HOME JOURNALS CONTACT

Information Technology Journal

Year: 2014 | Volume: 13 | Issue: 7 | Page No.: 1341-1345
DOI: 10.3923/itj.2014.1341.1345
Detection of Composite Images Based on Single Channel Blind Signal Separation
Wei Wang, Feng Zeng, Xintao Duan and Hongjun Li

Abstract: A common technique of photographic manipulation is the digital splicing combining two or more images into a single composite. However, many of the existing detection methods are limited to handle merely one type of splicing image. In this study, a novel method is proposed to detect the splicing by using Single Channel Blind Signal Separation (SCBSS). The mixing matrix can be constructed through the splicing definition in order to build a new SCBSS model. A new measure is developed to estimate the special binary matrix, which recover all source images. These images allow identifying the spliced region and the background region. The experiment results are promising and confirm the robustness of the proposed approach.

Fulltext PDF Fulltext HTML

How to cite this article
Wei Wang, Feng Zeng, Xintao Duan and Hongjun Li, 2014. Detection of Composite Images Based on Single Channel Blind Signal Separation. Information Technology Journal, 13: 1341-1345.

Keywords: characteristics domain, Passive image forensics, image composition and SCBSS

INTRODUCTION

With the development of sophisticated image editing tools and softwares, various types of digital forgeries can be easily created. One of the most common types of image forgeries is the image splicing. Over the past few years, many techniques have been developed to discover such splicing and compositing of images. Farid (2009a, b) roughly groups blind approaches for image splicing detection into four categories: (1) Pixel-based techniques, (2) Format-based techniques, (3) Camera-based techniques and (4) Physically based techniques. In the first group, unnatural correlations resulting (Popescu and Farid, 2005a) from the resampling process when tampering an image are identified and utilized as clues of forgery. As in the second categories, Farid (2009a) exploited properties of specific lossy compression schemes for digital forgery detection. This method detects whether a part of an image was initially compressed at a lower quality than the rest of the image. Methods belonging to the third approach are also introduced for forgery detection by exploiting artifacts introduced by the camera. By detecting the difference of color filter array (Popescu and Farid, 2005b), sensor noise (Chen et al., 2008) and camera response (Hsu and Chang, 2010), the inconsistency in altered images can be obtained. In the fourth group, several methods using physical rules detect anomalies of interaction between objects in the target scene. Johnson and Farid (2007) proposed to detect image splicing using inconsistency of lighting direction. Photometric consistency of illumination (Liu et al., 2011) in shadows is often a useful constraint for finding suspicious shadows. Composites of image are detected using the perspective constraint that the height ratio of two objects in an image should be different (Yao et al., 2012).

Each of the methods mentioned above are limited to handle merely specific kinds of tampering. Since many researchers pay attention to find new features or new approaches for splicing detection in the earlier research, but few is concerned on mathematical model and theoretical research. In this study, a novel method is proposed to detect the splicing by using Single Channel Blind Signal Separation (SCBSS). A new measure is developed to estimate the special binary matrix, which recover all source images. These images allow identifying the spliced region and the background region. The experiment results show the general effectiveness of this technique even if the images to be tested have been noised with different levels or compressed with a low quality factor.

PROBLEM FORMULATION

According to the definition of spliced images, the mathematical model is described by the following Equation:

(1)

where, y(i, j) is the spliced image, denotes Hadamard product, s(i, j) = [so (i, j), s1 (i, j),..., sN (i, j)]T is the (1+N)x1 vector of source images, A = [A0, A1,..., AN] is the 1x(1+N) vector of mixing matrixes. Where the splicing matrixes An are:

where, U0, U1,..., UN denote the activation region with U0∪U1∪...∪UN = U and ∀n, m, Un∩Um = ø.

In order to make a seamless and plausible spliced image in practice, applying post-processing is indispensable and inevi . Furthermore, blur operation is one of the commonly used methods to conceal the traces of tampering. The blurred spliced image is modeled as:

(2)

where,⊗ denotes convolution operator, hn (i, j) is the blurring kernel, n = 1, 2,...N. In general, the blurring kernel size is much smaller than the spliced region. Neglecting some edge points, Eq. 2 is also equivalent written as:

(3)

where, is the (1+N)x1 vector of source images, A = [A0, A1,..., AN] is the 1x(1+N) vector of mixing matrixes. Equation 1 and 3 are typical single channel mixture model.

