Tampering Detection Based On Blur Inconsistencies

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 1- June 2015
Tampering Detection Based On Blur Inconsistencies
Vidyalaxmi Garur#1, Dr.Lalitha Y S *2
#
P G student, Digital Electronics, * P G Head, Dept. of E & CE, Appa institute of engineering and technology,
Gulbarga India
Abstract— Image tampering is a digital art which needs
understanding of image properties and good visual
creativity. The tampering of image is done for many reasons
either to enjoy fun of digital works creating pleasant photos
or to produce false evidences. In this paper, we propose a
method for image tampering detection based on blur
inconsistency detection and classification. The image is
partitioned into blocks, after the block based partitioning,
for local blur kernels estimation a space variant prior for
local blur kernel is proposed. To cluster the image blocks
which have similar blur kernels into different regions kmeans clustering is used and the clusters are classified as
the different blur types. The experimental result shows there
is an inconsistency in the blur types of an images by
considering the difference value between the motion blur
,out of focus blur and the original image which is the proof
for the image tampering.
Keywords— Image splicing, Motion blur, Out of focus blur,
Partial blur detection, Tampering detection.
I. INTRODUCTION
Adding or removing the important features from an
image is called as image tampering. In terms of image
processing, changing the original image information
by modifying the pixel values to a new values is
known as image tampering. This means enhancing the
image quality in order to clearly express the content of
the image. Tampering digital images from their time
of capture with an intention to change its original
information is called digital image tampering. It is also
called as image forgery. In order to produce false
evidences tampering is done to the image by covering
the objects in the original image. Image tampering can
be threat to security of people and society.
There are many types of image tampering
techniques, one of the most common type of
tampering is image splicing. In this method, if there is
a blur type difference in original image and spliced
region such as out of focus blur and motion blur, then
there is an inconsistency in blur may be present in the
tampered image. The aim of the present work is image
splicing detection by exploring the inconsistency in
the partial blur types.
The image forensic techniques are divided into
active and passive. There are different categories in
the passive technique such as (1) Format-based[1]; (2)
Camera-based such as demos icing regularity [2-4],
and sensor pattern noise[5]; (3) Pixel-based such as resampling[6] and contrast enhancement detection[7]; (4)
Physically-based such as light anomalies[8]. There are
some limitations with each techniques.
ISSN: 2231-5381
Based on the blur degree inconsistency some works
have been proposed for tampering detection[9-13]. For
splicing detection Kakar et al. [14] proposed a method
based on inconsistency in the motion blur degree and
direction. But this method is only applicable for
motion blur.Based on alpha channel Su et al.[15]
proposed a technique for segmentation of motion and
out-of-focus blurred regions. The limitation of the
methods in [15]. Based on magnitude of cepstrum
coefficients Aizenberg et al [16] proposed a technique
for classification of motion, Gaussian and uniform
blurred blocks.The methods in[15-16] have the
limitation that they do not high performance for partial
blur type detection.The image is portioned into the
blocks and a feature is used to classify the blur type of
the blocks. In real situation the size of the block
effects the blur types of the image blocks. A two step
approach is proposed for detection of blur types at
block levels.
.
II. TYPES OF IMAGE TAMPERING
The commonly used techniques for
tampering are as follows.
image
A. Copy-move
This is the commonly used type of image tampering
technique, which includes the adding or removing of
information to cover any part of the original image.
The texture areas have the same properties to that of
the image, so it is unperceivable for human eye
investigation.
B. Image Slicing
Image splicing is obtained by sticking different
photographic images together. The art of creating
composite photograph which can be tracked back to
the time of camera invention
is called as
photomontage.
C. Resize
This can be used for performing geometric
transformation of an image such as shrinking or
enlarging the size of an image or part of an image
D. Cropping
Cropping is a technique to cut-off borders of an
image or reduces the canvas on which an image is
displayed. Generally this kind of operation is used to
http://www.ijettjournal.org
Page 1
International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 1- June 2015
remove border information which is not important for
display
Most of the values in the motion blur kernels are
zero, so motion blur kernels tend to be sparse while
the tendency of sparse in out of focus blur kernels is
III. LOCAL BLUR KERNEL ESTIMATION
less. Sparse in low blur degree kernels are more than
Given a color image A of size M×N, we first the high blur degree, this means the kernel sparseness
convert this image into gray scale image G and then G depends on the blur degree. The distribution of motion
is partitioned into non overlapping blocks Gi,j with blur kernels are closer to hyper-laplacian while the
P×P pixels, where I and j are index of blocks (1≤ i ≤ one for out of focus blur kernels are closer to
Gaussian. By choosing prior model closer to hyper, 1≤ j ≤ ). The image blurring process for an image laplacian for motion blur kernels and a prior model
closer to Gaussian for out of focus blur kernels better
block Gi,j is represented by
results can be obtained.
