Blind Authentication of Resampled Images and ... - IEEE Xplore

1 downloads 0 Views 319KB Size Report
Blind Authentication of Resampled Images and. Rescaling Factor Estimation. Gajanan K. Birajdar. Department of Electronics & Communication. Priyadarshini ...
2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies

Blind Authentication of Resampled Images and Rescaling Factor Estimation Gajanan K. Birajdar

Vijay H. Mankar

Department of Electronics & Communication Priyadarshini Institute of Engineering & Technology Nagpur - 440019. Maharashtra, India Email: [email protected]

Department of Electronics & Telecommunication Government Polytechnic Nagpur - 440001. Maharashtra, India Email: [email protected] inconsistencies. These inconsistencies can be used to detect the forgery.

Abstract—The rapid growth of image processing softwares and advancement in digital cameras has given rise to large amount of doctored images with no obvious traces. When altering an image like copy - paste or splicing to conceal traces of tampering, it is often necessary to resize the pasted portion of the image. The resampling operation may highly likely disturb the underlying inconsistency of the pasted portion, that can be used to detect the forgery. In this paper, an algorithm is presented that can blindly detect rescale operation and estimate the rescaling factor in zoom-in or zoom-out using properties of the zero-crossings of the second difference of the tampered image. Experimental results have proved the validity of the algorithm under different interpolation schemes.

In most of the tampered images rotation, rescaling and contrast enhancement are often involved and blind image forgery detection algorithm aims to detect these alterations in image. In copy-paste or image splicing forgery, certain transformations such as scaling, skewing or rotation (i.e. geometrical transformations) are very likely to be used including a frequent use of rescaling. Image rescaling may be accomplished in post-processing using software, and can also be done directly within the camera having a digital zooming function which is achieved with some kind of pixel interpolation.

Keywords: Image manipulation detection, passive authentication, image interpolation, discrete fourier transform I.

In this paper, we propose a method to detect global rescaling and estimate the image rescaling factor based on properties of the zero-crossings of the second difference of the tampered image first described in [3]. The technique is applicable to different interpolation schemes.

I NTRODUCTION

Digital image forgery is the process of tampering the original image in order to alter the information. In the modern age, rapid growth of image processing softwares like Adobe photoshop, GIMP and the advancement in digital cameras has given rise to large amount of doctored images with no obvious traces of tampering, generating a great demand for automatic forgery detection algorithms in order to validate the originality of candidate images. Verifying the authenticity of images and detecting traces of tampering requiring no prior knowledge of the image content or any embedded watermarks is an important research field. A good forgery detection algorithm should be passive or blind, requiring no prior knowledge of the image content or any embedded watermarks.

II.

WORK

The resampling processes do not leave perceivable artifacts, they introduce specific periodic correlations between image pixels which then can be used to detect image manipulation. A M N resampling of a 1 − D discrete sequence x[n] involves following steps [4]: 1) 2) 3)

Image forgery detection algorithm aims to verify the trustworthiness of a digital image. Image authentication solution is classified into two types. (1) Active forgery detection and (2) Blind or passive forgery detection [1] - [2]. An active forgery detection technique, such as digital watermarking or digital signatures, uses a known authentication code embedded into the image content before the images are sent through an unreliable public channel. However, this method requires special hardware or software to insert the authentication code inside the image before the image is being distributed. Passive or blind forgery detection technique uses the received image only for assessing its integrity. It is based on the assumption that tampering may highly likely disturb the underlying statistical property or image consistency of a natural scene image which introduces new artifacts resulting in various forms of 978-0-4799-2235-2/13 $31.00 $26.00 © 2013 IEEE DOI 10.1109/CUBE.2013.28

R ELATED

Upsample: Create a new signal xu [n] by inserting M − 1 zeros after every x[n]. Interpolate: Convolve xu [n] with a low pass filter: xi [n] = xu [n] ∗ h[n]. Decimate: Collect every N th sample: y[n] = xi [Nn ], k = 0, 1, . . .

