METHOD OF COPY-COVER IMAGE FORGERY DETECTION Sheng-Wen Peng 31004109
Dec 15, 2015
METHOD OF COPY-COVER IMAGE FORGERY
DETECTION
Sheng-Wen Peng31004109
Outline
Introduction WATERMARKING FOR IMAGE
AUTHENTICATION COPY-COVER IMAGE FORGERY DETECTION PCA Domain Method EXPERIMENTAL RESULTS
Introduction
Nowadays, due to rapid advances and availabilities of powerful image processing software, modifying the content of digital images becomes much easier with the help of sophisticated software such as Adobe Photoshop.
a photograph of Lincoln's head was superimposed onto a portrait of the southern leader John Calhoun
There are many ways to categorize the image tampering, and generally, we can tell that some usually performed operations in image tampering are:
1. Deleting or hiding a region in the image. 2. Adding a new object into the image 3. Misrepresenting the image information;
to insert and splicing image part of the original image is the one of the most typical method. Watermarking is the popular way to counterfeit the forgery image.
WATERMARKING FOR IMAGE AUTHENTICATION
Digital watermarking is the process of embedding information into a digital signal which may be used to verify its authenticity or the identity of its owners. There are several characteristic of watermarked image:
1. Robustness 2. Perceptibility 3. Capacity 4. Embedding method
The digital watermark, unlike the printed visible stamp watermark, is designed to be invisible to viewers. The bits embedded into an image are scattered all around to avoid identification or modification. Therefore, a digital watermark must be robust enough to survive the detection, compression, and operations that are applied on.
However, watermarking techniques have some drawbacks. Fragile watermark is not suitable for such applications involving compression of images, which is a common practice before sharing images on the Internet.
WATERMARK IMAGE FORGERY DETECTION
The copy-cover technique is the most popular technique for making image forgery. Copy-cover means that one portion of a given image is copied and then used to cover some object in the given image.
Several researchers have explored the copy-cover image forgery detection. Popescu and Farid used the PCA domain representation to detect the forged part, even when the copied area is corrupted by noise.
PCA Domain Method
Principal components analysis (PCA) is known as the best data representation in the least-square sense for classical recognition [16]. It is commonly used to reduce the dimensionality of images and retain most information. The idea is to find the orthogonal basis vectors or the eigenvectors of the covariance matrix of a set of images, with each image being treated as a single point in a high dimensional space.
Xq = PX
For forgery detection, we create an image database composed of 500 images for use in our experiment.
Algorithm
1. Given image loading 2. Convert the image given into gray
scale image.Let N be the total number of pixelsLet b denote the number of pixels in a square block
Using PCA 3. Find the eigenvectors and eigenvalues. 4. Sort the eigenvalues in decreasing
order and also the eigenvectors. 5. Compute the projections of the
centered testing gram matrix on the ordered eigenvectors (decreasing order of eigenvalues).
6. Lexicographically sort the projected version of the centered testing gram matrix. Let it be denoted by S.
7. For every ith rows i in S, select a number of subsequent rows, sj such that |i-j|<=Rth and place all the pairs of coordinates (xi,yi) and (xj,yj) on to a list P_in.
8. Compute offset for each row of P_in. 9. Compute the frequency offset. 10. Those rows in P_in which have high
frequency offsets are the duplicated regions
EXPERIMENTAL RESULTS
Reference
Frank Y. Shih* and Yuan Yuan ‘’A Comparison Study on Copy-Cover Image Forgery Detection’’ 2010
Digital Watermarking from Wikipedia http://en.wikipedia.org/wiki/Digital_watermarking
Principal component analysis from Wikipedia
http://en.wikipedia.org/wiki/Principal_component_analysis
Prem Kumar ‘’Digital Image Forensics (Copy-paste forgery detection)’’ 2010