Color Histogram Based Image Forgery Detection for Copy-Move Attack Bo Liu and Chi-Man Pun Faculty of Science and Technology, University of Macau, Av. Padre.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Evaluating Color Descriptors for Object and Scene Recognition Koen E.A. van de Sande, Student Member, IEEE, Theo Gevers, Member, IEEE, and Cees G.M. Snoek,
PANKAJ MALVIYA RUCHIRA NASKAR
November 12, 2013Computer Vision Lecture 12: Texture 1Signature Another popular method of representing shape is called the signature. In order to compute.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Hongliang Li, Senior Member, IEEE, Linfeng Xu, Member, IEEE, and Guanghui Liu Face Hallucination via Similarity Constraints.
Image Processing IB Paper 8 – Part A Ognjen Arandjelović Ognjen Arandjelović
New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.
Object Recognition & Model Based Tracking © Danica Kragic Tracking system.
Mapping: Scaling Rotation Translation Warp
Texture Segmentation Based on Voting of Blocks, Bayesian Flooding and Region Merging C. Panagiotakis (1), I. Grinias (2) and G. Tziritas (3)
Image alignment Image from
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Fitting a Model to Data Reading: 15.1,
Object Recognition Using Geometric Hashing
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Tal Mor  Create an automatic system that given an image of a room and a color, will color the room walls  Maintaining the original texture.
Image Segmentation by Clustering using Moments by, Dhiraj Sakumalla.
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
AdvisorStudent Dr. Jia Li Shaojun Liu Dept. of Computer Science and Engineering, Oakland University 3D Shape Classification Using Conformal Mapping In.
Identifying Computer Graphics Using HSV Model And Statistical Moments Of Characteristic Functions Xiao Cai, Yuewen Wang.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Object Bank Presenter : Liu Changyu Advisor : Prof. Alex Hauptmann Interest : Multimedia Analysis April 4 th, 2013.
Presented by Tienwei Tsai July, 2005
Compressive Sensing Based on Local Regional Data in Wireless Sensor Networks Hao Yang, Liusheng Huang, Hongli Xu, Wei Yang 2012 IEEE Wireless Communications.
Vehicle License Plate Detection Algorithm Based on Statistical Characteristics in HSI Color Model Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
A Statistical Approach to Speed Up Ranking/Re-Ranking Hong-Ming Chen Advisor: Professor Shih-Fu Chang.
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL Presented by 2006/8.
A Comparison in Handmetric between Quaternion Euclidean Product Distance and Cauchy Schwartz Inequality Distance Di Liu Dong-mei Sun Zheng-ding Qiu Institute.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
2005/12/021 Content-Based Image Retrieval Using Grey Relational Analysis Dept. of Computer Engineering Tatung University Presenter: Tienwei Tsai ( 蔡殿偉.
Event retrieval in large video collections with circulant temporal encoding CVPR 2013 Oral.
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
Geometric Hashing: A General and Efficient Model-Based Recognition Scheme Yehezkel Lamdan and Haim J. Wolfson ICCV 1988 Presented by Budi Purnomo Nov 23rd.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
A Tutorial on using SIFT Presented by Jimmy Huff (Slightly modified by Josiah Yoder for Winter )
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Histogram Equalization- Based Color Image.
A New Approach to Utterance Verification Based on Neighborhood Information in Model Space Author :Hui Jiang, Chin-Hui Lee Reporter : 陳燦輝.
Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.
Computer Vision Group Department of Computer Science University of Illinois at Urbana-Champaign.
776 Computer Vision Jan-Michael Frahm Spring 2012.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
CSCI 631 – Foundations of Computer Vision March 15, 2016 Ashwini Imran Image Stitching.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Shadow Detection in Remotely Sensed Images Based on Self-Adaptive Feature Selection Jiahang Liu, Tao Fang, and Deren Li IEEE TRANSACTIONS ON GEOSCIENCE.
