Subhra
    Naskar, Ruchira
    2017 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA & EXPO WORKSHOPS (ICMEW), 2017,
  • [32] Learnable Local Similarity for Face Forgery Detection and Localization
    Leng, Lingyun
    Fei, Jianwei
    Dai, Yunshu
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (12) : 996 - 1003
  • [33] A duplicated forgery detection fusion algorithm using sift and radial-harmonic fourier moments
    Gan Y.
    Chung J.
    Young J.
    Hu Z.
    Zhao J.
    Chung, Jimlee (junliuzhong@foxmail.com), 2018, Totem Publishers Ltd (14) : 111 - 120
  • [34] Detection of copy-move forgery using discrete analytical Fourier-Mellin transform
    Zhong, Junliu
    Gan, Yanfen
    NONLINEAR DYNAMICS, 2016, 84 (01) : 189 - 202
  • [35] Video Forgery Detection and Localization Using Normalized Cross-Correlation of Moment Features
    Mathai, M.
    Rajan, D.
    Emmanuel, S.
    2016 IEEE SOUTHWEST SYMPOSIUM ON IMAGE ANALYSIS AND INTERPRETATION (SSIAI), 2016, : 149 - 152
  • [36] Temporal Copy-Move Forgery Detection and Localization Using Block Correlation Matrix
    Aparicio-Diaz, Ernesto
    Cumplido, Rene
    Perez Gort, Maikel Lazar
    Feregrino-Uribe, Claudia
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (05) : 5023 - 5035
  • [37] Copy-move Image Forgery Detection and Localization Using Alteration Trace Net
    Sabeena, M.
    Abraham, Lizy
    2022 IEEE INTERNATIONAL POWER AND RENEWABLE ENERGY CONFERENCE, IPRECON, 2022,
  • [38] Forgery localization in images based on joint statistics of image blocks with neighbouring blocks
    Singhal, Divya
    Gupta, Abhinav
    IET IMAGE PROCESSING, 2021, 15 (09) : 1893 - 1908
  • [39] Image-splicing forgery detection based on local binary patterns of DCT coefficients
    Zhang, Yujin
    Zhao, Chenglin
    Pi, Yiming
    Li, Shenghong
    Wang, Shilin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (14) : 2386 - 2395
  • [40] Document image forgery localization and desensitization localization using the attention mechanism
    Zheng K.
    Li B.
    Zeng J.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (06): : 207 - 218