Computer Science ›› 2018, Vol. 45 ›› Issue (4): 173-177.doi: 10.11896/j.issn.1002-137X.2018.04.029

Previous Articles     Next Articles

Passive Image-splicing Detection Based on Multi-residual Markov Model

LUO Xiao-yang, HUO Hong-tao, WANG Meng-si and CHEN Ya-fei   

  • Online:2018-04-15 Published:2018-05-11

Abstract: Aiming at the problem that calculating the difference matrix singly for the traditional Markov feature is not robust to the splicing detection,this paper presented a color multi-residual type Markov feature for splicing detection.This method introduces the residual model from rich models for steganalysis(SRM) to improve the traditional Markov features,respectively extracts 10 different types of Markov features from three color channels,and trains 30 unique SVM classifiers to make the classification through the proposed decision-making algorithm.This method achieves the accuracy of 95.40% at Columbia image splicing detection evaluation dataset.

Key words: Image forensics,Splicing detection,Rich models for steganalysis,Markov feature

[1] FARID H,LYU S.Higher-order Wavelet Statistics and theirApplication to Digital Forensics[C]∥IEEE Computer Society Conference on Computer Vision and Pattern Recognition.2003.
[2] FU D,SHI Y Q,SU W.Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decompo-sition[C]∥Proceedings of the 5th International Workshop on Digital Watermarking.Berlin:Springer,2006:177-187.
[3] LIU X X,LI F,XIONG B.Image splicing detection using Weber local descriptors[J].Computer Engineering and Applications,2013,9(12):140-143.(in Chinese) 刘晓霞,李峰,熊兵.基于韦伯局部特征的图像拼接检测[J].计算机工程与应用,2013,9(12):140-143.
[4] SHI Y Q,CHEN C,CHEN W,et al.A natural image model approach to splicing detection[C]∥The Workshop on Multimedia &Security.ACM,2007:51-62.
[5] HE Z,LU W,SUN W,et al.Digital image splicing detectionbased on Markov features in DCT and DWT domain[J].Pattern Recognition,2012,45(12):4292-4299.
[6] SU B,YUAN Q,ZHANG Y,et al.Rapid Image Splicing Detection Based on Relevance Vector Machine[M]// Digital Forensics and Watermaking.Springer Berlin Heidelberg,2012:300-310.
[7] YUAN Q Q.Image Splicing Blind Detection Based on Enhanced MavkovModel in DWT Domain[D].Shanghai:Shanghai Jiao Tong University,2014.(in Chinese) 袁全桥.基于小波域改进马尔科夫模型的图像拼接盲检测研究[D].上海:上海交通大学,2014.
[8] LI Y,ZHONG L,LI J.Detection of image splicing forgery based on LBP and co-occurrence matrix[J].Journal of Wuhan University (Natural Science Edition),2015,1(6):517-524.(in Chinese) 李燕,钟磊,李健.基于LBP和共生矩阵的图像拼接篡改检测[J].武汉大学学报(理学版),2015,1(6):517-524.
[9] QIU X,LI H,LUO W,et al.A universal image forensic strategy based on steganalytic model[C]∥Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security.ACM,2014:165-170.
[10] FRIDRICH J,KODOVSKY J.Rich Models for Steganalysis of Digital Images[J].IEEE Transactions on Information Forensics &Security,2012,7(3):868-882.
[11] BATTISTI F,CARLI M,NERI A.Image forgery detection by means of no-reference quality metrics[C]∥Media Watermar-king,Security,and Forensics.International Society for Optics and Photonics,2012:265-298.
[12] YUAN Q Q,SU B,ZHAO X D,et al.Image splicing detectionbased on high frequency wavelet Markov features[J].Journal of Computer Applications,2014,4(5):1477-1481.(in Chinese) 袁全桥,苏波,赵旭东,等.基于高频小波子带马尔可夫特征的图像拼接检测[J].计算机应用,2014,4(5):1477-1481.
[13] Columbia DVMM Research Lab(2004) Columbia image splicing detection evaluation dataset.http://www.ee.columbia.edu/ln/dvmm/downloads/authsplcuncmp.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .