image tampering detection - information services ...shi/news report/fox news.pdf · image tampering...

26
4/11/2013 1 Image Tampering Detection Yun Q. Shi and Patchara Sutthiwan Intelligent Multimedia Lab New Jersey Institute of Technology [email protected] 24 April 2009 2 A Natural Image Model Approach to Tampering Detection Acknowledgement The contributions made by Professor Xuan, Drs. Zou, Fu, C. Chen, W. Chen, Su are deeply appreciated.

Upload: lamliem

Post on 17-May-2018

218 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

1

Image Tampering Detection

Yun Q. Shi and Patchara Sutthiwan

Intelligent Multimedia Lab

New Jersey Institute of [email protected] April 2009

2

A Natural Image Model Approach to Tampering Detection

Acknowledgement

The contributions made by Professor Xuan, Drs. Zou, Fu, C. Chen, W. Chen, Su are deeply appreciated.

Page 2: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

2

3

Machine Learning Framework �A two- or multiple-class pattern recognition problem.

� yi = Rn is a feature vector and its associated class is ωj ∈{-

1,1}.ωi = 1 if yi is tampered image, otherwise ωj =-1.

� The classifier learns the mapping yi → ωj in the training stage and produces a decision function.

� Popular classifiers include Bayes, support vector machine (SVM) and neural network (NN).

Feature Extractor

PatternClassifier

InputImage

yiRecognized

Class ωj

4

Merits of Proposed Model

�Two combinations:• Combination of features derived from the image

pixel 2-D array, and those derived from the Multi-block DCT (MBDCT) coefficient 2-D arrays

• Combination of moments of characteristic functions based features and Markov process based features

�These features can make up each other when properly applied.

Page 3: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

3

5

Block Diagram of the Natural Image Model

Given Image(Pixel 2-D array)

MomentFeatures

MarkovFeatures

MarkovFeatures•

••

•••2×2 BDCT

Coefficient2-D Array

MomentFeatures

MarkovFeatures

•••

n×n BDCTCoefficient2-D Array

•••

N×N BDCTCoefficient2-D Array

2×2 BlockDiscrete Cosine

Transform•••

•••

N×N BlockDiscrete Cosine

Transform

n×n BlockDiscrete Cosine

Transform

•••

MarkovFeatures

MomentFeatures

•••

MarkovFeatures

MomentFeatures

•••

•••

MomentFeaturesMBDCT

6

2-DArray

Horizontal2-D Histogram

2-D DFT

Marginalmoments

Vertical2-D Histogram 2-D DFT

MarginalMoments

Main Diagonal2-D Histogram

2-D DFT MarginalMoments

Minor Diagonal2-D Histogram 2-D DFT Marginal

Moments

Prediction-error

2-D arrayGeneration

DFTDWT• Momentssubbands

LL0

Histogram

DFTDWT• Momentssubbands

LL0

Histogram

Moment Feature Generation

Page 4: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

4

7

HorizontalDifference2-D Array

(2T+1)2-DTransitionProbability

Matrix

Image Pixel2-D Array

orBDCT

Coefficient2-D Array

T

-T

VerticalDifference2-D Array

Main DiagonalDifference2-D Array

Minor DiagonalDifference2-D Array

(2T+1)2-DTransitionProbability

Matrix

(2T+1)2-DTransitionProbability

Matrix

(2T+1)2-DTransitionProbability

Matrix

•| |

T

-T

T

-T

T

-T

Markov Feature Generation

8

A Concrete Implementation� The main concern is the limited number of images in [1].� Block sizes are selected as 2×2, 4×4, and 8×8.

� For moment features, One-level Haar wavelet decomposition and horizontal and vertical 2-D histogramsonly.

� When computing Markov features, we only apply Markov process to horizontal and vertical difference 2-D array of 8×8 BDCT coefficient 2-D array and threshold T = 4.

� Feature dimensionality: 168 + 162 = 330.

� SVM is employed as the classifier.

Page 5: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

5

9

Given Image(Pixel 2-D array)

Moment FeatureExtraction

42-D

2×2 BDCTCoefficient2-D Array

4×4 BDCTCoefficient2-D Array

8×8 BDCTCoefficient2-D Array

8×8 BlockDiscrete Cosine

Transform

4×4 BlockDiscrete Cosine

Transform

2×2 BlockDiscrete Cosine

Transform

Moment FeatureExtraction

42-D

Moment FeatureExtraction

42-D

Moment FeatureExtraction

42-D

Markov FeatureExtraction

162-D

Block Diagram of the Implementation

1010

Examples of spliced images (Columbia dataset)

