کشف دستکاری به وسیله فیلتر میانه در تصاویر فشرده

نوع مقاله : مقاله پژوهشی

نویسندگان

1 Sharif University of Technology

2 دانشگاه صنعتی شریف

چکیده

بررسی فیلتر میانه، به­عنوان فرآیندی حافظ محتوا، که برای هموارسازی و حذف نویز از تصاویر به­کار می‌رود، مورد توجه جدی پژوهشگران حوزه مستندسازی بوده است. در این مقاله، روشی برای کشف به کارگیری فیلتر میانه در تصاویر فشرده بر اساس تجزیه مقادیر تکین ماتریس فرآیند، پیشنهاد شده است. در این روش، ماتریس فرآیند از تخمین خطی فرآیند کدگشایی، اعمال فیلتر میانه و فشرده‌سازی مجدد تصویر حاصل می‌گردد. سپس از تصویر داده‌های ورودی بر فضاهای ویژه این ماتریس به­عنوان ویژگی‌های تصویر استفاده می‌شود. به کمک تعداد اندکی از ویژگی‌های مذکور، طبقه‌بندی تصویر به­عنوان تصویری اصیل یا پردازش‌شده انجام می­پذیرد تا روشی سریع و موثر برای کشف فیلتر میانه طراحی گردد. شبیه‌سازی‌ها نشان می‌دهند که روش پیشنهادی بالاخص در نرخ فشرده‌سازی بالا، عملکرد بهتری نسبت به سایر روش‌های موجود دارد و خطای آشکارسازی آن در مقایسه با روش‌های دیگر 2% تا 5% کمتر است. تجزیه مقادیر تکین ماتریس فرآیند را که در این مقاله معرفی شده است، می‌توان برای کشف سایر دست­کاری­های صورت­گرفته روی تصویر نیز به­کار برد.

کلیدواژه‌ها


عنوان مقاله [English]

Detection of Median Filtering Manipulation in Compressed Images

نویسندگان [English]

  • V. Amanipour 1
  • S. Ghaemmaghami 2
1
2
چکیده [English]

Median filtering, as a nonlinear content preserving process that is often employed for smoothing and denoising images, has received significant attention from the forensics and documentation research       community. In this paper, a detection scheme for median filtering of compressed images is proposed, based on singular value decomposition of the process matrix. In the proposed method, the process matrix is      obtained by linear estimation of the decoding process, implementation of median filtering and             recompression of the image. The projections of input data over eigenspaces of this process matrix is then used as features of the image. A small number of such features are utilized to classify the image as          either original or processed, thus leading to a fast and effective detection scheme for median filtering. The experimental evaluations show that the proposed scheme outperforms the existing methods, particularly over highly compressed images, and its detection error is 2% to 5% lower in comparison to the errors      introduced by other detection schemes. The singular value decomposition of the process matrix introduced in this paper, may also be used in detection of other cases of image content manipulation.
 

کلیدواژه‌ها [English]

