Anti-Forensics of JPEG Images using Interpolation

Автор: Saurabh Agarwal, Satish Chand

Журнал: International Journal of Image, Graphics and Signal Processing(IJIGSP) @ijigsp

Статья в выпуске: 12 vol.7, 2015 года.

Бесплатный доступ

The quantization artifacts and blocking artifacts are the two significant properties for identifying the forgery in a JPEG compressed image. There are some techniques for JPEG compressed images that can remove these artifacts resulting no traces for forgery. These methods are referred as anti-forensic methods. A forger may perform some post-operations to disturb the underlying statistics of JPEG images to fool current forensic techniques. These methods create noise and reduce the image quality. In this paper we apply three different interpolation techniques namely nearest neighbor, bilinear and bicubic techniques to remove JPEG artifacts. The experimental results show that the bicubic interpolated images are found to be of better quality as compare to the nearest neighbor and bilinear interpolated images with no JPEG artifacts. For quality analysis of these interpolation methods on the images three popular quality metric are used. The proposed method is very simple to perform. This interpolation based method is applicable to both single and double JPEG compression.

Еще

Anti-forensics, JPEG compression, Interpolation, compression artifacts, Image quality

Короткий адрес: https://sciup.org/15013930

IDR: 15013930

Текст научной статьи Anti-Forensics of JPEG Images using Interpolation

Published Online November 2015 in MECS

Due to advancement of computation and communication technologies, there are easily available good quality photo capturing devices and photo editing softwares. These indirectly or directly help to make visually good quality doctored images that may create intentionally or unintentionally problems in personal, political and public life. The existing methods for digital image forensics are passive and blind because they are not based on any watermark or signature. Quite good amount of research work has been done in the field of image forensics [1-5]. Farid [2] reports that splicing two images of different JPEG compression quality is helpful in detection of forgery. It is mentioned in [3] that there is re-quantization in digital multimedia content when there is tampering in it. Therefore detection of re-quantization is an important element for assessing the authenticity of a digital image.

Some researchers have developed their counter forensic, also called antiforensics technique, so that forgery cannot be detected easily [6-10]. Basically these papers do antiforensics by adding noise or blurring the image so that forgery is not detectable. Antiforensic does help in finding the limitations of the forensic techniques that in turn forces to develop more robust forensic techniques. The forensic and antiforensics techniques may be considered analogous to virus and antivirus.

The digital images are stored in various formats such as .tiff, .pcx, .png, .bmp, .jpeg. The JPEG standard is one of the most popular standards because it can provide zero (lossless) compression to any good amount of compression depending upon the requirement and at the same time it maintains good quality of image. There have been several techniques to detect forgery in JPEG images [11-17]. Forgery detection in a JPEG image is indirectly helped due to its own compression artifacts. In a JPEG image, two types of artifact appear: quantization artifacts in frequency domain and blocking artifacts in spatial domain. If image tempering is done, then the image needs to be saved two times that creates double quantization artifact in histogram of DCT coefficients and the block synchronization gets disturbed. With the help of these artifacts forgery detection can be done easily. An attacker tries to hide or reduce these artifacts so that his forgery cannot be detected. While hiding or reducing the artifacts the image quality gets compromised by these methods. In this paper we discuss interpolation techniques that hide or reduce the artifacts and at the same time maintain image quality. We compare the quality of the interpolated images with some available state of the art quality assessment measures that include mean square error (MSE), peak signal to noise ratio (PSNR), structural similarity index (SSIM) [18] and blind image spatial quality evaluator (BRISQUE) [19].

Rest of the paper is organized as follows. Section 2 reviews the related work and section 3 discusses the interpolation methods. The experimental results are given in section 4 and the paper is concluded in section 5.

  • II.    Related Work

Latest developments help provide multimedia data in digital form, which can easily be spliced and cloned. It may sometime encourage digital piracy that may lead to financial losses to the owner. Sometimes a person having bad intention may misuse this capability of digital media to forge an image. This has been done in past in several cases. For example, in order to taking political benefit, Kenyan politician Mike Sonko posted an image (Figure 1) on Facebook of himself being embraced by the Mandela.