Gi,j = Ii,j ∗ Ki,j + Ni,j
IV. SIMILARITY BASED CLUSTERING OF LOCAL BLUR
(1)
KERNELS
Where Ii,j is a sharp image block, Ki,j is a local blur
kernel, Ni,j is the image block noise and * denotes
convolution.
Blind Image Deconvolution is used to estimate Ki,j
from Gi,j, which estimate Ki,j and Ii,j from Gi,j . The
method in [20] is udes to solve Blind Image
Deconvolution. For better results we need to choose
accurate models for Ki,j and Ii,j
The statistics of motion blur and out of focus
kernels is studied to find appropriate prior for local
blur kernels. We blur the 400 sharp images with
motion blur and out of focus with different
specifications and the local blur kernels of the images
are estimated. Fig. 1(a) and 1(b) plots the pixel
distribution of motion blur and out of focus blur
kernels respectively.
Fig. 1(a). Pixel value distribution of motion blur
kernels.
Fig. 1(b). Pixel value distribution of out of focus
blur kernels
ISSN: 2231-5381
For blur kernel estimation , to increase the accuracy
of blur kernel it is advantageous to use the large
region of the blurred image. To achieve better results
in the blur kernel estimation the blur in the region
should be invariant in terms of type. In this step, to
generate a space-invariant blur type regions the image
blocks with similar blur kernels are clustered together.
Here we use k-means clustering by taking the intensity
of local blur kernels pixels and the coordinates of the
image blocks in the image as the input features.
Given a set of blur kernels K1,1, K1,2, ….K , of an
image where M×N and P×P are the size of image and
image blocks, respectively. The clustering feature
vector is defined as a d-dimensional vector including
coordinates (i , j)and the pixel intensity of the local
blur kernels of the image blocks. For local blur kernels
of size K×K and (i , j) as horizontal and vertical
coordinates in the image, the feature vector is defined
as V=[ Ki,j (1,1), Ki,j (1,2),… Ki,j (K, K),I,j] with
d=K×K+2 as the input. The k-means clustering
partitions the image blocks into s R1,R2,…Rs to
minimize the sum of squares between pixels of kernels
within the cluster,where sis the number of clusters.
V. REGION BLUR TYPE CLASSIFICATION FOR THE
DETECTION OF IMAGE TAMPERING.
The image G is segmented into s regions, then the
image G is represented by s layers formation model as
G = η1×R1+... + ηs × Rs, where R1, ...,Rs are the
regions and η1, ..., ηs
are the binary masks representing the regions. Now
the image blrring procees in eq.1 is formulated as G =
η1 ×(I1 ∗K1 +N1)+... + ηs × (Is ∗ Ks + Ns), where
K1, ...,Ks are the blur kernels of s regions R1, ...,Rs.
Minimum distance classifier is used to identify the
blur type of the regions which measures the
normalized cross correlation of the estimated blur
kernels K1, …...., Ks and a set of candidate motion
blur kernels {Km1 ,...,Kmu } and out-of-focus blur
kernels{Ko1 , ...,Kov} with different specifications.
Finally the evaluation is needed to detect any
inconsistency between the blur type and the image
region. If one region has a motion blur and the other
http://www.ijettjournal.org
Page 2
International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 1- June 2015
has a out of focus blur then we can say this as
Fig.4 Edge detection of Image
inconsistency in the blur types.
VI. RESULTS
Given a color image A this is converted into gray
scale and the image is partitioned into number of
blocks and the local blur kernels of the image block is
estimated. K-means clustering is used to cluster the
image blocks based on similarity. These clusters are
classified into different blur types. The accuracy of the
tampering detection is affected by the number of
clusters. The results are shown as follows
Fig.5. Blur reconstruction
Fig.2. Original Image
Fig. 6. Deblurred image
Fig.3.Gray scale Image
Fig.7. Out put Image of Tampering Detection
VII.
