SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
13
IMAGE QUALITY FEATURE BASED DETECTION
ALGORITHM FOR FORGERY IN IMAGES
Shrishail Math1
and R.C.Tripathi2
Indian Institute of Information Technology, Allahabad, India,211012
1
ssm@iiita.ac.in 2
rctripathi@iiita.ac.in
ABSTRACT
The verifying of authenticity and integrity of images is a serious research issue. There are various types of
techniques to create forged images for various intentions. In this paper, Attempt is made to verify the
authenticity of image using the image quality features like markov and moment based features. They are
found to have their best results in case of forgery involving splicing.
KEYWORDS
Image forgery, image quality, moments, Multiblock cosine transforms
1. INTRODUCTION
Once photographs are known for their authenticity and considered as a evidences. However today
any one with basic knowledge of computer and image editing softwares like photoshop, GIMP etc
maybe able to manipulate photographs easily.
The Advances in image processing and photo realistic softwares, higher capable digital camera,
and other handheld portable image acquisition devices, high speed internet and social networking
and image photo managing and sharing softwares like picasa Microsoft office manager etc
provided easy platform for a image manipulations.
Images are manipulated for various reasons. Fun, entertainment, education, etc, however, recently
image manipulations are used to misrepresent images, altering the meaning of pictures and
contexts with malicious intention.
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
14
Figure 1-1: Original Picture of Joseph Stalin and Nikolai Yezhov
Figure 1-2: Manipulated image Nikolai Yezhov was erased
2. RELATED WORK
The recently researchers made efforts to detect the image forgery detection, the different
methods are proposed for different types of forgeries [1,2,3,4,5]. Images forgery detection based
on active methods such as digital watermarking[5], a digital signature[5] but those requires
embedded of information or a data such a holograms either at image acquisition stage or image
formation step .The detection method methods verifies the integrity of imbedded information,
other method is blind or passive image forgery detection. This method doesn’t require any pre
imbedded information or a data.
The blind methods becoming popular since it don’t require any extra hardware or softwares and
its natural. The forgery detection based on near duplicate concepts are proposed[11],
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
15
inconsistencies of light properties[15] ,noise features[16] and chromatic aberration[13],camera
parameters[18], are reported The image forgery detection methods for, JPEG compression[17]
and image splicing[] are also reported
3 PROPOSED METHOD
Our image forgery detection model based on image qualities and markov process based features
the frame work of model is shown in fig 3-1
3.1Image qualities: In computer vision research there is rich set of literature available on image
qualities. We selected a image quality features based on study of Avcibas. In[19,20] ,Aviabas
present a large set of image quality features, which are sensitive to discriminative to based few
features of forgeries such as compression, watermarking, blurring and distortions. We selected
such a eighteen features which are sensitive to image forgery operations .Those features are Mean
Errors (D1-D4), Correlation (C1-C5), Spectral Errors (S1-S5), HSV Norms (H1-H2)
a.) Mean error features : Mean absolute error D1, mean square error D2, modified
infinity norm D3, L*a*b perceptual error D4
b) Normalized cross-correlation C1, image fidelity C2,,Czenakowski correlation C3, mean angle
similarity C4, mean angle-magnitude similarity C5.
c) Pratt edge measure E1, edge stability measure E2.
d) Spectral phase error S1, spectral phase-magnitude error S2, block spectral magnitude error
S3, block spectral phase error S4, block spectral phase-magnitude error S5.
e). HVS absolute norm H1, HVS L2 norm H2.
3.2Moment based Features: The forgery operation assumed to be disturbs the continuity,
smoothness, regularity pattern, smoothness, consistency and periodicity of pixel correlations
Our moment based feature extraction procedure is shown in fig 3-2.
Pixel Array(2D)
Pixel 2D Array
MBDCT(2D Array)
Markov Features
Moment’s features
Given Image
Fig 3-1: Image forgery detection model
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
16
Figure 3-2: Moment extraction Procedure
Multi- block discrete cosine transforms (MBDCT): the block discrete cosine transforms co-