However someone ultimately found the original photo, in which Mandela was actually embracing boxer Muhammad Ali against a completely different background.

1 (a)                                 1 (b)

Fig.1. (a) Fake image in which Mandela embracing Mike Sonko (b) Original image in which Mandela embracing Muhammad Ali

In Denmark in the year 2013 the social media showed an of powerful storm image (Figure 2) to create sensational news that was ultimately found to be spliced. It was discovered that the storm cloud featured in the image closely matched with the storm of Montana in 2010.

Fig.2. Doctored Image of Storm in Denmark

Depending on the operation the image forgery may be categorized into two broad groups: image splicing and copy-move forgery. In splicing forgery, two or more different images are used to create fake image and in copy-move forgery the replication of a portion of the same image is used to create fake image. To counteract the problem of forgery, several methods have been developed for forgery detection in digital images. The paper [20] discusses that the image forgery (copy-move) can be identified in DCT domain. In this method DCT coefficients are calculated of image overlapping blocks and signs of these DCT coefficients is used as a feature. Farid [21] reports that image forgeries can be identified by calculating the lighting angle of different objects and their synchronization. Lukas et al [22] discuss that the falsified regions in an image can be detected by knowing the photo response non uniformity (PRNU) noise of the camera. If in an image various values of PRNU noise exist then image may be forged. The paper [23] discusses that only one light sensor can be used in camera instead of the three sensors due to the cost factor. Since we need three different colors (RGB), the color filter array (CFA) is used to create these colors from the data obtained by using single sensor. The different cameras have different CFA patterns and different interpolation methods. So by finding the CFA pattern and the interpolation methods, the authenticity of an image can be decided.

One of the important formats for storing digital images is JPEG standard because it perhaps provides good quality using less storage. Accordingly there have been several methods for detecting forgery in JPEG images [11-17]. JPEG image forgery detection can be based on the quantization artifacts or/and blocking artifacts. The Forensic techniques based on the quantization artifacts [11-13] identify image forgery by detecting localized inconsistencies in DCT domain. The localized inconsistency occurs only when if one of the two images used to create forgery was previously JPEG compressed image. There occur periodic/regular patterns in DCT coefficients of the corresponding regions in the image that was previously compressed. The forensic methods [14-17] find the irregularities in spatial domain based on the blocking artifacts. If the grid boundaries of the pasted regions do not synchronize with that of the background image, then the pasted regions will have different grid boundaries with respect to that background image.

Generally the tampered images have to be restored two times that creates double quantization artifacts in the histogram of the DCT coefficients and the blocking pattern, which is generally of 8x8 pixels, in the spatial domain also gets distorted. An attacker with the help of this information can make changes in the image so that traces of the forgery become non-detectable. Removing the traces of both types of artifacts is generally referred as antiforensics. Antiforensic techniques prevent proper forensic investigation process or make it much harder. These techniques reduce quantity and quality of the evidences present in a digital image thus making the analysis and examination of the evidences difficult or impossible.

