Copy-move image forensics detection
A.V. Kuznetsov
, V.V. Myasnikov

PDF, 766 kB

Full text of article: Russian language.

DOI: 10.18287/0134-2452-2013-37-2-244-253

Pages: 244-253.

Abstract:
The problem of constructing a complex calculation procedure of remote sensing data authentication using a set of basic algorithms for authentication is considered in this paper. This problem is solved according to the passive approach of data authentication, which assumes that artificial changes detection (forgeries detection) based on remote sensing data analysis.

Key words:
passive remote sensing data protection, digital images, metadata, optimality criterion, elementary algorithm.

References:

  1. Sridevi, M. Comparative study of image forgery and copy-move techniques / M. Sridevi, C. Mala and S. Sanyam. – New Delhi, India: Proceedings of the Second International Conference on Computer Science, Engineering and Applications (ICCSEA 2012), 2012. – P. 715-723.
  2. Cox, I.J. Watermarking is not cryptography / I.J. Cox, G. Doerr, T. Furon. – Proceedings of the 5th International Workshop on Digital Watermarking, 2006. – P. 1-15.
  3. Lin, E.T. A review of fragile image watermarks / E.T. Lin, E.J. Delp // Proceedings of ACM Multimedia and Security Workshop. – 1999. – Vol. 1. – P. 25–29.
  4. Mahdian, B. A bibliography on blind methods for identify­ing image forgery / B. Mahdian, S. Saic // Signal Processing: Image Communication. – 2010. – Vol. 25. – P. 389-399.
  5. Glumov, N.I. Detection of Local Artificial Changes in Images / N.I. Glumov, A.V. Kuznetsov // Optoelectronics, Instrumentation and Data Processing. - 2011. - Vol. 47(3). - P. 4-12..
  6. Popescu, A.C. Statistical Tools for Digital Image Forensics: PhD thesis / A.C. Popescu. – Hanover, USA: Dartmouth College, Department of Computer Science, 2005. – 102 p.
  7. Fridrich, J. Estimation of primary quantization matrix in double compressed JPEG images / J. Fridrich, J. Lukas. – Digital Forensic Research Workshop. – 2003. – P. 2-5.
  8. Bayram, S. A Survey of Copy-Move Forgery Detection Techniques / S. Bayram, H.T. Senca, N. Memon. – NY: IEEE Western New York Image Processing Workshop, 2008. – P. 1-4.
  9. Fridrich, J. Detection of copy–move forgery in digital images / J. Fridrich, D. Soukal, J. Lukas. – Cleveland, OH, USA: Proceedings of Digital Forensic Research Workshop, IEEE Computer Society, 2003. – P. 55-61.
  10. Huang, H. Detection of copy–move forgery in digital images using sift algorithm / H. Huang, W. Guo, Y. Zhang. – Washington, DC, USA: Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE Computer Society, 2008. – P. 272-276.
  11. Kirchner, M. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue / M. Kirchner. – New York, NY, USA: Proceedings of the 10th ACM workshop on Multimedia and security, ACM, 2008. – P. 11-20.
  12. Dong, J. Run-length and edge statistics based approach for image splicing detection / J. Dong, W. Wang, T. Tan, Y. Shi. – Busan, Korea: Digital Watermarking, 7th International Workshop, IWDW 2008, 2008. – P. 76-87.
  13. Sankar, G. Feature based classification of computer graphics and real images / G. Sankar, V. Zhao, Y.-H. Yang. – Washington, DC, USA: Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE Computer Society, 2009. – P. 1513-1516.
  14. Li, C.-T. Detection of block artifacts for digital forensic analysis / C.-T. Li // e-Forensics. – 2009. – P. 173-178.
  15. Fan, N. A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation / N. Fan, C. Jin, Y. Huang // New York, NY, USA: Proceedings of the 11th ACM Workshop on Multimedia and Security, ACM, 2009. – P. 125-130.
  16. Gou, H. Noise features for image tampering detection and steganalysis / H. Gou, A. Swaminathan, M. Wu. – San Antonio, USA: ICIP (6), IEEE, 2007. – P. 97-100.
  17. Li, Z. Blind detection of digital forgery image based on the local entropy of the gradient / Z. Li, J. Bin Zheng // IWDW. – 2008. – P. 161-169.
  18. Johnson, M. Exposing digital forgeries in complex lighting environments / M. Johnson, H. Farid. // IEEE Transactions on Information Forensics and Security. – 2007. – N 3(2). – P. 450-461.
  19. Farid, H. Image forensic analyses that elude the human visual system / H. Farid, M. Bravo. – San Jose, CA, USA: SPIE Symposium on Electronic Imaging, 2010. – 10 p.
  20. Lee, S. Detecting false captioning using common-sense reasoning / S. Lee, D.A. Shamma, B. Gooch // Digital Investigation 3, Suppl. 1. – 2006. – P. 65-70.
  21. Taileb, M. NOHIS-Tree: High-Dimensional Index Structure for Similarity Search / M. Taileb, S. Touati // World Academy of Science, Engineering and Technology. – 2011. – N 59.– P. 518-525.
  22. Taha, H.A. Operations Research: An Introduction (6th Edition) / H.A. Taha. – Moscow: “Williams” Publisher, 2001. – 912 p. – (In Russian).
  23. Knuth, D.E. The art of computer programming. Volume 2 / D.E. Knuth. – Moscow: “Williams” Publisher, 2007. – 500 p. – (In Russian).
  24. Fu, K. Sequential methods in pattern recognition and machine learning / K. Fu. – Moscow: “Nauka” Publisher, 1971. – 256 p. – (In Russian).

© 2009, IPSI RAS
Institution of Russian Academy of Sciences, Image Processing Systems Institute of RAS, Russia, 443001, Samara, Molodogvardeyskaya Street 151; e-mail: ko@smr.ru; Phones: +7 (846 2) 332-56-22, Fax: +7 (846 2) 332-56-20