Tamper Detection of JPEG Image Due to Seam Modifications
Abstract |
---|
Content-aware image retargeting has been investigated since the last decade as a paradigm of image modification for proper display on the different screen sizes. Modifications, such as seam carving or seam insertion, have been introduced to achieve aforesaid image retargeting. The changes in an image are not easily recognizable by human eyes. Inspired by the Blocking Artifact Characteristics Matrix (BACM), a method to detect tampers caused by seam modification on JPEG retargeted images without knowledge of the original image is proposed in this paper. In a BACM block matrix, we found that the original JPEG image demonstrates a regular symmetrical data, whereas the symmetrical data in a block reconstructed by seam modification is destroyed. Twenty-two features are proposed to train the data by using a Support Vector Machine (SVM) classification method. The experimental results clearly demonstrate that the proposed method provides a very high recognition rate for those JPEG retargeted images. |
|
Authors |
---|
Kanoksak Wattanachote, Timothy K. Shih, Senior Member, IEEE, Wen-Lung Chang and Hon-Hang Chang
|
e-mail: kanoksak.wattanachote@gmail.com, timothykshih@gmail.com |
National Central University, No. 300, Jhongda Road, Jhongli City, Taoyuan County 32001, Taiwan (R.O.C.) |
Source Code: Download all |
|
---|---|
Experimental Results |
---|
The results in Table II and III demonstrate that the accuracy for testing by low tampering rate models such 1% or 2% are higher than that test by high tampering rate models such 50%. The tamper detection results for both seam carving and seam insertion obtained using UCID images are not different and similar to that obtained using UCUS images as demonstrated in perspective views in Fig. 11 and Fig. 12.
The highest average accuracy for seam carving detection was found in the experiment with QF100, whereas the lowest was found in the experiment with QF50. Besides, the highest average accuracy for seam insertion detection was found in the experiment with QF10, whereas the lowest average accuracy was found in the experiment with QF75.
Table XII (a) shows Sarkar et al.’s results and (b) demonstrates Wei et al.’s results. Table XII (c)-(e) demonstrates the results derived from our proposed method obtained using our two databases. The results show that the accuracy values by our proposed method are higher than that derived from Sarkar et al.’s method. In average, the accuracy by our proposed method is also higher than the accuracy by Wei et al.’s method. The experiments in Table XII (c)-(e) aimed to validate the dependence of the detection accuracy and the image databases. The results show that the detection accuracy and the image databases are independent since the results in Table XII (e) is similar to the results in Table XII (c) and (d). The detection accuracy by our proposed method in average is around 98-99%, higher than that obtained by Sarkar et al.’s and Wei et al.’s methods.
The experimental results in Table XIII show that the average accuracy of seam insertion detection obtained by our proposed method is also higher than that obtained by Sarkar et al.’s method. That means the symmetric phenomenon in blocking effects is evident for the compressed image. Seam modifications both carving and insertion can destroy that symmetric phenomenon.
We have also experimented with uncompressed images obtained using the images from UCID database. The UCID images are retargeted and subsequently passed through the detection processes as described in Fig. 4, without compression process. The experimental results in Table XIV show that test by mixed model can lead the detection accuracy in average around 67-69%, both in seam reduction and seam insertion detection. This means the symmetric phenomenon in blocking effects is not evident for uncompressed image.
Experimental Results of QFs Cross Validation |
---|
Experimental Results of Seam Tampered Detection in Removing Object Purpose |
---|
Experimental Results of Forward and Backward Energy (Source codes) |
---|
Copyright 2015 - MINE Lab, National Central University |