For concealing the JPEG compression traces in digital images many antiforensic techniques are available. One of the most popular techniques proposed by Stamm et al. [6] is based on dithering. Dithering removes the quantization artifacts in DCT coefficients by filling the gaps. The blocking artifacts are removed by adding some signals in the image. However, the paper [7] reports that the operations performed in [6] introduce noise in the image and decrease the visual quality of the image. The singly compressed JPEG images follow the Benford’s law that states, “the probability distribution of first digits of the DCT block coefficients is logarithmic.” However the doubly compressed images do not follow this distribution [24]. Some antiforensic techniques have been discussed based on the Benford’s law. In order to make a doubly compressed image non-detectable, Milani et al. [8] modify the statistics of the first digits of the DCT block coefficients by redistributing of data in which the difference of the actual DCT coefficients and the estimated coefficients using the Benford’s law is minimized. The paper [9] discusses an anti-forensic method that conceals the traces of singly JPEG compressed image by recovering the distribution of first significant digits of the original DCT coefficients by operating on the distribution of their logarithmic remainders. However the above mentioned methods [8-9] are complex and also create distortion in the image. In [10], it is reported that the DCT coefficients do not follow Laplacian distribution for all type of images as discussed in [6]. In that paper a non-parametric method based on DCT histogram smoothing without using any statistical model is discussed. However, Fan et al [25] report that the method [10] is not suitable for the images which have large smooth regions. In that method, the DCT coefficients are calculated using the total variationbased deblocking operation. These DCT coefficients create an adaptive local dithering signal model that brings the DCT histogram of the processed image close to that of the original one. The paper [26] tries to remove the traces of JPEG compression by adding the tailored noise that converts the DCT coefficients of the compressed image such that their distribution is similar to that of the uncompressed image. However, this noise sacrifices the image visual quality. In this paper, we discuss application of interpolation techniques as image anti-forensics that can conceal the footprints of JPEG compression and also maintain good visual quality of the images.

  • III.    Interpolation Methods

In this section we discuss a process to remove JPEG artifacts in images. In JPEG artifacts, the histogram of some of the DCT values does not occur continuously unlike in the uncompressed DCT values. It means that some of the DCT values in JPEG artifacts are zero that needs to be found out. For finding these missing values some interpolation methods can be applied. The interpolation methods are of two types: adaptive and non-adaptive.

Adaptive interpolation is applied based on the characteristics of image (sharp edges vs. smooth texture) to compute missing values. Non-adaptive interpolation uses the predetermined pattern of computation to recover the missing values irrespective of the image characteristics. The adaptive interpolation methods are difficult to implement and require more computation time; thus they are less preferred. On the other hand, the non-adaptive interpolation methods are simple to implement and require less computation. The most commonly used non-adaptive interpolation methods are nearest neighbor [27], bilinear [27] and bicubic interpolation methods [28], depending on the number of neighboring pixels used to calculate the missing pixel value.

  • A.    Nearest Neighbor Interpolation

This is the simplest interpolation method and requires least processing time. It considers only one pixel to estimate the missing pixel value. Each interpolated output pixel is assigned the value of the nearest sample point in the input image.

  • B.    Bilinear Interpolation

In bilinear interpolation, the adjoining 2×2 neighborhood of known pixel values surrounding the unknown pixel are considered. The value of the unknown pixel is obtained by taking the weighted average of these four pixels. Let I(x, y) denote the intensity of the unknown pixel at position (x, y) andI(x , y ) , I(x , y ) , I(x , y ) andI(x , y )be the intensities of its 2×2 four neighbors positioned at (x, y) , (x, y) , (x, y) and (x, y) . The value of I at the interpolated point in the image can be estimated as

I ( x , y ) = W j I ( X j , y j ) + w 2 1 ( x 2 , У 1 ) + W 3 1 ( X j , y 2 ) + W 4 1 ( X 2 , y 2 )

Where wi , i = 1 to 4 are the weights that are decided according to the distance, close pixels assigned higher weights as compared to the far pixels [27]. Since it considers the average value of four neighbor pixels, it provides much smoother looking images as compared to the nearest neighbor interpolation in which the missing pixel value is replaced by a single pixel.

  • C.    Bicubic Interpolation

The bicubic interpolation considers a neighbor of 4×4 pixels for estimating the missing pixel value. The general form for a Bicubic interpolation is as follows:

I (x, y )=EE Vy = i=0 j=0

a 00 + a10x + a01y + auxy + amy + a21x y +

222333 a j2 xy + a 22 xy + a 30 x + a 03 y + a 3j xy +

3     32     23    33

a13xy + a32x y + a23x y + a33x y

The coefficients aij , i,j=0,1,2,3 are obtained by calculating the gradients in both x and y directions and the cross derivative at each of the four corners of square. The bicubic interpolation produces sharper images than the nearest neighbor and bilinear interpolation methods both and it is perhaps the ideal combination of processing time and output quality. For this reason it is a standard in most of the image editing softwares and image capturing devices.