A School of Mechanical Engineering, Hebei University of Technology, Tianjin , China Research on Removing Shadow in Workpiece Image Based on Homomorphic.
776 Computer Vision Jan-Michael Frahm Spring 2012.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Seunghui Cha1, Wookhyun Kim1
Hybrid Features based Gender Classification
Estimation of 3D Bounding Box for Image Object
Histogram—Representation of Color Feature in Image Processing Yang, Li
Watermarking for Image Authentication ( Fragile Watermarking )
Image Segmentation Techniques
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
IMAGE FORGERY DETECTION
Presented by :- Vishal Vijayshankar Mishra
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Color Histogram Based Image Forgery Detection for Copy-Move Attack Bo Liu and Chi-Man Pun Faculty of Science and Technology, University of Macau, Av. Padre Tomas Pereira, Taipa, Macau, China {mb05422, Abstract. Copy-move attack is a common form of image forgery which belongs to a research field in multimedia forensics. In this paper, a blind forensics method based on color histogram is proposed to detect such forgery in image. The test image is firstly resized and converted to HSV color space, and its color value is quantized. And the image is divided into fixed-size overlapped blocks and the feature vector based on histogram of quantized color value is constructed for every block. Then the pair blocks are found by sorting all vectors. Lastly all blocks in those pairs are clustered based on their spatial location and the system recognizes the duplicated regions by evaluating correlation between clusters. The experimental results demonstrate that the proposed approach can not only detect ordinary copy-move attack for various kinds of pictures, but also recognize the cloned regions which are incidentally changed by rotation and scale transformation. Keywords: Digital image forensics, copy-move forgery, color histogram 1 Introduction As the great development of digital photography and relevant post-processing technology, digital image forgery becomes easily in terms of operating thus may be improperly utilized in news photography in which any forgery is strictly prohibited or the other scenario, for instance, as an evidence in the court. Therefore, digital image forgery detection technique is needed. Forgery detection technique is therefore becoming more and more important. Watermarking [1] can be a tool to help detect improper modifications on image. In fact, this technique requires operation on original taken photo and cannot deal with source-unknown images. Many proposed methods [2] thus avoid utilizing watermarking and other signature scheme. A widely used image forgery means is copy-move attack which means duplicating one area and then pasted onto other zones within an image. SIFT [3] has been used to find cloned objects [4] but it fails to deal with the situation where SIFT feature scarce area is copied and pasted. For example, copy a region of peace blue sky to cover a bird may not be detected by this method. Several methods search for correlation between duplicated areas by dividing image into overlapping blocks and then applying block- based quantized Discrete Cosine Transform (DCT) [5] to find such Session 3D 339

correlation. Considering the huge feature vector length, Li et al [6] use Singular Value Decomposition (SVD) to reduce feature yielding from Discrete Wavelet Transform (DWT). Zimba et al [7] reduce image dimension by considering only low frequency sub-band of Discrete Wavelet Transform (DWT) and then applying Principle Component Analysis-Eigen Value Decomposition (PCA-EVD) to reduce feature length. Also, Ghorbani et al [8] combine Discrete Wavelet Transform (DWT) and Discrete Cosine Tranform (DCT) to construct reduced feature. But these methods are not robust to rotation and scale duplicating operation. Adopting Fourier-Mellin Transform (FMT) and vector erosion filter [9] is robust to arbitrary rotating, slightly scaling and JPEG compression. In this paper, the proposed color histogram based forgery detection approach is effective on various kinds of digital image while [4] only works with area that SIFT feature can be constructed. Also, our method deals with brightness manipulation and is robust to rotation and scale transformation. 