Page 6: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

6

1111

1212

Page 7: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

7

1313

Experimental results on Columbia dataset (I)

Dartmouth Columbia NJIT-1 NJIT-2 NJIT-3

73% 71% 80% 82% 91%

On Columbia Dataset

14

10 randomly selected authentic images from Columbia dataset

14

Page 8: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

8

15

10 randomly selected spliced images from Columbia dataset

15

1616

• Kerry and Fonda (2004) → success• Israel air raid Lebanon (2006) → success• Iraqi solder (2003) → half success half

failure

Experimental results on real image tampering cases (II)

three well-known news examples

Page 9: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

9

17

Kerry and Fonda (2004)

17

Picture Actual type Detected as authentic

Detected as tampered

Kerry Authentic 20/20 0/20

Fonda Authentic 15/20 5/20

Kerry & Fonda Tampered 0/20 20/20

18

Israel Air Raid Lebanon (2006)

18

Picture Actual type Detected as authentic

Detected as tampered

On the left Authentic 20/20 0/20

On the right Tampered 0/20 20/20

Page 10: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

10

19

US Soldier in Iraqi (2003)

19

Picture Actual type Detected as authentic

Detected as tampered

On the left Authentic 0/20 20/20

In the middle Authentic 0/20 20/20

On the right Tampered 0/20 20/20

2020

• Girl (Air Force Research Lab) → success• Stalin → success• April 09, Israel → success• ABC News lady → success• Rove → success• Fire on Ice → success• Martha, Newsweek → success• Pitt and Julia → success• Reagan → success

Experimental results on real image tampering cases (III)

Page 11: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

11

21

Girl (Air Force Research Lab)

21

Picture Actual type Detected as authentic

Detected as tampered

On the left Authentic 13/20 7/20

On the right Tampered 2/20 18/20

22

Stalin

22

Picture Actual type Detected as authentic

Detected as tampered

On the left Authentic 19/20 1/20

On the right Tampered 7/20 13/20

Page 12: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

12

2323

April 09, Israel

24

April 09, Israel

24

Picture Actual type Detected as authentic

Detected as tampered

On the left Authentic 15/20 5/20

On the right Tampered 0/20 20/20

Page 13: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

13

2525

ABC News Lady

Actualtype

Tampered

Detected as authentic

7/20

Detected as tampered

13/20

26

Karl Rove

26

Page 14: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

14

2727

Karl Rove

Actualtype

Tampered

Detected as authentic

0/20

Detected as tampered

20/20

28

Fire on Ice

28

Actualtype

Tampered

Detected as authentic

0/20

Detected as tampered

20/20

Page 15: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

15

29

Martha

29

Actualtype

Tampered

Detected as authentic

0/20

Detected as tampered

20/20

30

Brad and Angelina

30

Page 16: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

16

31

Brad and Angelina

31

Actualtype

Tampered

Detected as authentic

0/20

Detected as tampered

20/20

32

Reagan

32

Picture Actual type Detected as authentic

Detected as tampered

On the left Tampered 6/20 14/20

On the right Tampered 1/20 19/20

Page 17: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

17

3333

• Tibet Antelope → success• Hitler → failure (analogue, other processing) • Iranian missile → failure (size, other factor) • Poster and soldiers → success (size)

• Nonsufficient training• Un-known factors

– Head-shoulder (some success, some failure)

Experimental results on real image tampering cases (IV)

34

Tibet AntelopeFeb. 25, 2008 (Chinese News Agency)

34

Page 18: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

18

35

Tibet AntelopeFeb. 25, 2008 (Chinese News Agency)

35

Actualtype

Tampered

Detected as authentic

2/20

Detected as tampered

18/20

36

Hitler

36

Page 19: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

19

37

Hitler

37

Picture Actual type Detected as authentic

Detected as tampered

On the left Authentic 4/20 16/20

On the right Tampered 20/20 0/20

38

Iranian Missiles

38

Page 20: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

20

39

Iranian Missiles

39

Picture Actual type Detected as authentic

Detected as tampered

On the left Authentic 0/20 20/20

On the right Tampered 0/20 20/20

40

Poster and Soldier

40

Page 21: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

21

41

Poster and Soldier

41

Actualtype

Tampered

Detected as authentic

0/20

Detected as tampered

20/20

42

Experimental results on real image tampering cases (V)