We will apply the above mentioned interpolation techniques to JPEG images in order to remove their artifacts. Basically these artifacts are due to some missing values in the DCT histogram, which are filled using interpolation. Once these missing values are obtained, the image forgery detection methods based on JPEG artifacts cannot identify the JPEG compression history of the image.

  • IV.    Experimental Results

3(a5)                      3(b5)                     3(c5)                    3(d5)

We have used various quality parameters namely mean square error (MSE), peak signal to noise ratio (PSNR), structural similarity index (SSIM)[18] and blind image spatial quality evaluator (BRISQUE)[19].

  • A.    Mean Square Error (MSE)

It is defined as the average squared difference between the reference image (P) and the distorted image (Q), each of size m×n. It is calculated pixel-by-pixel by adding up the squared differences of all the pixels and dividing by the total number of pixels. It is computed by the following formula- m-1 n-1

MSE -= Ш p ( i . j ) - Q ( i . j ) ]       (3)

mn i - 0 j - 0

  • B.    Peak Signal to Noise Ratio (PSNR)

It is defined as follows-

PSNR - 10.log10 [ L/MSE ]             (4)

Where L is the dynamic range of the pixel values.

Higher PSNR value indicates higher quality of the image.

  • C.    Structural Similarity Index (SSIM) [18]

MSE and PSNR are computationally simple but they don’t consider viewing conditions and the characteristics of the human visual perception. The SSIM is based on the local luminance, contrast and structural information. It is computed as follows-

(2 д и + C)(2 a + D )

SSIM -    ,  x?----' , xy , '

(Ux 2 + U 2 + C )(^x 2 + ст, 2 + D )

Where и. и are the mean intensity. ^. ^, are the standard deviation. ст is the covariance and C. D are the xy constants.

  • D.    Blind Image Spatial Quality Evaluator (BRISQUE) [19]

This image quality assessment model is based on natural scene statistics. This model is highly correlates with human subjective scores. It computes Mean subtracted contrast normalized coefficients (MSCN) over the whole image. For an image I, the MSCN coefficient image, Î, is computed by j = I (i, j) - ^( i, j)               (6)

a ( i , j ) + C

In case of PSNR also the bicubic interpolated images have the best performance as evident from Table 2. The performance of bicubic interpolated image is followed by bilinear interpolated images and finally nearest neighbor interpolated images.

KL where Кi, j) = E E Wk,ilk,i (i, j) and k =- Kl=-L

KL

^ (i , j ) =JE E w k , i ( I k , i ( i , j ) - ^ ( i , j ))2 V k =- Kl =- L

Here w = { wk, J k = - K ,, K , l = - L ,, L } is a 2D circularly-symmetric weighting function and C is a constant.

With the help of MSCN, image quality is evaluated in SSIM.

The MSE, PSNR and SSIM are full-reference quality assessment measures; they require the original undistorted image to compare with the distorted image. The BRISQUE is no-reference quality assessment measure; it does not require any reference image for quality assessment.

We have compute the above mentioned performance parameters MSE, PSNR, SSIM and BRISQUE and their values are given in Tables 1, 2, 3 and 4 respectively. The smaller value of MSE and BRISQUE parameters indicate the good quality of the image, where as higher values of PSNR and SSIM indicate the good quality of the image.

We observe from Table 1 that the MSE value is best for bicubic interpolated images taken in our experiments for all images, followed by bilinear interpolated images and finally nearest neighbor interpolated images.