2 Color Histogram Feature for Forgery Detection The proposed method is mainly based on color histogram feature with which copy- move attack in a single digital color image can be detected because the duplicated regions share the same color feature. The reason why we choose HSV rather than RGB color space to attract feature is that the feature length of brightness (V) can be adjusted to make the algorithm robust to object illumination change which may be used by forger in order to make forgery more realistic. A simple illustration of the whole forgery detection process is: the first step consists of image size normalization and block feature construction, the second step involves block matching and clustering, the third one is devoted to cluster comparison and forgery detection. The overall framework of our proposed method is shown in Fig. 1. Image Normalization and Feature Construction Block Matching and 2 Clustering Original image h Color histogram feature construction Finding same-feature pair blocks Ilr Resized image I Dividing into Clustering all pair blocks based on spatial location Quantization overlapped blocks Cluster Comparison and Forgery Detection Marking similar blocks in test image Comparing Mo, M Finding two most relevant pairs M o, M Computers, Networks, Systems, and Industrial Appications

Fig. 1. The overall framework of proposed method. 2.1 Image Normalization and Feature Construction The test image I t is initially resized to M by N pixels, denoted by I, and the hue, saturation and brightness value is quantized to I H, I s and I v discrete levels whose value (s i,s2,...,s / s ) and (v i,v 2,...,v / v ) respectively. Then I is divided into (M-b+1) X(N-b+1) fixed-size overlapped blocks, where b is the side length (pixels) of each block. An initial 0 vector P=(0,0,...,0)1H+IS+IV is constructed for every block. Note that the P is made up of three parts which relate to quantized hue, saturation and brightness value respectively. More specifically, one position in P corresponds to a HSV value in table 1. Table 1. Correspondence between vector P and quantized HSV value. HS V P= ( ) h./ h2... hJH sis2   SISVIV2   VIV Then, for each position in vector P, the new value is the number of pixels whose value equal to its corresponding HSV quantized value in the third row of table 1. There are (M-b+1) x(N-b+1) feature vectors in total need to construct. And after this, it can establish a [(M-b+1)x(N-b+1)] by (/ H +/ s +/ v ) matrix Q to store the feature vector of each block for future processing. 2.2 Block Matching and Clustering Considering the cloned region is consisted of some blocks, they can theoretically be detected by finding the same rows in Q. The system stores all these blocks in a matrix K which is, obviously, m by (I H +I s +I v ), and m is the number of detected blocks. However, there are some matched pair blocks which share the same color feature but they are not artificially duplicated in experiment. These false matched blocks of a test image appear in the pure color region such as peace blue sky and overexposure area in which blocks' color is the same or changed so slightly that can hardly be distinguished as two different ones because of limited discrete value bins described previously. But notice that these false matched blocks are spatially random and independent, and therefore it can be solved by clustering detected blocks in K. K-means clustering is a method of cluster analysis and it aims to partition m observations into k clusters in which each observations belongs to the cluster with the minimum within-cluster sum of squares (WCSS). Given a set of observations (x i, x 2, x 3,..., x n ), where x i is a d-dimensional real vector. K-means cluster the set into k n) parts S={SI, S2, S3,.. Sk } so as to minimize WCSS. The blocks in K are segmented into k clusters S={S i,S 2,...,S k } by k-means algorithm according to their spatial location. Session3D341

2.3 Cluster Comparison and Forgery Detection This step evaluates the relevance of every two clusters in S which was introduced by previous step. The most relevant pair in S is the one that contains the largest number of matched blocks. Name this most relevant pair MO, and similarly the pair containing the second largest number is marked as Ml and so on. Assume there is only one region is copied and pasted from other parts of the image, the system will show the cloned regions if = Miro P E ( CI ' 1 ) ( 1 ) The parameter p is set manually and in our experiment: p= Experimental Results In this section, we evaluate our proposed method with a small dataset. All pictures are resized to around 600 by 400 pixels. Setting proper values for parameters will be discussed before showing detecting results. 