Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(1.74MB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
A Novel Approach To Detection and Evaluation of Resampled Tampered Images
Amrit Hanuman, Azim Abdool, Akash Pooransingh, Aniel Maharajh
Pages - 222 - 240     |    Revised - 31-07-2015     |    Published - 31-08-2015
Volume - 9   Issue - 4    |    Publication Date - July / August 2015  Table of Contents
MORE INFORMATION
KEYWORDS
Image Forgery, Resampling, Interpolation, Passive Detection.
ABSTRACT
Most digital forgeries use an interpolation function, affecting the underlying statistical distribution of the image pixel values, that when detected, can be used as evidence of tampering. This paper provides a comparison of interpolation techniques, similar to Lehmann [1], using analyses of the Fourier transform of the image signal, and a quantitative assessment of the interpolation quality after applying selected interpolation functions, alongside an appraisal of computational performance using runtime measurements. A novel algorithm is proposed for detecting locally tampered regions, taking the averaged discrete Fourier transform of the zero-crossing of the second difference of the resampled signal (ADZ). The algorithm was contrasted using precision, recall and specificity metrics against those found in the literature, with comparable results. The interpolation comparison results were similar to that of [1]. The results of the detection algorithm showed that it performed well for determining authentic images, and better than previously proposed algorithms for determining tampered regions.
1 CiteSeerX 
2 refSeek 
3 Scribd 
4 SlideShare 
5 PdfSR 
1 T. M. Lehmann, C. Gonner, and K. Spitzer, “Survey: Interpolation methods in medical image processing,” Medical Imaging, IEEE Transactions on, vol. 18, no. 11, pp. 1049-1075, 1999.
2 A. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling," Signal Processing, IEEE Transactions on, vol. 53, no. 2, pp. 758-767, Feb 2005.
3 H. Farid, “Image forgery detection," Signal Processing Magazine, IEEE, vol. 26, no. 2, pp. 16-25, March 2009.
4 T. Qazi, K. Hayat, S. U. Khan, S. A. Madani, I. A. Khan, J. Ko lodziej, H. Li, W. Lin, K. C. Yow, and C.-z. Xu, “Survey on blind image forgery detection," Image Processing, IET, vol. 7, no. 7, pp. 660-670, 2013.
5 J. A. Parker, R. V. Kenyon, and D. Troxel, “Comparison of interpolating methods for image resampling," Medical Imaging, IEEE Transactions on, vol. 2, no. 1, pp. 31-39, 1983.
6 T. Acharya and P.-S. Tsai, “Computational foundations of image interpolation algorithms," ACM Ubiquity, vol. 8, no. 42, 2007.
7 P. Thevenaz, T. Blu, and M. Unser, “Image interpolation and resampling," Handbook of medical imaging, processing and analysis, pp. 393-420, 2000.
8 K. Turkowski, “Filters for common resampling tasks," in Graphics Gems. Academic Press Professional, Inc., 1990, pp. 147-165.
9 G. K. Birajdar and V. H. Mankar, “Blind authentication of resampled images and rescaling factor estimation," in Cloud & Ubiquitous Computing & Emerging Technologies (CUBE), 2013 International Conference on. IEEE, 2013, pp. 112-116.
10 T. M. Lehmann, C. Gonner, and K. Spitzer, “Addendum: B-spline interpolation in medical image processing," Medical Imaging, IEEE Transactions on, vol. 20, no. 7, pp. 660-665, 2001.
11 A. C. Gallagher, “Detection of linear and cubic interpolation in jpeg compressed images," in Computer and Robot Vision, 2005. Proceedings. The 2nd Canadian Conference on. IEEE, 2005, pp. 65-72.
12 D. Zhu and Z. Zhou, “Resampling tamper detection based on jpeg double compression," in Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on. IEEE, 2014, pp. 914-918.
13 S. Prasad and K. Ramakrishnan, “On resampling detection and its application to detect image tampering," in Multimedia and Expo, 2006 IEEE International Conference on. IEEE, 2006, pp. 1325-1328.
14 B. Mahdian and S. Saic, “Blind authentication using periodic properties of interpolation," Information Forensics and Security, IEEE Transactions on, vol. 3, no. 3, pp. 529-538, 2008.
15 W. Wei, S. Wang, X. Zhang, and Z. Tang, “Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery," Information Forensics and Security, IEEE Transactions on, vol. 5, no. 3, pp. 507517, 2010.
16 T. Lehmann, A. Sovakar, W. Schmiti, and R. Repges, “A comparison of similarity measures for digital subtraction radiography," Computers in Biology and Medicine, vol. 27, no. 2, pp. 151-167, 1997.
17 G. Schaefer and M. Stich, “Ucid: an uncompressed color image database," in Electronic Imaging 2004. International Society for Optics and Photonics, 2003, pp. 472-480.
18 M. Sokolova and G. Lapalme, “A systematic analysis of performance measures for classification tasks," Information Processing & Management, vol. 45, no. 4, pp. 427-437, 2009.
19 E. Maeland, “On the Comparison of Interpolation Methods," Medical Imaging, IEEE Transactions on, vol. 7, no. 3, pp. 213-217, 1988.
20 R. Qian, W. Li, N. Yu, and Z. Hao, “Image forensics with rotation-tolerant resampling detection," in Multimedia and Expo Workshops (ICMEW), 2012 IEEE International Conference on. IEEE, 2012, pp. 61-66.
21 B. Mahdian and S. Saic, “Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics," in Computational Sciences and Its Applications (ICCSA 2008), International Conference on. IEEE, 2008, pp. 546-556.
22 Y.T. Kao, H.J. Lin, C.W. Wang and Y.C. Pai, “Effective Detection for Linear Up-Sampling by a Factor of Fraction," Image Processing, IEEE Transactions on, vol. 21, no. 8, pp. 34433453, 2012.
23 S. Math and R.C. Tripathi, “Digital Forgeries: Problems and Challenges," International Journal of Computer Applications, vol. 5, no. 12, pp. 9-12, 2010.
Mr. Amrit Hanuman
The University of the West Indies - Trinidad and Tobago
Mr. Azim Abdool
The University of the West Indies - Trinidad and Tobago
azim.abdool@sta.uwi.edu
Dr. Akash Pooransingh
The University of the West Indies - Trinidad and Tobago
Mr. Aniel Maharajh
Department of Electrical and Computer Engineering The University of the West Indies St. Augustine, Trinidad - Trinidad and Tobago