Table 2. PSNR of Images using Different Interpolation Methods

Test Images

Peak signal to noise ratio for the test images taken from USC SIPI database [29]

Bicubic

Bilinear

Nearest

Stream & bridge

28.413

27.484

24.291

Tank 1

35.781

34.766

31.325

Car & APCs 1

37.494

36.451

32.991

Fishing Boat

32.596

31.525

28.252

Girl (Elaine)

32.756

31.741

28.297

Couple

33.746

32.736

29.331

Aerial

38.212

36.891

33.581

Truck

34.296

33.004

29.761

Airplane

38.264

37.048

33.348

Tank 2

31.607

30.788

27.162

Car & APCs 2

35.583

34.832

31.142

Truck & APCs 1

30.253

29.285

26.831

Truck & APCs 2

28.709

27.851

24.272

Tank 3

36.137

35.081

31.576

APC

37.338

36.607

32.98147

Same is the case for SSIM parameter as shown in Table 3.

Table 1. MSE for Different Images using Different Interpolation Methods

Test Images

Mean Square Error for the test images taken from USC SIPI database [29]

Bicubic

Bilinear

Nearest

Stream & bridge

93.709

116.056

242.102

Tank 1

17.182

21.699

47.924

Car & APCs 1

11.576

14.721

32.663

Fishing Boat

35.763

45.761

97.247

Girl (Elaine)

34.472

43.541

96.244

Couple

27.446

34.624

75.856

Aerial

9.813

13.301

28.503

Truck

24.179

32.556

68.692

Airplane

9.697

12.831

30.076

Tank 2

44.909

54.234

124.974

Car & APCs 2

17.976

21.369

49.988

Truck & APCs 1

61.344

76.645

134.861

Truck & APCs 2

87.525

106.643

243.119

Tank 3

15.824

20.179

45.234

APC

12.001

14.202

32.729

Table 3. SSIM of Images using Different Interpolation Methods

Test Images

Structural Similarity Index ratio for the test images taken from USC SIPI database [27]

Bicubic

Bilinear

Nearest

Stream & bridge

0.8927

0.8517

0.7706

Tank 1

0.9333

0.9075

0.8462

Car & APCs 1

0.9547

0.9375

0.8828

Fishing Boat

0.9158

0.8823

0.8097

Girl (Elaine)

0.9157

0.8832

0.8055

Couple

0.9176

0.8855

0.8099

Aerial

0.9516

0.9321

0.8869

Truck

0.9239

0.8916

0.8224

Airplane

0.9567

0.9389

0.8849

Tank 2

0.9321

0.9118

0.8513

Car & APCs 2

0.9279

0.9062

0.8492

Truck & APCs 1

0.9415

0.9223

0.8659

Truck & APCs 2

0.9321

0.9046

0.8315

Tank 3

0.9442

0.9249

0.8656

APC

0.9757

0.9689

0.9469

As per the BRISQUE parameter is concern the bicubic interpolated images either have better or comparative performance in case of most of the images as shown in Table 4.

Table 4. BRISQUE of Images using Different Interpolation Methods

Test Images

Blind image spatial quality evaluator for the test images taken from USC SIPI database

Original

Bicubic

Bilinear

Nearest

1

13.482

15.442

23.547

23.806

2

17.223

22.888

31.297

25.701

3

29.285

33.087

40.371

35.179

4

13.295

20.768

29.557

22.544

5

16.415

23.147

31.668

24.861

6

13.408

21.258

29.375

23.271

7

22.859

25.259

30.765

27.264

8

18.037

26.456

34.894

26.662

9

26.893

31.641

39.799

31.558

10

18.609

23.414

29.181

24.098

11

15.639

5.0905

13.270

20.228

12

24.781

29.096

33.522

29.012

13

17.823

24.212

28.796

27.102

14

26.888

31.348

37.826

31.337

15

33.459

31.054

35.711

35.2661

As evident from Figs. 4(d)-4(f) the histograms follow the Laplacian distribution similar to that of the uncompressed image.

4 (a)

4 (b)

4 (c)

4 (d)

4 (e)

4 (f)

Fig.4. (a) Original Stream and Bridge Image (b) Histogram of (1,1) DCT Subband for (a) Image. (c) Histogram of (1,1) DCT Subband of

JPEG Compressed Image (d) Histogram of (1,1) DCT Subband of Bicubic Interpolated Image (e) Histogram of (1,1) DCT Subband of bilinear interpolated image (f) Histogram of (1,1) DCT Subband of Nearest Neighbor Interpolated Image.

