Computer Science ›› 2015, Vol. 42 ›› Issue (12): 240-242.

Previous Articles     Next Articles

Forensic Method Based on Markov Chain Model for Splicing Images

BU Jiang, ZHENG Bin and CHEN Hai-yang   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Markov chain is used to model the correlation of discrete cosine transform coefficients,and the state transition probability matrix is extracted as feature vector.Then the support vector machine classifier is used to discriminate natural images and doctored images.Experimental results show that the average accuracy rate can achieve 86%.The detection performance of our method is better than that of the method using bi-coherence features proposed by Ng.

Key words: Blind forensics,Discrete cosine transform,Markov chain,Support vector machine

[1] Fridrich J,Soukal D,Lukas J.Detection of copy-move forgery in digital images [C]∥Proceedings of Digital Forensic Research Workshop.Cleveland,OH,2003
[2] 吴琼,李国辉,孙韶杰,等.基于小波和奇异值分解的图像复制伪造区域检测 [J].小型微型计算机系统,2008,29(4):730-733 Wu Q,Li G H,Sun S J,et al.Detection of copy forgery regions in the image based on wavelet and singular value decomposition [J].Journal of Chinese Computer Systems,2008,29(4):730-733
[3] Sutcu Y,Coskun B,Sencar H T,et al.Tamper detection based on regularity of wavelet transform coefficients [C]∥Procee-dings of IEEE ICIP.2007
[4] Hsu Y F,Chang S F.Image splicing detection using camera response function consistency and automatic segmentation [C]∥Proceedings of ICME.2007
[5] Popescu A C,Farid H.Exposing digital forgeries in color filter array Interpolated Images [J].IEEE Transactions on Signal Processing,2005,53(10):3948-3959
[6] Ng T T,Chang S F,Sun Q B.Blind detection of photomontage using higher order statistics [C]∥Proceedings of IEEE International Symposium on Circuits and Systems.Vancouver,Canada,2004
[7] 崔霞,童学锋,宣国荣,等.基于双向马尔可夫模型的JPEG图象隐写分析 [J].计算机工程与应用,2007,43(23):32-34 Cui X,Tong X F,Xuan G R,et al.JPEG steganalysis based on bidirectional markov model [J].Computer Engineering and Applications,2007,43(23):32-34
[8] 边肇祺,张学工,等.模式识别(第2版)[M].北京:清华大学出版社,2000 Bian Z Q,Zhang X G,et al.Pattern Recognition(2nd edition)[M].Beijing:Tsinghua University Press,2000
[9] Ng T T,Chang S F.A data set of authentic and spliced image blocks:ADVENT Technical Report:203-2004-3[R].Columbia University,2004
[10] Calphoto.A database of photos of plants,animals,habitats and other natural history subjects.http://calphotos.berkeley.edu/cgi/img_query?query_src=photos_index & where-lifeform=Animal-Mammal
[11] Chang C C,Lin C J.LIBSVM:A Library for Support VectorMachines.http://www.csie.ntu.edu.tw/cjlin/libsvm
[12] Carvalho T J,Riess C,Angelopoulou E,et al.Exposing digital image forgeries by illumination color classification [J].IEEE Transactions on Information Forensics and Security,2013,8(7):1182-1194
[13] 杨健梅,黄添强,江伟坚.基于人脸色温的拼接图像篡改检测 [J].山东大学学报(工学版),2013,43(5):24-30 Yang J M,Huang T Q,Jiang W J.Splicing image tamper detection based on human face color temperature [J].Journal of Shandong University (Engineering Science),2013,43(5):24-30
[14] 王波,孔祥维,尤新刚.利用颜色滤波矩阵估计原图的拼接定位盲取证方法 [J].电子与信息学报,2012,34(1):200-206 Wang B,Kong X W,You X G.A blind forensics method for ima-ge splicing based on original image estimation using color filter array interpolation [J].Journal of Electronics & Information Technology,2012,34(1):200-206

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!