Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Anju S Prasad | S Antony Mutharasan

Volume 02 Issue 09  Year 2015

ISSN no: 2348-3121  

Page no: 20-24

Abstract With the rapid development of digital media editing techniques, digital image manipulation becomes rather convenient and easy. With the increasing applications of digital imaging, different types of software tools are introduced for image processing. They are used to combine two images to make it look real or objects can be added or deleted. The manipulation techniques include deletion of details, insertion of details, combining multiple images and false captioning. Detecting these image manipulations has become an important problem. To avoid these problems SVM classifier is proposed which have similar functional form to neural networks. Image, texture and pixel value based features are extracted and analyzed from the images. Then hash values are calculated for these features.  The process consists of two phases which are training phase and a testing phase.  SVM classifier is trained with a set of images and used to classify the images as genuine or forged. SVM supports both regression and classification tasks and can handle multiple continuous and categorical variables. This method reduces the time and computational complexity.

Keywords— SVM, digital forensics, image forgery, contrast enhancement, composite Image


[1]. T. Arici, S. Dikbas, and Y. Altunbasak, “A histogram modification framework and its application for image contrast enhancement,” IEEE Trans. Image Process., Vol. 18, No. 9, pp. 1921– 1935, Sep. (2009).
[2]. M. Barni, M. Fontani, and B. Tondi, “A universal technique to hide traces of histogram-based image manipulations,” in Proc. ACM Multimedia Security Workshop, Coventry, England, (2012), pp. 97–104.
[3]. S. Battiato, A. Bosco, A. Castorina, and G. Messina, “Automatic image enhancement by content dependent exposure correction,” EURASIP J. Appl. Signal Process., Vol. 12, pp. 1849–1860, Jan. 2004).
[4]. S. Bayram, I. Avcubas, B. Sankur, and N. Memon, “Image manipulation detection,” J. Electron. Imag., Vol. 15, No. 4, pp. 04110201–04110217, (2006).
[5]. T. Bianchi and A. Piva, “Detection of non-aligned double JPEG compression based on integer periodicity maps,” IEEE Trans. Inf. Forensics Security, Vol. 7, No. 2, pp. 842–848, Apr. (2012).
[6]. H. Cao and A. C. Kot, “Manipulation detection on image patches using FusionBoost,” IEEE Trans. Inf. Forensics Security, Vol. 7, No. 3, pp. 992–1002, Jun. (2012).
[7]. G. Cao, Y. Zhao, R. Ni, and A. C. Kot, “Unsharp masking sharpening detection via overshoot artifacts analysis,” IEEE Signal Process. Lett., Vol. 18, No. 10, pp. 603–606, Oct. (2011).
[8]. G. Cao, Y. Zhao, and R. Ni, “Forensic estimation of gamma correction in digital images,” in Proc. 17th IEEE Int. Conf. Image Process., Hong Kong, (2010), pp. 2097–2100.
[9]. C. Chen, J. Ni, and J. Huang, “Blind detection of median filtering in digital images: A difference domain based approach,” IEEE Trans. Image Process., Vol. 22, No. 12, pp. 4699–4710, Dec. (2013).
[10]. J. Fan, H. Cao, and A. C. Kot, “Estimating EXIF parameters based on noise features for image manipulation detection,” IEEE Trans. Inf. Forensics Security, Vol. 8, No. 4, pp. 608–618, Apr. (2013).
[11]. H. Farid, “Image forgery detection,” IEEE Signal Process. Mag., Vol. 26, No. 2, pp. 16–25, Mar.(2009).
[12]. P. Ferrara, T. Bianchiy, A. De Rosaz, and A. Piva, “Reverse engineering of double compressed images in the presence of contrast enhancement,” in Proc. IEEE Workshop Multimedia Signal Process., Pula, Croatia, Sep./Oct. 2013, pp. 141–146
[13]. S.-C. Huang, F.-C. Cheng, and Y.-S. Chiu, “Efficient contrast enhancement using adaptive gamma correction with weighting distribution,” IEEE Trans. Image Process., Vol. 22, No. 3, pp. 1032–1041, Mar. (2013).
[14]. M. Kirchner and J. Fridrich, “On detection of median filtering in digital images,” in Proc. SPIE, Electronic Imaging, Media Forensics and Security II, Vol. 7541, San Jose, CA, USA, Jan. (2010), pp. 1–12.
[15]. D. Mahajan, R. Ramamoorthi, and B. Curless, “A theory of frequency domain invariants: Spherical harmonic identities for BRDF/lighting transfer and image consistency,” IEEE Trans. Pattern Anal. Mach. Intell., Vol. 30, No. 2, pp. 19 –213, Feb. (2008).
[16]. B. Mahdian and S. Saic, “A bibliography on blind methods for identifying image forgery,” Image Commun., Vol. 25, No. 6, pp. 389–399, Jul. (2010).
[17]. W. B. Pennebaker and J. L. Mitchell, JPEG Still Image Data Compression Standard. New York, NY, USA: Van Nostrand, (1993).
[18]. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling,” IEEE Trans. Signal Process., Vol. 53, No. 2, pp. 758–767, Feb. (2005).

Full Paper: Click Here

Scroll Up