PANKAJ MALVIYA RUCHIRA NASKAR

Slides:



Advertisements
Similar presentations
Evaluating Color Descriptors for Object and Scene Recognition Koen E.A. van de Sande, Student Member, IEEE, Theo Gevers, Member, IEEE, and Cees G.M. Snoek,
Advertisements

Change Detection C. Stauffer and W.E.L. Grimson, “Learning patterns of activity using real time tracking,” IEEE Trans. On PAMI, 22(8): , Aug 2000.
1 Image Authentication by Detecting Traces of Demosaicing June 23, 2008 Andrew C. Gallagher 1,2 Tsuhan Chen 1 Carnegie Mellon University 1 Eastman Kodak.
Sheng-Wen Peng  Introduction  WATERMARKING FOR IMAGE AUTHENTICATION  COPY-COVER IMAGE FORGERY DETECTION  PCA Domain Method  EXPERIMENTAL.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Identification of Tamper Detection Techniques for Digital Video Forensics By Susinda Perera Department of Computer Science and Engineering, University.
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Ales Zita. Publication Digital Image Forgery Detection Based on Lens and Sensor Aberration Authors : Ido Yerushalmy, Hagit Hel-Or Dept. of Computer Science,
Digital Image Forensics
The image based surveillance system for personnel and vehicle tracking Chairman:Hung-Chi Yang Advisor: Yen-Ting Chen Presenter: Fong-Ren Sie Date:
Automated Fitness Guided Fault Localization Josh Wilkerson, Ph.D. candidate Natural Computation Laboratory.
Noman Haleem B.E. in Textile Engineering from National Textile University Specialization in Yarn Manufacturing Topic “Determination of Twist per Inch.
Fifth International Conference on Information
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
ACM Multimedia th Annual Conference, October , 2004
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Forgery Detection by Gamma Correction Differences.
Image Tampering Detection Using Bayesian Analytical Methods 04/11/2005 As presented by Jason Kneier ELEN E6886 Spring 2005.
Scale Invariant Feature Transform (SIFT)
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 11, NOVEMBER 2011 Qian Zhang, King Ngi Ngan Department of Electronic Engineering, the Chinese university.
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
Interactive Image Segmentation of Non-Contiguous Classes using Particle Competition and Cooperation Fabricio Breve São Paulo State University (UNESP)
Identifying Computer Graphics Using HSV Model And Statistical Moments Of Characteristic Functions Xiao Cai, Yuewen Wang.
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Object Based Video Coding - A Multimedia Communication Perspective Muhammad Hassan Khan
Loop Investigation for Cursive Handwriting Processing and Recognition By Tal Steinherz Advanced Seminar (Spring 05)
IMAGE COMPRESSION USING BTC Presented By: Akash Agrawal Guided By: Prof.R.Welekar.
Video Tracking Using Learned Hierarchical Features
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
VTS 2012: Zhao-Agrawal1 Net Diagnosis using Stuck-at and Transition Fault Models Lixing Zhao* Vishwani D. Agrawal Department of Electrical and Computer.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Implementation, Comparison and Literature Review of Spatio-temporal and Compressed domains Object detection. By Gokul Krishna Srinivasan Submitted to Dr.
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Cryptographic Anonymity Project Alan Le
Journal of Visual Communication and Image Representation
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
1 Marco Carli VPQM /01/2007 ON BETWEEN-COEFFICIENT CONTRAST MASKING OF DCT BASIS FUNCTIONS Nikolay Ponomarenko (*), Flavia Silvestri(**), Karen.
TUMOR BURDEN ANALYSIS ON CT BY AUTOMATED LIVER AND TUMOR SEGMENTATION RAMSHEEJA.RR Roll : No 19 Guide SREERAJ.R ( Head Of Department, CSE)
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
DIGITAL IMAGE FORGERY Name: Reshma P.D Roll No:19.
IMAGE PROCESSING is the use of computer algorithms to perform image process on digital images   It is used for filtering the image and editing the digital.
Visual Information Processing. Human Perception V.S. Machine Perception  Human perception: pictorial information improvement for human interpretation.
Introduction to Skin and Face Detection
Author : Sang Hwa Lee, Junyeong Choi, and Jong-Il Park
PERFORMANCE ANALYSIS OF VISUALLY LOSSLESS IMAGE COMPRESSION
(k, n)-Image Reversible Data Hiding
Seunghui Cha1, Wookhyun Kim1
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Image and Video Processing – An Introduction
Detecting Artifacts and Textures in Wavelet Coded Images
Object tracking in video scenes Object tracking in video scenes
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
IMAGE FORGERY DETECTION
Automated Fitness Guided Fault Localization
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Support vector machine-based text detection in digital video
New Framework for Reversible Data Hiding in Encrypted Domain
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Detecting Digital Forgeries using Blind Noise Estimation
A Quadratic-Residue-based Fragile Watermarking Scheme
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