Resampling in two dimensions can be extended in both spatial directions. Different types of resampling algorithms (linear, cubic) differ in the form of the interpolation filter h[n] in step 2. In image processing applications, the most widely used interpolation filters are bi-linear and bi-cubic; hence we investigated the properties of a resampled signal, which uses these filters. Several passive techniques for image authentication based on resampling detection and rescale factor estimation have been already reported. A method is presented to find the rescaling traces hidden in any portion of an image without resorting to a reference image by using expectation maximization (EM) [4]. Gallagher [5] proposed a rescaling detection 113 112

coefficients of the row (or column) vectors vary periodically in resampled image. A blind and efficient method which is capable of finding traces of resampling and interpolation based on singular value decomposition (SVD) is proposed in [9] [10]. The specific statistical changes brought into the linear dependencies among image pixels and image rows/columns due to tampering are analyzed using SVD.

method which exploits periodicity in variance function of their second-order derivative in the interpolated image for detecting the traces of rescaling. This periodicity is computed using discrete Fourier transform (DFT) of an averaged signal obtained from the second derivative of the investigated signal. Author verified that interpolation makes the signal and its derivatives periodical, V {D(n) f φ (x + μΔx )} = V {D(n) f φ (x)}, (n)

μ∈Z

In [11], a technique is developed to detect doctored and manipulated images using three features, the binary similarity measures between the bit planes, the image quality metrics applied to denoised image residuals and the statistical features obtained from the wavelet decomposition of an image. Image rescaling and rotation angle detection and parameter estimation to detect fake object into images is developed in [12]. In addition to this, forged areas are detected in an image that have been rescaled and/or rotated by dividing image into blocks. Multiple geometrical operations repeated zooming, repeated rotation, rotation-zooming, or zooming-rotation, were also determined from different behaviours of the peaks due to rescaling and rotation. Resampling detection in re-compressed JPEG images is investigated in [13]. Authors demonstrated how blocking artifacts in re-compressed images can actually help to increase detection performance.

(1)

th

where D f (x) be n derivative of f (x) and V is the variance. From eq. (1) it is clear that V {D(n) f φ (x)} is periodic over x with a period Δx as the sampling rate. This periodicity depends on the interpolation kernel used. The commonly used methods are nearest neighbor, bilinear, bi-cubic and B-spline interpolations. In [6], a blind and automatic method to estimate scaling factors of some image region of interests (ROI) is proposed based on the fact that interpolated signals and their derivatives contain specific detectable periodic properties. The method also uses radon transformation to find presence of affine transformation. Multidimensional relation between the signal and its derivative has a specific periodicity due to interpolation. It is given by, V {D(n) f φ (x+μΔx , y+μΔy )} = V {D(n) f φ (x, y)},

μ∈Z (2) Detection of resampling in pixel domain is proposed in [3]. Additionally, frequency domain techniques are employed to localize the portion of the image that has been tampered with. Pixel domain techniques are based on properties of second difference. A binary sequence p[k] is constructed from the sequence of second difference x [k] to detect resampling as given below, p[k]

= 1 = 0

if x [k] = 0 otherwise

III.

AND ESTIMATION

In this section, a method capable of detecting the traces of resamplig and scaling factor estimation using properties of the zero-crossings of the second difference is proposed. Suppose the image size is M × N . The algorithm is described below: 1) 2)

(3)

DFT of eq. (3) will display distinct peaks showing the presence of periodic zeros in the second difference. Another method is based on zero crossings of the second difference of a resampled sequence which exhibits periodicity. The second difference is constructed and zero crossings of the obtained sequence is computed. A binary sequence is constructed using the equation below, p[k]