PROPOSED FORGERY DETECTION METHOD

This study proposed a method which can detect image forgeries by using SCBSS. Proper characteristics domain is first represented from the given image. Based on this characteristics domain, the mixing matrix can be estimated and all source image blocks can be recovered. These image blocks allow identifying the spliced region and the background region.

Characteristics domain represents: In general, the spliced region and the background region have different characteristics in a sense because they came form different original images. Taking the Characteristics Domain Transform (CDT), the spliced image can be represented as:

(4)

where, Y, S0, S1,..., SN represent the characteristics domain transform of Y, S0, S1,..., SN, respectively, ω denotes characteristics factor, F[.] denotes nonlinear mixed.

Form Eq. 4, obviously, Y(ω) is a global mixed. In other words, the characteristics, S0, S1,..., SN has not activation region as defined earlier. Our goal is to estimate these characteristics, S0, S1,..., SN, then recovers the mixing matrixes A.

Mixing matrix estimates: In order to increase the robustness to the noise, the clustering algorithm is exploited to estimate the mixing matrixes A0, A1,..., AN. The clustering criterion function is defined as:

(5)

where, d denotes euclidean distance, Yu and Yv are the 1xk vector of characteristic points. This metric is used to determine the clusters of the characteristic points. Yu and Yv will be amalgamated into same cluster when d is below a predetermined threshold τ. In this case, when all subsequent characteristic points are carried out in Eq. 5, the mixing matrixes A can be recovered using different clusters, making us able to identify the value 1 of the binary mixing matrix.

Source image separates: According to the mixing matrix recovered in the section III-B and defined in the section II, the left multiplication AT of (1) could be written as:

(6)

(7)

From Eq. 7, the separated results are not the source images s0, s1,..., sN, but the subblocks, making us able to identify the spliced regions and the background regions.

EXPERIMENTAL RESULTS

In the first experiment, simulations are performed to show efficacy of the proposed method. Some examples of the detection for spliced regions are shown in below images. In Fig. 1, column (a) gives two JPEG spliced images, where the spliced regions and the background regions undergone compressed with JPEG quality factors 70, 89 and 55, 88 (from up to down), respectively. Column (b) in each figure shows the corresponding CDT image of the quality factors. The mixing matrixes A can be estimated using different clusters of characteristic points, as defined in section III-B. The background regions and the spliced regions are accurately separated by left multiplying AT method defined in section III-C, as shown in column (c) and (d). It is observed that the proposed method can correctly indentify fake objects with inconsistent JPEG quality factors even if there are close to each other.

In Fig. 2, column (a) gives two resampling spliced images, where the spliced regions undergone nearest neighbor interpolation with 1.25 and bilinear interpolation with 1.5 (from up to down), respectively. Column (b) gives the corresponding CDT image of the interpolation factors. Column (c) and (d) give the separation results. Form experimental results, the proposed algorithm can correctly detect forgery objects with inconsistent resampling factors.

Figure 3 gives the detection results of spliced images with different background noise levels. Column (a) gives two noisy spliced images, where the background regions and the spliced regions with different background noise levels σ1 = 10-6 and σ2 = 10-4, respectively. Column (b) gives the corresponding CDT image of double imnoise correlation. Column (c) and (d) are the separation results. Form experimental results, the spliced regions are almost completely separated.

In order to make a seamless and plausible spliced image in practice, applying post-processing is indispensable. Figure 4 gives the detection results of spliced images with undergone blurring. Column (a) are two blurring spliced images, where the spliced regions undergone Gaussian blur and Shape blur (from up to down), respectively. Column (b) gives the corresponding CDT image of douible blur correlation. Column (c) and (d) give the separation results.