Two images from Nick

1st: Daisy

Page 22: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

22

43

2nd: Daisy and Ivy

4444

Picture Actual type Detected as authentic

Detected as tampered

On the left Authentic 20/20 0/20

On the right Tampered 0/20 20/20

Page 23: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

23

4545

4646

Picture Actual type Detected as authentic

Detected as tampered

On the left Tampered 0/20 20/20

On the right Tampered 7/20 13/20

Page 24: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

24

4747

Classification Results from Columbia Dataset

Filename Type Detected as authentic Detected as tampered

blk7 authentic 20/20 0/20

blk36 authentic 20/20 0/20

blk_3_63 authentic 20/20 0/20

blk_4_46 authentic 20/20 0/20

blk_5_28 authentic 20/20 0/20

blk_6_1 authentic 20/20 0/20

blk_8_74 authentic 20/20 0/20

blk_9_12 authentic 20/20 0/20

blk_10_21 authentic 20/20 0/20

blk_11_44 authentic 20/20 0/20

4848

blk_7_s tampered 12 8

blk_12_20 tampered 0 20

blk_13_33 tampered 0 20

blk_14_26 tampered 0 20

blk_14_58 tampered 0 20

blk_14_88 tampered 0 20

blk_14_106 tampered 0 20

blk_16_26 tampered 0 20

blk_17_4 tampered 4 16

blk_17_91 tampered 0 20

Page 25: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

25

4949

Classification Results from Real Image Tampering Cases

Description Filename

Actual

Type

Detected as

Authentic by

(per 20

classifiers)

Detected as

Tempered/Spliced

by (per 20

classifieres)

Fonda 4a.bmp authentic 15 5

Kerry 5a.bmp authentic 20 0

Fonda and Kerry

Combined 6t.bmp tampered 0 20

Israel air raid

Lebanon 7a.bmp authentic 20 0

8t.bmp tampered 0 20

Tibet Goat

tibetgoat_crop

ped.bmp tampered 2 18

Stalin (cropped

with 256x235) stalin_a.bmp authentic 19 1

stalin_t.bmp tampered 7 13

5050

April 09, Israel y_a.bmp authentic 15 5

y_t.bmp tampered 0 20

solder (cropped

with 256x256 at

the messages) solder_t.bmp tampered 0 20

Martha on

Newsweek cover martha_t.bmp tampered 0 20

ABC News abc_news_t.bmp tampered 7 13

Rove rovekarl_t.bmp tampered 7 20

April 09, Detrich's

Photo, ball added

basketball_small_t.b

mp tampered 0 20

Mussolini mussolini_a.bmp authentic 14 6

mussolini_t.bmp tampered 20 0

Black girl IF9905_5.jpg authentic 13 7

IF9905_7.jpg tampered 2 18

Page 26: Image Tampering Detection - Information Services ...shi/News report/Fox News.pdf · Image Tampering Detection ... (Columbia dataset) 4/11/2013 6 1111 1122. 4/11/2013 7 1133 ... •

4/11/2013

26

5151

fire on ice fireonice_t.bmp tampered 0 20

Pitt (cropped with

193x132) pitt_t.bmp tampered 0 20

Regan on Times

(200x244 full size) reagan.jpg tampered 6 14

(cropped with

128x192) reagan_mod_t.bmp tampered 1 19

Iran Missile iran_missile_a.bmp authentic 0 20

iran_missile_t.bmp tampered 0 20

Hitler hitler_a.bmp authentic 4 16

hitler_t.bmp tampered 20 0

Lena IF9905_9.jpg authentic 20 0

IF9905_10.jpg tampered 20 0

Castro

castro_a.bmp

(256x256) authentic 18 2

castro_t.bmp

(256x256) tampered 10 10

castro_t2.bmp

(368x278) tampered 16 4

castro_t3.bmp

(256x256) tampered 18 2

5252

� Data set of authentic and spliced image blocks, DVMM, Columbia University, http://www.ee.columbia.edu/dvmm/researchProjects/AuthenticationWatermarking/BlindImageVideoForensic/

� http://www.ee.columbia.edu/dvmm/publications/04/TR_splicingDataSet_ttng.pdf� H. Farid: High-order statistics and their applications to digital forensics, IEEE Workshop

on Statistical Analysis in Computer Vision (in conjunction with CVPR), 2003. � T.-T. Ng, S.-F. Chang and Q. Sun, “Blind detection of photomontage using higher order

statistics”, IEEE ISCAS04, May, 2004.� D. Fu, Y. Q. Shi, and W. Su: Detection of image splicing based on Hilbert-Huang

transform and moments of characteristic functions with wavelet decomposition, IWDW2006.

� W. Chen, Y. Q. Shi, and W. Su: Image splicing detection using 2-D phase congruency and statistical moments of characteristic function, SPIE2007.

� Y. Q. Shi, C. Chen, W. Chen, “A natural image model approach to splicing detection,” ACM Workshop on Multimedia Security, Dallas, Texas, September 2007.

References