efficient are able to reflect the disturbances (changes) in the local frequency distributions. We use
multibolck discrete cosine transform to pick up local frequency disturbances effectively.
The 2D block DCT coefficients are represented by
F s,t
` a
=
2
n
ffff
A
X
x = 0
n @1
X
y = 0
n @1
V x
` a
V y
` a
cosπ
2x + 1
2n
fffffffffffffffffff
cosπ
2y = 1
2n
ffffffffffffffffff
f x,y
` a
----1
Where f(x,y),x,y=0,1 denotes a nXn image
3.3 Prediction Error 2D Array: This is used for dimension reduction purpose. It also serves the
additional purpose of enhancing the statistical artifacts introduced by forgeries. The prediction
context is shown in Fig 3-3
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
17
Figure 3-3: Prediction Context
We predict the pixel value x using the neighbouring pixel a,b and c, the prediction 2D array is
represented as
x
ffff
= sign x
` a
A a
L
L
M
M+ b
L
L
M
M+ c
L
L
M
M
R c
------------------------2
The prediction error 2D array can be expressed by
∆x = x @x
ffff
= x @sign x
` a
A a
L
L
M
M+ b
L
L
M
M+ c
L
L
M
M
R S
-------------------------3
Discrete wavelet transforms
The wavelet transforms are suitable to pick up transient and localised changes in spatial and
frequency domain.
Moments and Marginal moments
The 1D Characteristic function (CF) is the DFT of the first order histogram of each wavelet sub
band.
The absolute moments of 1D CF are defined by
M l =
X
il1
k
2
ffff
x. i
H xi
` a
fffffffffffffffffff
X
i = l
k
2
ffff
H xi
` a
L
L
L
M
M
M
ffffffffffffffffffffffffffffffffffffff
---------------------------4
Where H(xi) is the CF component t frequency xi ,
Here K= total number of different values assumed by all of coefficients in the sub-band under
consideration, and L= order of moment, which is a integer value
The 2D characteristic function is the 2D DFT of the second order histogram of the image and
MBDCT coefficient 2D array.
The second order histogram is defined as
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
18
hd j1 , j2 ζ,θ
b c
=
N j1 , j2. ζ,θ
b c
N T ζ,θ
b c
ffffffffffffffffffffffffffffffffffffffffffffff
--------------------------------5
Where
ζ @the distance between two pixel,
θ @Angle of line linking these two pixels with respect to the horizontal axis
N j1 , j2 ζ,θ
b c
@Number of pixel pairs for which the first pixel value is J1 while second is J2
N T ζ,θ
b c
-Total number of pixel pair in the image with separation ( ζ,θ,).
Two Marginal moments of the 2D CF are given by
M u ,j =
X
j = i
k
2
ffff
X
i = 1
k
2
ffff
u. i Hui ,v j
L
L
L
M
M
M
X
j = i
k
2
ffff
X
i = 1
k
2
ffff
Hui ,v j
L
L
L
c
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffQ
----------------------6
M v ,j =
X
j
K
2
ffffff
X
i = 1
k
2
ffff
v. j H ui ,v j
b c
L
L
L
L
M
M
M
M
X
j
K
2
ffffff
X
i = 1
k
2
ffff
| H ui ,v j
b c
|
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
------------------------7
Where H(ui,vj)- 2D CF component at DFT frequency (ui,vj), l- order of moment, integer
4 THE EXPERIMENT AND RESULTS
4.1 Algorithm:
1.) Extract Image Quality Metrics (IQMs).
a. Divide test image into 4 regions.
b. Extract features from every region.
2) Extract moment based features.
a. Apply wavelet transform to this image and obtain all the sub-bands including the test
image itself.
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
19
b. Obtain histogram for each sub-band.
c. Apply DFT to the histogram of each sub-band to obtain its characteristic function.
d. Apply Eqn -- (4) to calculate moments.
e. Apply Eqn-- (3) to obtain prediction-error 2-D array.
f. Repeat a. to d. To obtain prediction-error 2-D array.
g. Obtain 2-D histograms for the test image.
h. Apply 2-D DFT to each 2-D histograms to obtain the 2-D characteristic function.
i. Apply Eqn--(6) and Eqn-- (7) to calculate marginal moments.
3) Apply 2×2, 4×4, 8×8, …n×n BDCT to the given image. Round those BDCT coefficients to
nearest integers, and repeat step 2).
4) Repeat step 1) to 3) to obtain features of all images.
5) Obtain the best parameter of C and g which will be used in training.
6) Train a part of images using SVM and obtain SVM model.
7) Predict the remaining images using SVM model.
4.2 Experiment: We used the image dataset[22] of Columbia image splicing detection and
evaluation data.Other images are collected from internet:933 authentic images and 912
forged(spliced images ) and 55 forged as well as same number of authentic images were
collected from various resources from internet. SVM classifier and matlab code [21] is used for
randomly selected 65%,75% and 85% images from the above databases for training purposes and