  • Image authentication
  • Median filter
  • Singular value decomposition
  • Image Forensics
[1]     Reverse engineering of audio-visual content data, “Deliverable D3.1, State-of-the-art on multimedia footprint detection,” FP7-ICT project REWIND, Grant Agreement no. 268478, Technical report, 2011.##
https://cordis.europa.eu/docs/projects/cnect/8/268478/080/deliverables/001-REWINDD31final.pdf##
[2]     S. Banerjee and A. Roy, “Linear Algebra and Matrix Analysis for Statistics,” (Texts in Statistical Science), 1st ed. London, U.K., Chapman and Hall/CRC, 2014.##
[3]     G. W. Stewart, “On the early history of the singular value decomposition,” SIAM Review, vol. 35, no. 4, pp. 551-566, 1993.##
[4]     A. C. Bovik, “Streaking in median filtered images,” IEEE Trans. Acoust. Speech, Signal Process. , vol. 35, no. 4, pp. 493-503, 1987.##
[5]     M. Kirchner and J. Fridrich, “On detection of median filtering in digital images,” Proc. SPIE, Media Forensics and Security II, vol. 7541, pp. 1-12, 2010.##
[6]     T. Pevny´, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Trans. Inf. Forensics security, vol. 5, no. 2, pp. 215-224, 2010.##
[7]     H. Yuan, “Blind forensics of median filtering in digital images,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1335-1345, 2011.##
[8]     C. Chen, J. Ni, R. Huang, and J. Huang, “Blind detection of median filtering in digital images: A difference domain based approach,” IEEE Trans. Image Process., vol. 22, no. 12, pp. 4699-4710, 2013.##
[9]     X. Kang, M. C. Stamm, A. Peng, and K. J. R. Liu, “Robust median filtering forensics using an autoregressive model,” IEEE Trans. Inf. Forensics  Security , vol. 8, no. 9, pp. 1456-1468, 2013.##
[10]  J. Yang, H. Ren, G. Zhu, J. Huang, and Y. Q. Shi, “Detecting median filtering via two-dimensional AR models of multiple filtered residuals,” Multimed. Tools Appl., vol. 77, no. 7, pp. 7931-7953, 2018.##
 [11]  Y. Zhang, S. Li, S. Wang, and Y. Q. Shi, “Revealing the traces of median filtering using high-order local ternary patterns,” IEEE Signal Process. Lett., vol. 21, no. 3, pp.   275-279, 2014.##
[12]  Y. Niu, Y. Zhao, and R. Ni, “Robust median filtering detection based on local difference descriptor,” Signal Process. Image Comm., vol. 53, pp. 65-72, 2017.##
[13]  J. Chen, X. Kang, Y. Liu, and Z. J. Wang, “Median filtering forensics based on convolutional neural networks,” IEEE Signal Process. Lett. , vol. 22, no. 11, pp. 1849-1853, 2015.##
[14]  W. Fan, K. Wang, and F. Cayre, “General-purpose image forensics using patch likelihood under image statistical models,” in Proc. IEEE Int. Workshop Inf. Forensics security, pp. 1-6, 2015.##
[15]  B. Bayar and M. C. Stamm, “A deep learning approach to universal image manipulation detection using a new convolutional layer,” in Proc. ACM Workshop Inf. Hiding Multimedia security, pp.5-10, 2016.##  
[16]  H. Y. Choi, H. U. Jang, D. Kim, J. Son, S. M. Mun, S. Choi, and H. K. Lee, “Detecting composite image manipulation based on deep neural networks,” in Proc. the Int. Conf. on Syst. Signal and Image Processing, IEEE, pp. 1-5, 2017.##
[17]  H. Li, W. Luo, and X. Qiu, “Identification of various image operations using residual-based features,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 28, no. 1, pp. 31-45, Jan. 2018.##
[18]  B. Bayar, and M. C. Stamm, “Constrained Convolutional Neural Networks: A New approach Towards General Purpose Image Manipulation Detection,” IEEE Tran. Inf. Forensics Security, pp. 2691-2706, 2018.##
[19]  M. Boroumand and J. Fridrich, “Deep learning for detecting processing history of images,” in Electronic Imaging, no. 7, pp. 1-9, 2018.##
[20]  C. Pasquini, G. Boato, N. Alajlan, and F. G. B. De Natale, “A deterministic approach to detect median filtering in 1D data,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 7, pp. 1425-1437, 2016.##
[21]  W. Fan, K. Wang, F. Cayre, and Z. Xiong, “Median filtered image quality enhancement and anti-forensics via variational deconvolution,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 5, pp. 1076-1091, 2015.##
[22]  Z. H. Wu, M. C. Stamm, and K. J. R. Liu,                   “Anti-forensics of median filtering,” in Proc. IEEE Int. Conf. Accoust. Speech, Signal Processing, pp. 3043-3047, 2013.##
[23]  H. Zeng, T. Qin, X. Kang, and L. Liu, “Countering   anti-forensics of median filtering,” in Proc. IEEE Int. Conf. Accoust. Speech, Signal Processing, pp. 2704-2708, 2014.##
[24]  V. Amanipour and S. Ghaemmaghami, “Median Filtering Forensics in Compressed Video,” IEEE Signal Process. Lett., vol. 26, no. 2, pp. 287-291, Feb. 2019.##
[25]  G. Schaefer and M. Stich, “UCID-an uncompressed color image database,” in Proc. SPIE, Storage and Retrieval Methods and Appl. for Multimedia, no. 36, pp. 472-480, 2004.##
[26]  C. C. Chang and C. J. Lin, “LIBSVM: A library for support vector machines,” ACM Trans. on Intelligent Syst. and Technol., vol. 2, no. 3, pp. 1-39, 2011.##
[27]  V. Sreekanth, A. Vedaldi, C. V. Jawahar, and A. Zisserman, “Generalized RBF feature maps for efficient detection,” in Proc. Brit. Mach. Vision Conf., pp. 1-11, 2010.##