3.1 Setting Parameters In our proposed method, there are five important parameters: the size of overlapped blocks b, bin number / H, I s, I v and the number of cluster k. In order to improve performance, some constrains of parameters must be taken into consideration. For parameter b, on the one hand, a bigger value of b will increase program's efficiency because the total number of blocks in test image is inversely proportional to the value of b. But it cannot exceed the size of cloned object. However, such size varies from picture to picture and thus cannot be predicted in advance. A safe and reasonable way is to set b smaller. On the other hand, if b is set too small, the feature vector constructed from each block may be short and then produce too many matched blocks. In such circumstance, more clusters k is necessary to eliminate those "clutter" matched pairs. For parameter I v, it should be set smaller than hi and Is to fight against brightness change. After our experiment, the recommended parameter values are listed in table 2. Table 2. Recommanded parameter values. IIIIS Ivbk Computers, Networks, Systems, and Industrial Appications

3.2 Detection Results and Discussion This part initially presents the detection result of basic copy-move attack, which means we just duplicate an object then parallel translate and paste onto other part within the image. This will verify the effectiveness of our method. The Fig. 2 below consists of three images, which are, from left to right, original taken picture in JPEG format, tampered image and the detection result. Two different colors indicate the cloned regions connected by black lines. In order to show that this approach fits for various size of cloned object, different images are also revealed in Fig. 3. But there is one thing needs to point out. From the experimental results presented, it can easily be observed that only part of cloned area is marked and this is because of the cluster configuration issue. Concretely speaking, the number of cluster k, as a parameter, is set manually in advance. If k is set large, cloned area will be made up of more than two clusters, however the algorithm will only highlight two clusters. Despite only part of region will be shown, it is enough to distinguish forgeries. Fig our algorithm: (a) original picture, (b) tampered picture, (c) detectio Fig. 3. Detection of cloned object in different size: (a) (d) original picture, (b) (e) tampered picture, (c) (f) detection results. 3.3 Robust Against Geometrical Changes Then the situation when the duplicated object is deformed by rotation and scale operation is presented. Methods proposed by [6][7][8] can hardly detect copy-move Session3D343

forgery when these geometrical changes are applied. But our method is applicable and effective as shown in Fig. 4. Fig. 4. Geometrical changes co orgery detection: (a) original picture, (b) enlarging cloned object and detection resu ing cloned object and detection results. alblc 4 Conclusions In this paper, the problem of copy-move forgery detection is discussed. The proposed algorithm is based on HSV color histogram to deal with such attack and shows good performance and most importantly, can deal with rotation and scale transformation. The feature work includes research on automatic parameters setting, and integration with other forensics techniques will be investigated. References 1.M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. NewYork: Marcel Dekker, J. A. Redi, W. Taktak, and J.-L. Dugelay, "Digital image forensics: A booklet for beginners," Multimedia Tools Applicat., vol. 51, no. 1, pp , David G. Lowe, "Object recognition from local scale-invariant features," International Conference on Computer Vision, Corfu, Greece (September 1999), pp Amerini, I.; Ballan, L.; Caldelli, R.; Del Bimbo, A.; Serra, G.;, "A SIFT-Based Forensic Method for Copy—Move Attack Detection and Transformation Recovery," Information Forensics and Security, IEEE Transactions on, vol.6, no.3, pp , Sept J. Fridrich, D. Soukal, and J. Lukas, "Detection of Copy-Move Forgery in Digital Images," in Proceedings of Digital Forensic Research Workshop, August Guohui Li; Qiong Wu; Dan Tu; Shaojie Sun;, "A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD," Multimedia and Expo, 2007 IEEE International Conference on, vol., no., pp , 2-5 July M. Zimba, S. Xingming, "DWT-PCA (EVD) Based Copy-move Image Forgery Detection", International Journal of Digital Content Technology and its Applications, pp , January Ghorbani, M.; Firouzmand, M.; Faraahi, A.;, "DWT-DCT (QCD) based copy-move image forgery detection," Systems, Signals and Image Processing (IWSSIP), th International Conference on, vol., no., pp.1-4, June Weihai Li; Nenghai Yu;, "Rotation robust detection of copy-move forgery," Image Processing (ICIP), th IEEE International Conference on, vol., no., pp , Sept Computers, Networks, Systems, and Industrial Appications