= = =

1 1 0

if x [k] > 0 and x [k + 1] ≤ 0 if x [k] < 0 and x [k + 1] > 0 otherwise

P ROPOSED ALGORITHM FOR RESCALE DETECTION

Pre-processing: The input RGB image is converted into the grayscale image and Y component is also extracted after YCbCr conversion. Second difference computation: Obtain the second difference of Y component. The second difference of the input test image f (i, j) is computed with the following difference equation, Sn (i, j) = 2f (i, j) − f (i, j + 1)f (i, j − 1)

3)

4) (4)

5)

However authors have not paid attention to rescale factor estimation issue. We propose a method based on equation 4 which estimates rescale factor of the resampled image. A method is proposed to detect resampled imagery which is based on examining the normalized energy density present within windows of varying size in the second derivative of the image in the frequency domain and exploiting this characteristic to derive a 19-D feature vector that is used to train a support vector machine (SVM) classifier [7]. Another method is presented for detecting interpolation by using the periodicity characteristics hidden among the rows (or columns) of the image [8]. The core of the algorithm is use of correlation coefficients based on the observation that the correlation

(5)

Computing zero-crossings of the second difference: Find the zero crossings of the obtained sequence using step (2). A binary sequence is constructed using eq. (4). Compute average over columns. Computing the DFT: Calculate DFT F (u) using FFT of the binary sequence obtained in step (3). Search for the periodicity and peak detection: To detect the periodicity, the magnitudes of FFT |F F T f (x)| are all combined and plotted together to obtain the output. To automatically detect the resampling peaks fp , a simple threshold-based peak detector searching for the local maximum (peaks n times greater than a local average magnitude) is used. IV.

S IMULATION RESULTS AND DISCUSSION

In the experiment, we took 20 uncompressed color images of size 384×512 from the UCID database [14]. After extracting Y component these images were rescaled using linear and bicubic interpolation methods with resize factors ranging from 1.2 to 5 with step size of 0.2. Database consists of total 800

113 114

test images with various sizes. All of our experiments are carried out in Matlab environment. Calculating DFT of the zero crossing of the second difference of an interpolated signal to get a spectral representation, the frequency fn at which a scaling factor-related peak occurs can be found. 1 12 (6) = r Where r is rescale factor.

DFT of rescaled image 1000 900 800

Magnitude

700

500 400 300

The original image is rescaled by 1.6 resulting in a bigger image of 615 × 812 using bilinear and bicubic interpolation. The averaged horizontal spectrum of the zero crossing of the second difference of the rescaled image is shown in the Fig. 1. It is evident that peaks signifying rescaling are strong and clearly detectable. Peaks appeared at fn = 0.376, giving an estimated rescaling factor of 1.602 from eq. (6), which is very close to the actual value. Another example shows spectrum of rescaled image with rescale factor of 4.8 using bicubic interpolation scheme in Fig. 2. Here peak appears at 0.208 which results in rescale factor 4.8. The detection and estimation process was based on the global rescale operation. Table I-VI show the detection accuracy (%) as a function of different scaling factors using bilinear and bicubic interpolation for grayscale, G component and Y component image respectively. The detection accuracy is close to 100%. G component is extracted from RGB image and Y component is extracted by converting input RGB into Y CbCr image. The algorithm performs better in case of G and grayscale images as compared to Y image.

200 100 0

0

0.1

0.2

0.3

0.4

0.5

Frequency

Fig. 1. Spectrum of rescaled image (rescale factor 1.6) using bilinear interpolation DFT of rescaled image 1000 900 800

Magnitude

700

In this experiment, it is observed that the detection and estimation is nearly perfect for scaling factors within the specified range compared to algorithm given in [9]. Fig. 4 and 5 show DFT magnitude corresponding rescale factor 4.8 in case of bilinear and bicubic interpolation methods. Bilinear interpolation generates stronger peaks as compared to bicubic interpolation. Bicubic interpolation generates less spikes compared to bilinear. It is also observed that, algorithm presented is better when detecting images resized using bilinear method. A. Gallagher’s algorithm [5] cannot detect images resized by factor 2 where phase is preserved because of the second order derivative. Our algorithm is better when detecting images resized by ratio 2 as shown in Fig. 3. When rescale factor =1.8, bilinear method produces multiple peaks with one prominent peak which is used to estimate rescale factor where in bicubic produces a single peak.