renaming are used for testing purposes. The results are shown in table1below.
Table 1: Results
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
20
5. CONCLUSIONS AND DISCUSSIONS
Sensitive quality features [19, 20] and markov process model was utilised to detect
forgery in image data using histogram moments. Experiments were conducted on famous
databases providing and authentic and forged images to find true positive and true
negative results duly these training of data for various ratios like %65,75% and 85%
respectively .Results obtained are superior to so far used techniques.
REFERENCES
[1] Hany farid” Image forgery Detection a survey”,IEEE signal processing magazine ,march 2009, pp 16-
25
[2] H.T.sencar and N.memon ,”Overview of state of the art in digital Image forensics”,WSPC proceedings
sept 2007
[3].. Luo weigi,Qu Zhenhua, et. Al,”A survey of passive technology for digital Image forensics”, Front.
Computer Science china 2007
[4]. N.Krawetz” A picture’s worth… Digital Image Analysis and Forensics”,black hat briefings USA2007.
[5]. .Babak Mahdian and stnislav siac,”Blind methods for detecting Image fakery”,ICCST2008.
[6] Zhen zhang,yuan ren ,et al.,” a survey on passive blind image forgery by doctored method
detection”,seventh ICML&C,kunming ,july2008.
[7] .Tran van lanh kai-sen chong et .al ,” a survey on digital image forensic methods”,ICME2007
[8] .Kusam ,pawanesh abrol,devanand,”Digital tampering detection techniques:A review”,IJIT2009.
[9]. Yu-Feng Hsu and Shih-Fu Chang“Statistical fusion of multiple cues for image tampering
detection”Asilomar Conference on Signals, Systems, and Computers 2008
[10] Tian-Tsong Ng and Shih-Fu Chang and Jessie Hsu and Lexing Xie and Mao-Pei Tsui“Physics-
motivated features for distinguishing photographic images and computer graphics”, MULTIMEDIA
'05: Proceedings of the 13th annual ACM international conference on Multimedia, November 6--11,
2005, Hilton, Singapore
[11]. Alin C. Popescu and Hany farid“Exposing digital forgeries by detecting duplicated image regions”
2004
[12]. Alin C. Popescu and Hany farid“Blind removal of lens distortion” Journal of the Optical Society of
America 2001
[13]. Micah K. Johnson and Hany Farid,” Exposing digital forgeries through chromatic aberration” ACM
Multimedia and Security Workshop 2006
[14] Micah K. Johnson and Hany Farid,”“Detecting photographic composites of people” 6th
InternationalWorkshop on Digital Watermarking, Guangzhou, China
[15]. Micah K. Johnson and Hany Farid“Exposing digital forgeries by detecting inconsistencies in lighting”
ACM Multimedia and Security Workshop 2005
[16]. H. Gou, A. Swaminathan, and M. Wu, “Noise features for image tamperingdetection and
steganalysis” in Proc. IEEE Int. Conf. Image Processing, San Antonio,TX, 2007, vol. 6, pp. 97–100.
[17]. J. He, Z. Lin, L. Wang, and X. Tang, “Detecting doctored JPEG images viaDCT coefficient analysis”,
in Proc. European Conf. Computer Vision, Graz, Austria,2006, pp. 423–435.
International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011
21
[18]. Z. Lin, R. Wang, X. Tang, and H.-Y. Shum, “Detecting doctored imagesusing camera response
normality and consistency",in IEEE Computer So-ciety Conference on Computer Vision and Pattern
Recognition, vol. 1, June2005, pp. 1087
[19]. Avcibas I,B.Sankur,K. Sayood,”Statistical Evaluation of Image Quality Measure”, Journal of
Electronic Imaging,11,206-223,2002
[20] .Avcibas I,N.menon,B.Sankur,”Steganalysis Using Image Quality Metrics”,IEEE Transactions on
Image processing,12,221-229,2003
[21]. C. C. Chang and C. J. Lin, LIBSVM: A Library for Support Machines,
http://www.csie.ntu.edu.tw/~cjlin/libsvm/index.html.
[22]. Columbia DVMM Research Lab, Columbia Image Splicing DetectionEvaluation Dataset,
http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSpliced DataSet.htm.
Authors
Shrishail Math received his B.E(Electronics&Communication enginerring)
,M.Tech(Computer science &Engineering from University of Mysore and
Manipal university,respectively in year 1996 and 2001.Currently Doctoral
student at Indian Institue of information Technology,Allahabad, his research
interest are information assurance & security, and multimedia forensics.
R.C.Triapthi is a Dean (R&D) Research and Development, head of IPR
division, worked as senior Director Ministry of Communication &Information
Technology (MCIT), Govt .of India, published three books and several
research articles and papers in international and national journals. He worked
as a co-chairman of 1st International conference onIntelligent Interactive
Multimedia (IITM) 2010 sponsored by ACM