PANKAJ MALVIYA RUCHIRA NASKAR Digital Forensic Technique for Double Compression based JPEG Forgery Detection PANKAJ MALVIYA RUCHIRA NASKAR Department of Computer Science and Engineering National Institute of Technology, Rourkela 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security Outline Introduction Digital Forensics JPEG Forgery Our Objectives Proposed Multi-compression based JPEG Forgery Detection Technique Introduction to JPEG Ghosts Proposed Algorithm Results Conclusion Future Work References 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security DIGITAL FORENSICS Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. Digital Forensics is a branch of science and technology which deals with the detection of the cyber-crime and forgery by investigation of digital evidences. Pertains to legal evidence found in computers and digital storage media. The goal of computer forensics is to investigate digital media with the aim of identifying, preserving, recovering, analysing and presenting facts and opinions about the digital information Why DF? In present cyber world images and videos are the major sources of information exchange. The authenticity of digital images and videos is extremely crucial in the legal industry, media world and broad-cast industry. The present day easy availability of low-cost image processing software tools, having immense number of multimedia manipulating features, pose threat to the fidelity of digital multimedia data. 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security Digital Image Forgery Foreground is adjusted to background (by cutting, cropping, replacing etc…) Here, the background of the image is doubly compressed while the foreground (cat) is single compressed which destroys the original artifacts(JPEG) of image. Digital images can now be easily created, altered, and manipulated with no obvious traces of having been subjected to any of these operations. Common image processing operations such as cropping, splicing, blurring etc., made widely available by such software tools, compel us to question the trustworthiness of the digital images and videos. 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security Motivation of our Work While performing digital image forgery, it is a usual practice to combine multiple images (some region/regions of the one image is replaced with the other) for example, when compositing one person’s head onto another person’s body. If both of these images were originally of different JPEG compression quality, then the digital composite may contain a trace of the original compression qualities. If both the images are of different compression ratio (i.e., the one which is to be manipulated by using the other), what happens then?? 10th International Conference on Information Systems Security December 2014

Proposed Multi-compression based JPEG Forgery Detection In a JPEG image, whenever any kind of editing is carried out and it is written back to memory, the image undergoes re-compression We exploit this feature to detect any illegal modification or tampering in JPEG images We propose a forensic technique to identify JPEG forgeries with multiple degrees of compression within the same image The degree of compression varying from region to region 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security PROPOSED ALGORITHM 10th International Conference on Information Systems Security December 2014

PROPOSED ALGORITHM (Contd…) For forgery detection, we plot the vector of absolute differences (D2) against pixel positions (P). We investigate the variation of the elements of D2 over the entire 512×512 image matrix, from the D2 vs. P plot. Our key observation in our work is that, for forged JPEG images, for certain values of q’ belonging to [40, 90], the D2 vs. P plot demonstrates a sudden rise, which remains persistent over a range of P, corresponding to the area or region of image tampering. 10th International Conference on Information Systems Security December 2014

(Manually) Tampered Lena Image RESULTS (Manually) Tampered Lena Image (a) Original 512×512 image (b) Central 200×200 portion, re-saved at a different degree of compression (c) Forged image having its central portion modified 10th International Conference on Information Systems Security December 2014

IMAGE SQUARED-ERROR MATRICES RECOMPRESSED AT DIFFERENT FACTORS Squared-error matrices for test image Lena, at varying degrees of re-compression q’. Here, the optimal squared-error matrix, in which the modified image regions are most clear, is generated by q’ = 70. 10th International Conference on Information Systems Security December 2014

