DOI: 10.3724/SP.J.1089.2010.11089

Journal of Computer-Aided Design & Computer Graphics (计算机辅助设计与图形学学报) 2010/22:9 PP.1606-1612

Detection of Resampling Based on Texture Complexity and Singular Value Decomposition

When images are tampered, they may undergo resampling manipulation. A resampling detection algorithm is proposed, which is designed to detect the changes brought into the linear dependencies of the image pixels introduced by the interpolation process of resampling. The specific statistical changes with different texture complexity are analyzed by singular value decomposition, the number and mean value of small singular values are used as distinguishing features, and SVM is used to classify. The performance of resampling detection shown in experimental results indicates the validity of the algorithm.

Key words:blind image forensics,tempering detection,resampling detection,singular value decomposition,texture complexity

ReleaseDate:2014-07-21 15:25:48

[1] Popescu A C. Statistical tools for digital image forensics[C]// Proceedings of the 6th International Workshop on Information Hiding, New York, 2004: 128-147

[2] Zhou Linna. Study of digital forensics based on image content[D]. Beijing: Beijing University of Posts and Telecommunications, 2007 (in Chinese) (周琳娜. 数字图像盲取证技术研究[D]. 北京: 北京邮电大学, 2007)

[3] Wu Qiong, Li Guohui, Tu Dan, et al. State of the art and prospects on blind digital image forensics technology based on authenticity detection[J]. Acta Automatica Sinica. 2008, 34(12): 1458-1466 (in Chinese) (吴 琼, 李国辉, 涂 丹, 等. 面向真实性鉴别的数字图像盲取证技术综述[J]. 自动化学报, 2008, 34(12): 1458-1466)

[4] Popescu A C, Farid H. Exposing digital forgeries by detecting traces of resampling[J]. IEEE Transactions on Signal Processing, 2005, 53(2): 758-767

[5] Gallagher A C. Detection of linear and cubic interpolation in JPEG compressed images[C]// Proceedings of the 2nd Canadian Conference on Computer Robot Vision, Washington D C, 2005: 65-72

[6] Prasad S, Ramakrishnan K R. On resampling detection and its application to detect image tampering[C]// Proceedings of IEEE International Conference on Multimedia and Expo, Toronto, 2006: 1325-1328

[7] Mahdian B, Saic S. Blind authentication using periodic properties of interpolation[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 529-538

[8] Wei W M, Wang S Z, Tang Z J. Estimation of rescaling factor and detection of image splicing[C]// Proceedings of the 11th IEEE International Conference on Communication Technology, Hangzhou, 2008: 676-679

[9] Gül G, Dirik A E, Avclbas I. Steganalytic features for JPEG compression-based perturbed quantization[J]. IEEE Signal Processing Letters, 2007, 14(3): 205-208

[10] Schaefer G, Stich M. UCID—an uncompressed colour image database[R]. Nottingham: Nottingham Trent University, 2003