More Related Content

What's hot

Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainSondosFadl
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentCSCJournals
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital imagesRupesh Ambatwad
 
Detecting image splicing in the wild Web
Detecting image splicing in the wild WebDetecting image splicing in the wild Web
Detecting image splicing in the wild WebSymeon Papadopoulos
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forprjpublications
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques CSCJournals
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Editor IJARCET
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...CSCJournals
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edgeijma
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
 
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...iosrjce
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeySougata Das
 

What's hot (19)

Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital images
 
Cc24529533
Cc24529533Cc24529533
Cc24529533
 
Detecting image splicing in the wild Web
Detecting image splicing in the wild WebDetecting image splicing in the wild Web
Detecting image splicing in the wild Web
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251
 
G031201042047
G031201042047G031201042047
G031201042047
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edge
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
 
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
An Efficient Approach of Segmentation and Blind Deconvolution in Image Restor...
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session Key
 

Similar to Image Quality Feature Based Detection Algorithm for Forgery in Images

Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features ijcisjournal
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement ijsc
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...csandit
 
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...cscpconf
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Imagesiosrjce
 
IRJET-Lossless Image compression and decompression using Huffman coding
IRJET-Lossless Image compression and decompression using Huffman codingIRJET-Lossless Image compression and decompression using Huffman coding
IRJET-Lossless Image compression and decompression using Huffman codingIRJET Journal
 
project_final_seminar
project_final_seminarproject_final_seminar
project_final_seminarMUKUL BICHKAR
 
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...sipij
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
 
Application of Digital Image Correlation: A Review
Application of Digital Image Correlation: A ReviewApplication of Digital Image Correlation: A Review
Application of Digital Image Correlation: A ReviewIRJET Journal
 
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmSecret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmIRJET Journal
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA IOSR Journals
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA IOSR Journals
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour FeaturesIRJET Journal
 
Iaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensicIaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensicIaetsd Iaetsd
 

Similar to Image Quality Feature Based Detection Algorithm for Forgery in Images (20)

Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...
 
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
 
mini prjt
mini prjtmini prjt
mini prjt
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
 
F017374752
F017374752F017374752
F017374752
 
IRJET-Lossless Image compression and decompression using Huffman coding
IRJET-Lossless Image compression and decompression using Huffman codingIRJET-Lossless Image compression and decompression using Huffman coding
IRJET-Lossless Image compression and decompression using Huffman coding
 
project_final_seminar
project_final_seminarproject_final_seminar
project_final_seminar
 
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
Application of Digital Image Correlation: A Review
Application of Digital Image Correlation: A ReviewApplication of Digital Image Correlation: A Review
Application of Digital Image Correlation: A Review
 
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmSecret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 
C010111519
C010111519C010111519
C010111519
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 
Iaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensicIaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensic
 

Recently uploaded

Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessorAshwiniTodkar4
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 

Recently uploaded (20)

Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 

Image Quality Feature Based Detection Algorithm for Forgery in Images

  • 1. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 13 IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES Shrishail Math1 and R.C.Tripathi2 Indian Institute of Information Technology, Allahabad, India,211012 1 ssm@iiita.ac.in 2 rctripathi@iiita.ac.in ABSTRACT The verifying of authenticity and integrity of images is a serious research issue. There are various types of techniques to create forged images for various intentions. In this paper, Attempt is made to verify the authenticity of image using the image quality features like markov and moment based features. They are found to have their best results in case of forgery involving splicing. KEYWORDS Image forgery, image quality, moments, Multiblock cosine transforms 1. INTRODUCTION Once photographs are known for their authenticity and considered as a evidences. However today any one with basic knowledge of computer and image editing softwares like photoshop, GIMP etc maybe able to manipulate photographs easily. The Advances in image processing and photo realistic softwares, higher capable digital camera, and other handheld portable image acquisition devices, high speed internet and social networking and image photo managing and sharing softwares like picasa Microsoft office manager etc provided easy platform for a image manipulations. Images are manipulated for various reasons. Fun, entertainment, education, etc, however, recently image manipulations are used to misrepresent images, altering the meaning of pictures and contexts with malicious intention.
  • 2. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 14 Figure 1-1: Original Picture of Joseph Stalin and Nikolai Yezhov Figure 1-2: Manipulated image Nikolai Yezhov was erased 2. RELATED WORK The recently researchers made efforts to detect the image forgery detection, the different methods are proposed for different types of forgeries [1,2,3,4,5]. Images forgery detection based on active methods such as digital watermarking[5], a digital signature[5] but those requires embedded of information or a data such a holograms either at image acquisition stage or image formation step .The detection method methods verifies the integrity of imbedded information, other method is blind or passive image forgery detection. This method doesn’t require any pre imbedded information or a data. The blind methods becoming popular since it don’t require any extra hardware or softwares and its natural. The forgery detection based on near duplicate concepts are proposed[11],
  • 3. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 15 inconsistencies of light properties[15] ,noise features[16] and chromatic aberration[13],camera parameters[18], are reported The image forgery detection methods for, JPEG compression[17] and image splicing[] are also reported 3 PROPOSED METHOD Our image forgery detection model based on image qualities and markov process based features the frame work of model is shown in fig 3-1 3.1Image qualities: In computer vision research there is rich set of literature available on image qualities. We selected a image quality features based on study of Avcibas. In[19,20] ,Aviabas present a large set of image quality features, which are sensitive to discriminative to based few features of forgeries such as compression, watermarking, blurring and distortions. We selected such a eighteen features which are sensitive to image forgery operations .Those features are Mean Errors (D1-D4), Correlation (C1-C5), Spectral Errors (S1-S5), HSV Norms (H1-H2) a.) Mean error features : Mean absolute error D1, mean square error D2, modified infinity norm D3, L*a*b perceptual error D4 b) Normalized cross-correlation C1, image fidelity C2,,Czenakowski correlation C3, mean angle similarity C4, mean angle-magnitude similarity C5. c) Pratt edge measure E1, edge stability measure E2. d) Spectral phase error S1, spectral phase-magnitude error S2, block spectral magnitude error S3, block spectral phase error S4, block spectral phase-magnitude error S5. e). HVS absolute norm H1, HVS L2 norm H2. 3.2Moment based Features: The forgery operation assumed to be disturbs the continuity, smoothness, regularity pattern, smoothness, consistency and periodicity of pixel correlations Our moment based feature extraction procedure is shown in fig 3-2. Pixel Array(2D) Pixel 2D Array MBDCT(2D Array) Markov Features Moment’s features Given Image Fig 3-1: Image forgery detection model