One of the artifacts of JPEG compressed images is blocking artifact as shown in Figure 5(a) inside the red rectangle. Figures 5(b)-5(d) show the bicubic, bilinear and nearest neighbor interpolated images respectively. As evident from these figures the blocking artifacts either have been removed or have been reduced significantly. Bicubic interpolated image (Fig. 5(b)) also looks best in comparison to bilinear and nearest neighbor interpolated images.

5 (a)

5 (b)

5 (c)

5 (d)

Fig.5. (a) A portion of Girl (Elaine) JPEG Compressed Image 5(b)-(d) Bicubic, Bilinear and Nearest Neighbor Interpolated Images Respectively

  • V.    Conclusion And Future Work

As the JPEG compression artifacts are basis of many image forgery detection methods. So by removing these artifacts forgery detection becomes more challenging and sometimes impossible. In this paper we apply different interpolation methods and verify experimentally that JPEG compression artifacts are removed by using interpolation methods successfully. We have also verified the quality of the various antiforensic images with different state of the art quality assessment methods. We found that bicubic interpolation gives the best result for all quality assessment methods followed by bilinear interpolation and nearest neighbor interpolation methods.

This method successfully removes JPEG artifacts but it leaves traces of interpolation. To remove traces of interpolation, random selection of interpolation method can be used for each pixel. Also many other state of the art interpolation methods can be used with random selection to remove the traces of interpolation and can get the image of better quality.