CONCLUSION
A novel method for image tampering detection is
proposed
based on partial blur detection and
classification. The input image is partitioned into
number of non overlapping blocks and are used for
local blur kernel estimation. To categorize the image
blocks with similar blur kernels into different regions
ISSN: 2231-5381
http://www.ijettjournal.org
Page 3
International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 1- June 2015
clustering method is used. Then the blur kernels of the
clusters are estimated and the clusters are classified
into different blur types .The experimental results
shows that this proposed method can be used for
tampering detection.
ACKNOWLEDGMENT
Authors would like to thank Department of
Eectronics and Communication, Appa institute of
engineering and technology, Gulbarga, whose timely
support and suggestions went along in the completion
of the project.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
T. Bianchi and A. Piva, “Image Forgery Localization via
Block-Grained Analysis of JPEG Artifacts,” IEEE Trans. Inf.
Forensics Security, vol. 7, no. 3, pp. 1003-1017, 2012.
H. Cao and A. C. Kot, “Accurate Detection of Demosaicing
Regularity for Digital Image Forensics,” IEEE Trans. Inf.
Forensics Security, vol. 4, no. 4, pp. 899-910, 2009.
P. Ferrara, T Bianchi, A. D. Rosa and A. Piva, “Image
Forgery Localization via Fine-Grained Analysis of CFA
Artifacts,” IEEE Trans. Inf. Forensics Security, vol. 7, no.5,
pp. 1566-1577, 2012.
A. Swaminathan, M. Wu, and K. J. R. Liu, “Digital Image
Frensics via Intrinsic Fingerprints,” IEEE Trans. Inf.
Forensics Security, vol. 3, no. 1, pp. 101-117, 2008.
M. Chen, J. Fridrich, M. Goljan, and J. Lucas, “Determining
Image Origin and Integrity Using Sensor Noise,” IEEE Trans.
Inf. Forensics Security, vol. 3, no. 1, pp. 74- 89,2008.
C. Popescu and H. Farid, “Exposing Digital Forgeries by
Detecting Traces of Resampling,” IEEE Trans. Signal
Processing, vol. 53, no. 2, pp. 758-767, 2005.
M. C. Stamm, and K. J. R. Liu, “Forensic Detection of Image
Manipulation Using Statistical Intrinsic Fingerprints,” IEEE
Trans. Inf. Forensics Security, vol. 5, no.3, pp. 492-506, 2010.
M. K. Johnson and H. Farid, “Exposing Digital Forgeries in
Complex Lighting Environments,” IEEE Trans. Inf.
Forensics Security, vol. 2, no.3, pp. 450-461, 2007.
K. Bahrami, A. C. Kot, and J. Fan, “Splicing Detection in
Out-of-Focus Blurred Images,” in Proc. WIFS, pp. 144-149,
2013.
Y. Sutcu, B. Coskun, H. T. Sencar, and N. Memon,“Tamper
Detection Based on Regularity of Wavelet Transform
Coefficients,” in Proc. ICIP, pp. 397-400,2007.
J.Wang, G. Liu, B. Xu, H. Li, Y. Dai, and Z.Wang, “Image
Forgery Forensics Based on Manual Blurred Edge
Detection,” in Proc. Multimedia Information Networking and
Security, pp. 907-911, 2010.
G. Cao, Y. Zhao, and R. Ni, “Edge-based Blur Metric for
Tamper Detection,” Journal of Information Hiding and
Multimedia Signal Processing, vol. 1, no. 1, pp. 20-27, 2010.
X. Wang, B. Xuan, and S. Peng, “Digital image forgery
detection based on the consistency of defocus blur,” in Proc.
Intelligent Information Hiding and Multimedia Signal
Processing, pp. 192-195, 2008.
P. Kakar, N. Sudha, and W. Ser, “Exposing Digital Image
Forgeries by Detecting Discrepancies in Motion ,” IEEE
Trans. on Multimedia, vol. 13, no. 3, pp. 443- 452, 2011.
B. Su, S. Lu, and C. L. Tan, “Blurred Image Region
Detection and Classification,” in ACM Multimedia, pp. 13971400, 2011.
I. Aizenberg, D. V. Paliy, J. M. Zurada, and J. T. Astola,
“Blur Identification by Multilayer Neural Network Based on
Multivalued Neurons,” IEEE Trans. on Neural Network, vol.
19, no. 5, pp. 883-898, 2008.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 4
Download