Absolute Squared-Error Pixel-Pair Difference Vector vs Position Vector D2 vs P Absolute Squared-Error Pixel-Pair Difference Vector vs Position Vector 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security INFERENCES The D2 vs. P shows a sudden rise in the plot, which is persistent for the range of pixels having undergone double-compression due to modification This feature of JPEG images, provides an evidence of JPEG image forgery, involving double-compression. Authentic JPEG images having no sub-part manipulated (hence doubly-compressed), demonstrate neither such a sudden rise of D2 values nor its persistence This is evident from the D2 vs. P characteristics of the authentic or original JPEG image 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security OTHER TEST IMAGES Lena Mandrill Barbara Goldhill Plane Sailboat 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security D2 vs P Plots 10th International Conference on Information Systems Security December 2014

PLOTS FOR ORIGINAL IMAGES 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security CONCLUSION In this work, we present a digital forensic technique for detection of JPEG image forgery. The proposed technique exploits the feature of double-compression, inherent in forged JPEG images. The proposed technique enables forgery detection as well as localization. The proposed technique is a blind one. 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security FUTURE WORK Automation of quality factor determination is a major future direction for this research. Reconstruction of forged JPEG regions will also be investigated in the future. 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security REFERENCES H. Farid, “Exposing digital forgeries from JPEG ghosts,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 154–160, Mar. 2009. H. Farid, “A Survey of image forgery detection”, IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16-25, 2009. H.T. Sencar and N. Memon, (eds.), "Digital Image Forensics: There is More to a Picture than Meets the Eye", New York, NY, USA: Springer, 2013. G. Wallace, “The JPEG still picture compression standard", IEEE Transactions on Consumer Electronics, vol. 34, no. 4, pp. 30-44, 1991. D. Lowe, “Distinctive image features from scale-invariant key-points", International Journal of Computer Vision, vol. 60, no. 2, pp. 91-110, 2004. A. Srivastava, A.B. Lee, E.P. Simoncelli and S.C. Zhu, “On advances in statistical modeling of natural images", Journal of Mathematical Imaging, vol. 18, no. 1, pp.17-33, 2003. J. Redi, W. Taktak, and J.L. Dugelay, “Digital Image Forensics: A Booklet for Beginners", Multimedia Tools and Applications, vol. 51, no. 1, pp. 133 162, Jan. 2011. 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security REFERENCES J. Wu, M.V. Kamath, S. Poehlman, "Detecting dierences between photographs and computer generated images", Proceedings of the 24th IASTED International conference on Signal Processing, Pattern Recognition, and Applications, pp 268273,2006. B.S. Manjunath, J.R. Ohm, V.V. Vasudevan, and A. Yamada, "Color and Texture Descriptors", IEEE Trans. Circuits and Systems for Video Technology, vol. 11, no. 6, pp. 703-715, Jun. 2001. J.F. Lalonde and A.A. Efros, "Using color compatibility for assessing image realism", Proceedings of the International Conference on Computer Vision, 2007. N. Wang and W. Doube “How real is really a perceptually motivated system for quantifying visual realism in digital images", Proceedings of the IEEE International Conference on Multimedia and Signal processing, pp. 141-149, 2011. T.T. Ng and S.F. Chang, "Classifying photographic and photorealistic computer graphic images using natural image statistics", Technical report, ADVENT Technical Report, Columbia University, 2004. A.J. Fridrich , B.D. Soukal , A.J. Luk, "Detection of copy-move forgery in digital images", Proceedings of Digital Forensic Research Workshop, 2003. 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security REFERENCES H. Huang, W. Guo and Y. Zhang, “Detection of copy-move forgery in digital images using SIFT algorithm", IEEE Pacic-Asia Workshop on Computational Intelligence and Industrial Application, 2008. F. Zach, C. Riess and E. Angelopoulou, “Automated Image Forgery Detection through Classication of JPEG Ghosts", Proceedings of the German Association for Pattern Recognition (DAGM 2012), pp. 185-194, Aug. 2012. A.C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of re-sampling", IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758-767, 2005. X. Pan and S. Lyu, “Detecting image duplication using SIFT features", Proceedings of IEEE ICASSP, 2010. 10th International Conference on Information Systems Security December 2014

10th International Conference on Information Systems Security THANK YOU 10th International Conference on Information Systems Security December 2014