Список литературы Anti-Forensics of JPEG Images using Interpolation

  • Z. Fan, R. L. de Queiroz, Identification of bitmap compression history: JPEG detection and quantizer estimation, IEEE Transaction on Image Processing, vol. 12, no. 2, pp. 230–235, Feb. 2003.
  • H. Farid, Exposing digital forgeries from JPEG ghosts, IEEE Transaction on Information Forensics and Security, vol. 4, no. 1, pp. 154–160, Mar. 2009.
  • X. Feng, G. Doërr, JPEG recompression detection, Proceedings of the SPIE-Media Forensics and Security II, vol. 7541 of , 75410J, Jan. 2010.
  • F. Huang, J. Huang, Y. Q. Shi, Detecting double JPEG compression with the same quantization matrix, IEEE Transaction on Information Forensics and Security, vol. 5, no. 4, pp. 848–856, Dec. 2010.
  • A. Bianchi, T. De Rosa, A. Piva, Improved DCT coefficient analysis for forgery localization in JPEG images, in proceeding of the international conference on Acoustics, Speech, and Signal Processing, Prague, Czech Republic, May 2011.
  • M. Stamm, S. Tjoa, W. S. Lin, K. J. Ray Liu, Antiforensics of JPEG compression, in proceeding of the international conference on Acoustics, Speech, and Signal Processing, pp. 1694–1697, 2010.
  • H. Li, W. Luo, J. Huang, Countering anti-JPEG compression forensics, in Proceeding of the 19th. IEEE International Conference on Image Processing, pp. 241-244, IEEE, 2012.
  • Milani S, Tagliasacchi M, Tubaro S, Antiforensic attacks to Benford's law for detection of double compressed images, in proceeding of the international conference on Acoustics, Speech, and Signal Processing, pp 500-505, 2013.
  • C. Pasquini and G. Boato, JPEG compression anti-forensics based on first significant digit distribution, Proceeding of the IEEE international workshop on multimedia signal processing, pp 500-505, 2013.
  • W. Fan, K. Wang, F. Cayre, Z. Xiong, JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics, in Proceeding of the ACM international Workshop Information Hiding and Multimedia Security, pp. 117–122, 2013.
  • J. He, Z. Lin, L. Wang, X. Tang, Detecting doctored JPEG images via DCT coefficient analysis, in Proceeding of the European Conference on Computer Vision (ECCV), vol. 3953, pp. 423-435, Mar. 2006.
  • Z. Lin, J. He, X. Tang, C.K. Tang, Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis, Pattern Recognition, vol. 42, no.11, pp. 2492-2501, 2009.
  • Y.-L. Chen, C.-T. Hsu, Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection, IEEE Transaction on Information Forensics and Security, vol. 6, no. 2, pp. 396-406, Jun. 2011.
  • S. Ye, Q. Sun, E.-C. Chang, Detecting digital image forgeries by measuring inconsistencies of blocking artifact, in Proceeding of the IEEE International Conference of Multimedia Expo, pp. 12-15, Jul. 2007.
  • Zheng Er-gong, Ping Xi-jian, Passive-blind forensics for a class of JPEG image forgery, Journal of Electronics information technology, vol.32, no.2, p.394, 2010.
  • W. Li, Y. Yuan, N. Yu, Passive detection of doctored JPEG image via block artifact grid extraction, Signal Processing, vol. 89, no. 9, pp. 1821-1829, 2009.
  • M. Barni, A. Costanzo, L. Sabatini, Identification of cut & paste tampering by means of double-JPEG detection and image segmentation, Proceeding of the IEEE International Symposium of Circuits System, pp. 1687-1690, Jun. 2010.
  • Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, Image quality assessment: From error visibility to structural similarity, IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, Apr. 2004.
  • A. Mittal, A. K. Moorthy, A. C. Bovik, No-Reference Image Quality Assessment in the Spatial Domain, IEEE Transactions on Image Processing, 2012.
  • S.Kumar, J. V. Desai, and S.D. Mukherjee. "Copy Move Forgery Detection in Contrast Variant Environment using Binary DCT Vectors.", IJIGSP Vol.7, No.6, May 2015.
  • M. K. Johnson, H. Farid, Exposing digital forgeries in complex lighting environments, IEEE Transaction on Information Forensics and Security, vol. 2, no. 3, pp. 450-461, Sep. 2007.
  • J. Lukas, J. Fridrich, M. Goljan, Detecting digital image forgeries using sensor pattern noise, Proceeding of the SPIE Electronic imaging, security, stegnography, and watermarking of multimedia contents VIII, vol. 6072. 2006.
  • P. Ferrara, T. Bianchi, A.D. Rosa, A. Piva, Image forgery localization via fine-grained analysis of CFA artifacts, IEEE Transaction on Information Forensics and Security, vol 7, no 5, pp. 1566-1577, 2012.
  • D. Fu, Y. Q. Shi, W. Su, A generalized Benford's law for JPEG coefficients and its applications in image forensics, Proceeding of the SPIE, vol. 6505, pp. 39–48, Jan. 28 – Feb. 1, 2009.
  • W. Fan, K. Wang, F. Cayre, Z. Xiong, JPEG AntiForensics with improved tradeoff between forensic undetectability and image quality, IEEE Transaction on Information Forensics and Security, vol.9, no.8, August 2014.
  • Kaimal, A.B., Anitha, J., Manimurgan, S., A modified anti-forensics technique for removing detectable traces from digital images, proceeding of the international Conference on computer, communication and informatics, pp.1-4, 2013.
  • J.A. Parker, R.V. Kenyon, D.E. Troxel, Comparison of interpolating methods for image re-sampling, IEEE Transactions on Medical Imaging, pp. 31–39, 1983.
  • R. Keys, Cubic Convolution Interpolation for DigitalImage Processing, IEEE Transaction on Acoustics, speech and signal processing, vol ASSP-29, No. 6, Dec 1981.
  • A G. Weber, "The USC-SIPI Image Database: USC SIPI Report 315", California, October 1997.
  • P. Sutthiwan, Y.Q. Shi, "Anti-forensics of double JPEG compression detection," in Proceedings International Workshop of Digital Forensics Watermarking, 2011, pp. 411-424.
Еще
Статья научная