V.

600

600 500 400 300 200 100 0

0

0.1

0.2

0.3

0.4

0.5

Frequency

Fig. 2. Spectrum of rescaled image (rescale factor 1.6) using bicubic interpolation

does not need complex computing process and the simulation results over a large set of images indicate the validity of the proposed scheme. Our future work aims to analyze the effect of JPEG compression on the detection of rescale operation. R EFERENCES

C ONCLUSION

[1] B. Mahdian and S. Saic, “A bibliography on blind methods for identifying image forgery,” Signal Processing: Image Communication, vol. 25, no. 6, pp. 389–399, July 2010. [2] G. K. Birajdar and V. H. Mankar, “Digital image forgery detection using passive techniques: A survey,” Digital Investigation, pp. 1–20, June 2013, 10.1016/j.diin.2013.04.007. [3] S. Prasad and K. R. Ramakrishnan, “On resampling detection and its application to image tampering,” in IEEE Int. Conf. on Multimedia & Expo., Canada, July 2006, pp. 1325–1328. [4] A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of re-sampling,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758–767, Jan. 2005.

Blind method for global rescale operation detection based on zero crossings of the second difference of the tampered image and estimation is presented in this paper. In comparison with active approaches, blind approaches do not need any explicit prior information about the image. Resampled signal exhibits a periodicity which is used to detect the presence of resampling operation. The method presented in this paper detects rescale operation and correctly determines most of the rescale factors in presence of linear and bicubic interpolation schemes. It works for a variety of rescale factors. The method

114 115

TABLE I.

D ETECTION ACCURACY (%) AS A FUNCTION OF DIFFERENT SCALING FACTORS USING BILINEAR INTERPOLATION FOR GRAYSCALE IMAGE

Scaling factor Accuracy Scaling factor Accuracy

1.2 99 3.2 99

TABLE II.

1.4 100 3.4 100

1.6 99 3.6 100

1.8 99 3.8 100

2 100 4 100

2.2 99 4.2 99

2.4 100 4.4 100

2.6 100 4.6 100

2.8 100 4.8 98

3 100 5 98

D ETECTION ACCURACY (%) AS A FUNCTION OF DIFFERENT SCALING FACTORS USING BICUBIC INTERPOLATION FOR GRAYSCALE IMAGE

Scaling factor Accuracy Scaling factor Accuracy

1.2 99 3.2 99

TABLE III.

1.4 100 3.4 100

1.6 100 3.6 100

1.8 100 3.8 100

2 100 4 100

2.2 99 4.2 100

2.4 100 4.4 100

2.6 100 4.6 100

2.8 100 4.8 98

3 100 5 98

D ETECTION ACCURACY (%) AS A FUNCTION OF DIFFERENT SCALING FACTORS USING BILINEAR INTERPOLATION FOR G COMPONENT IMAGE

Scaling factor Accuracy Scaling factor Accuracy

1.2 99 3.2 99

TABLE IV.

1.6 99 3.6 100

1.8 98 3.8 100

2 100 4 100

2.2 99 4.2 99

2.4 100 4.4 100

2.6 100 4.6 98

2.8 99 4.8 98

3 100 5 97

D ETECTION ACCURACY (%) AS A FUNCTION OF DIFFERENT SCALING FACTORS USING BICUBIC INTERPOLATION FOR G COMPONENT IMAGE

Scaling factor Accuracy Scaling factor Accuracy

1.2 99 3.2 99

4

3

1.4 100 3.4 100

1.4 100 3.4 100

1.6 100 3.6 100

1.8 100 3.8 100

2 100 4 100

2.2 99 4.2 100

2.4 100 4.4 100

2.6 100 4.6 98

DFT of Rescaled image

x 10

2.8 100 4.8 98

3 99 5 98

DFT of rescaled image 1000 900

2.5

800 700 Magnitude

Magnitude

2

1.5

1

600 500 400 300 200

0.5

100 0

0

0.2

0.4

0.6

0.8

0

1

Frequency

[6]