  • 4. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 16 Figure 3-2: Moment extraction Procedure Multi- block discrete cosine transforms (MBDCT): the block discrete cosine transforms co- efficient are able to reflect the disturbances (changes) in the local frequency distributions. We use multibolck discrete cosine transform to pick up local frequency disturbances effectively. The 2D block DCT coefficients are represented by F s,t ` a = 2 n ffff A X x = 0 n @1 X y = 0 n @1 V x ` a V y ` a cosπ 2x + 1 2n fffffffffffffffffff cosπ 2y = 1 2n ffffffffffffffffff f x,y ` a ----1 Where f(x,y),x,y=0,1 denotes a nXn image 3.3 Prediction Error 2D Array: This is used for dimension reduction purpose. It also serves the additional purpose of enhancing the statistical artifacts introduced by forgeries. The prediction context is shown in Fig 3-3
  • 5. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 17 Figure 3-3: Prediction Context We predict the pixel value x using the neighbouring pixel a,b and c, the prediction 2D array is represented as x ffff = sign x ` a A a L L M M+ b L L M M+ c L L M M R c ------------------------2 The prediction error 2D array can be expressed by ∆x = x @x ffff = x @sign x ` a A a L L M M+ b L L M M+ c L L M M R S -------------------------3 Discrete wavelet transforms The wavelet transforms are suitable to pick up transient and localised changes in spatial and frequency domain. Moments and Marginal moments The 1D Characteristic function (CF) is the DFT of the first order histogram of each wavelet sub band. The absolute moments of 1D CF are defined by M l = X il1 k 2 ffff x. i H xi ` a fffffffffffffffffff X i = l k 2 ffff H xi ` a L L L M M M ffffffffffffffffffffffffffffffffffffff ---------------------------4 Where H(xi) is the CF component t frequency xi , Here K= total number of different values assumed by all of coefficients in the sub-band under consideration, and L= order of moment, which is a integer value The 2D characteristic function is the 2D DFT of the second order histogram of the image and MBDCT coefficient 2D array. The second order histogram is defined as
  • 6. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 18 hd j1 , j2 ζ,θ b c = N j1 , j2. ζ,θ b c N T ζ,θ b c ffffffffffffffffffffffffffffffffffffffffffffff --------------------------------5 Where ζ @the distance between two pixel, θ @Angle of line linking these two pixels with respect to the horizontal axis N j1 , j2 ζ,θ b c @Number of pixel pairs for which the first pixel value is J1 while second is J2 N T ζ,θ b c -Total number of pixel pair in the image with separation ( ζ,θ,). Two Marginal moments of the 2D CF are given by M u ,j = X j = i k 2 ffff X i = 1 k 2 ffff u. i Hui ,v j L L L M M M X j = i k 2 ffff X i = 1 k 2 ffff Hui ,v j L L L c fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffQ ----------------------6 M v ,j = X j K 2 ffffff X i = 1 k 2 ffff v. j H ui ,v j b c L L L L M M M M X j K 2 ffffff X i = 1 k 2 ffff | H ui ,v j b c | fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ------------------------7 Where H(ui,vj)- 2D CF component at DFT frequency (ui,vj), l- order of moment, integer 4 THE EXPERIMENT AND RESULTS 4.1 Algorithm: 1.) Extract Image Quality Metrics (IQMs). a. Divide test image into 4 regions. b. Extract features from every region. 2) Extract moment based features. a. Apply wavelet transform to this image and obtain all the sub-bands including the test image itself.
  • 7. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 19 b. Obtain histogram for each sub-band. c. Apply DFT to the histogram of each sub-band to obtain its characteristic function. d. Apply Eqn -- (4) to calculate moments. e. Apply Eqn-- (3) to obtain prediction-error 2-D array. f. Repeat a. to d. To obtain prediction-error 2-D array. g. Obtain 2-D histograms for the test image. h. Apply 2-D DFT to each 2-D histograms to obtain the 2-D characteristic function. i. Apply Eqn--(6) and Eqn-- (7) to calculate marginal moments. 3) Apply 2×2, 4×4, 8×8, …n×n BDCT to the given image. Round those BDCT coefficients to nearest integers, and repeat step 2). 4) Repeat step 1) to 3) to obtain features of all images. 5) Obtain the best parameter of C and g which will be used in training. 6) Train a part of images using SVM and obtain SVM model. 7) Predict the remaining images using SVM model. 4.2 Experiment: We used the image dataset[22] of Columbia image splicing detection and evaluation data.Other images are collected from internet:933 authentic images and 912 forged(spliced images ) and 55 forged as well as same number of authentic images were collected from various resources from internet. SVM classifier and matlab code [21] is used for randomly selected 65%,75% and 85% images from the above databases for training purposes and renaming are used for testing purposes. The results are shown in table1below. Table 1: Results