Fig. 1(a-d):
JPEG spliced images and their separation results, (a) JPEG spliced images, (b) Characteristics domains constructed by quality factors and (c-d) Separation results

Fig. 2(a-d):
Interpolated spliced images and their separation results, (a) Interpolated spliced images, (b) Characteristics domains constructed by interpolation factors and (c-d) Separation results

Fig. 3(a-d):
Noisy spliced images and their separation results, (a) Noisy spliced images, (b) Characteristics domains constructed by double imnoise correlation coefficients and (c-d) Separation results

Fig. 4(a-d):
Blurring spliced images and their separation results, (a) Blurring spliced images, (b) Characteristics domains constructed by double blur correlation coefficients and (c-d) Separation results

Fig. 5: Detection accuracy as a function of SNR

It is observed that the proposed algorithm can correctly detect fake objects with inconsistent blurs.

In the second experiment, the robustness of the proposed approach was also tested. Figure 5 compares the performance of our algorithm on spliced images with different noise levels. The comparison shows that the proposed algorithm on JPEG spliced images has a better performance than other kinds of spliced images.

Fig. 6:
Detection accuracy as a function of JPEG compression

At low Signal-to-Noise Ratio (SNR) of 30dB, the lowest 65.00% and the average 71.67% detection accuracy of the proposed algorithm are obtained.

Moreover, Fig. 6 compares the results of the scheme when the spliced images were compressed with JPEG quality factors (Q) of 100, 90, 80, 70, 60 and 50. As can be observed, the proposed algorithm on noisy spliced images is more robust to JPEG compression than other kinds of spliced images. Even with low compression factor Q = 50, the lowest 70.00% and the average 74.67% detection accuracy of the proposed algorithm are still achieved.

CONCLUSION

In this study, a novel detection technique based on SCBSS for spliced images was proposed. The given image is first performed characteristics domain transform. If the suspected image contained spliced region, in general, is unlikely to be completely consistent with characteristics in a sense in the rest of the image. So, the mixing matrix based on this characteristics domain can be estimated and then all source image blocks can be recovered. These image blocks allow identifying the spliced region and the background region. Experimental results show that the proposed technique has good segmentation for various splicing operation. The proposed method has good robustness against Gaussian noise and lossy JPEG compression.

ACKNOWLEDGMENTS

This study was supported by the Natural Science Foundation of the Jiangsu Higher Education Institutions of China (Grant No. 12KJB510026, 12KJB510025), the National Natural Science Foundation of China (Grant No. U1204606) and the Scientific Research Foundation for the PhD (Nantong University, Grant No. 03080416, 03080415).

REFERENCES

  • Farid, H., 2009. Image forgery detection. IEEE Signal Proces. Mag., 26: 16-25.
    CrossRef    


  • Popescu, A.C. and H. Farid, 2005. Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Signal Process., 2: 758-767.
    CrossRef    Direct Link    


  • Farid, H., 2009. Exposing digital forgeries from JPEG ghosts. IEEE Trans. Inf. Forensics Sec., 4: 154-160.
    CrossRef    


  • Popescu, A.C. and H. Farid, 2005. Exposing digital forgeries in color filter array interpolated images. IEEE Trans. Signal Process., 53: 3948-3959.
    CrossRef    


  • Chen, M., J. Fridrich, M. Goljan and J. Lukas, 2008. Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Secur. Forensics, 3: 74-90.
    CrossRef    


  • Hsu, Y.F. and S.F. Chang, 2010. Camera response functions for image forensics: An automatic algorithm for splicing detection. Trans. Inf. Forensics Secur., 5: 816-825.
    CrossRef    Direct Link    


  • Johnson, M.K. and H. Farid, 2007. Exposing digital forgeries in complex lighting environments. IEEE Trans. Inf. Forensics Sec., 3: 450-461.
    CrossRef    Direct Link    


  • Liu, Q., X. Cao, C. Deng and X. Guo, 2011. Identifying image composites through shadow matte consistency. IEEE Trans. Inf. Forensics Sec., 3: 1111-1122.
    CrossRef    


  • Yao, H., S. Wang, Y. Zhao and X. Zhang, 2012. Detecting image forgery using perspective constraints. IEEE Signal Process. Lett., 3: 123-126.
    CrossRef    

  • © Science Alert. All Rights Reserved