[7]

[8]

[9]

[10]

0.1

0.2

0.3

0.4

0.5

Frequency

Fig. 3. Pronounced spike occur at normalized frequency of 1/2, with the estimated rescale factor 2

[5]

0

Fig. 4. lation

[11]

Magnitude spectrum for rescale factor = 4.8 using bilinear interpo-

S. Bayram, I. Avcibas, B. Sankur, and N. Memon, “Image manipulation detection,” Journal of Electronic Imaging, vol. 15, no. 4, pp. 1–17, OctDec. 2006. [12] W. Wei, S. Wang, X. Zhang, and Z. Tang, “Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 507–517, June 2010. [13] M. Kirchner and T. Gloe, “On resampling detection in re-compressed images,” in Proc.of First IEEE Int. Conf. on Information forensics and security, Dec. 2009, pp. 21–25. [14] G. Schaefer and M. Stich, “UCID - an uncompressed colour image database,” in Proc. of SPIE, Storage and retrieval Methods and Applications for Multimedia, 2004, pp. 472–480.

A. C. Gallagher, “Detection of linear and cubic interpolation in jpeg compressed images,” in Proc. 2nd Canadian conf. Computer and Robot Vision, Washington DC, May 2005, pp. 65–72. B. Mahdian and S. Saic, “Blind authentication using periodic properties of interpolation,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 529–538, Aug. 2008. X. Feng, I. Cox, and G. Doerr, “Normalized energy density based forensic detection of resampled images,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 3, pp. 536–545, June 2012. H. Cao, Y. Zhao, and R. Ni, “Detection of interpolation using correlation coefficients,” in Int. Conf. on Signal Processing (ICSP), 2, Ed., vol. 2, Oct. 2012, pp. 989–992. R. Wang and X. Ping, “Detection of resampling based on singular value decomposition,” in Proc. of Fifth International Conference on Image and Graphics, Sept. 2009, pp. 879–884. G. Gul, I. Avcibas, and F. Kurugollu, “SVD based image manipulation detection,” in Proc.of 17th IEEE Int. Conf. on Image Processing, Sept. 2010, pp. 1765–1768.

115 116

TABLE V.

D ETECTION ACCURACY (%) AS A FUNCTION OF DIFFERENT SCALING FACTORS USING BILINEAR INTERPOLATION FOR Y

COMPONENT

IMAGE

Scaling factor Accuracy Scaling factor Accuracy

TABLE VI. Scaling factor Accuracy Scaling factor Accuracy

1.2 99 3.2 99

1.4 100 3.4 100

1.6 99 3.6 100

1.8 99 3.8 100

2 100 4 100

2.2 99 4.2 99

1.2 99 3.2 99

1.4 100 3.4 100

1.6 100 3.6 100

1.8 100 3.8 100

2 100 4 100

0.4

0.5

2.2 99 4.2 100

DFT of rescaled image

900 800

Magnitude

700 600 500 400 300 200 100 0

2.6 100 4.6 100

2.8 100 4.8 96

3 100 5 90

D ETECTION ACCURACY (%) AS A FUNCTION OF DIFFERENT SCALING FACTORS USING BICUBIC INTERPOLATION FOR Y COMPONENT IMAGE

1000

0

2.4 100 4.4 100

0.1

0.2

0.3 Frequency

Fig. 5. Magnitude spectrum for rescale factor = 4.8 using bicubic interpolation

116 117

2.4 100 4.4 100

2.6 100 4.6 100

2.8 100 4.8 96

3 100 5 99

Suggest Documents