  • 8. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 20 5. CONCLUSIONS AND DISCUSSIONS Sensitive quality features [19, 20] and markov process model was utilised to detect forgery in image data using histogram moments. Experiments were conducted on famous databases providing and authentic and forged images to find true positive and true negative results duly these training of data for various ratios like %65,75% and 85% respectively .Results obtained are superior to so far used techniques. REFERENCES [1] Hany farid” Image forgery Detection a survey”,IEEE signal processing magazine ,march 2009, pp 16- 25 [2] H.T.sencar and N.memon ,”Overview of state of the art in digital Image forensics”,WSPC proceedings sept 2007 [3].. Luo weigi,Qu Zhenhua, et. Al,”A survey of passive technology for digital Image forensics”, Front. Computer Science china 2007 [4]. N.Krawetz” A picture’s worth… Digital Image Analysis and Forensics”,black hat briefings USA2007. [5]. .Babak Mahdian and stnislav siac,”Blind methods for detecting Image fakery”,ICCST2008. [6] Zhen zhang,yuan ren ,et al.,” a survey on passive blind image forgery by doctored method detection”,seventh ICML&C,kunming ,july2008. [7] .Tran van lanh kai-sen chong et .al ,” a survey on digital image forensic methods”,ICME2007 [8] .Kusam ,pawanesh abrol,devanand,”Digital tampering detection techniques:A review”,IJIT2009. [9]. Yu-Feng Hsu and Shih-Fu Chang“Statistical fusion of multiple cues for image tampering detection”Asilomar Conference on Signals, Systems, and Computers 2008 [10] Tian-Tsong Ng and Shih-Fu Chang and Jessie Hsu and Lexing Xie and Mao-Pei Tsui“Physics- motivated features for distinguishing photographic images and computer graphics”, MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia, November 6--11, 2005, Hilton, Singapore [11]. Alin C. Popescu and Hany farid“Exposing digital forgeries by detecting duplicated image regions” 2004 [12]. Alin C. Popescu and Hany farid“Blind removal of lens distortion” Journal of the Optical Society of America 2001 [13]. Micah K. Johnson and Hany Farid,” Exposing digital forgeries through chromatic aberration” ACM Multimedia and Security Workshop 2006 [14] Micah K. Johnson and Hany Farid,”“Detecting photographic composites of people” 6th InternationalWorkshop on Digital Watermarking, Guangzhou, China [15]. Micah K. Johnson and Hany Farid“Exposing digital forgeries by detecting inconsistencies in lighting” ACM Multimedia and Security Workshop 2005 [16]. H. Gou, A. Swaminathan, and M. Wu, “Noise features for image tamperingdetection and steganalysis” in Proc. IEEE Int. Conf. Image Processing, San Antonio,TX, 2007, vol. 6, pp. 97–100. [17]. J. He, Z. Lin, L. Wang, and X. Tang, “Detecting doctored JPEG images viaDCT coefficient analysis”, in Proc. European Conf. Computer Vision, Graz, Austria,2006, pp. 423–435.
  • 9. International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.1, April 2011 21 [18]. Z. Lin, R. Wang, X. Tang, and H.-Y. Shum, “Detecting doctored imagesusing camera response normality and consistency",in IEEE Computer So-ciety Conference on Computer Vision and Pattern Recognition, vol. 1, June2005, pp. 1087 [19]. Avcibas I,B.Sankur,K. Sayood,”Statistical Evaluation of Image Quality Measure”, Journal of Electronic Imaging,11,206-223,2002 [20] .Avcibas I,N.menon,B.Sankur,”Steganalysis Using Image Quality Metrics”,IEEE Transactions on Image processing,12,221-229,2003 [21]. C. C. Chang and C. J. Lin, LIBSVM: A Library for Support Machines, http://www.csie.ntu.edu.tw/~cjlin/libsvm/index.html. [22]. Columbia DVMM Research Lab, Columbia Image Splicing DetectionEvaluation Dataset, http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSpliced DataSet.htm. Authors Shrishail Math received his B.E(Electronics&Communication enginerring) ,M.Tech(Computer science &Engineering from University of Mysore and Manipal university,respectively in year 1996 and 2001.Currently Doctoral student at Indian Institue of information Technology,Allahabad, his research interest are information assurance & security, and multimedia forensics. R.C.Triapthi is a Dean (R&D) Research and Development, head of IPR division, worked as senior Director Ministry of Communication &Information Technology (MCIT), Govt .of India, published three books and several research articles and papers in international and national journals. He worked as a co-chairman of 1st International conference onIntelligent Interactive Multimedia (IITM) 2010 sponsored by ACM