A Feature-Based Forensic Procedure for Splicing Forgeries Detection

被引:6
作者
Amerini, Irene [1 ]
Becarelli, Rudy [1 ]
Caldelli, Roberto [1 ,2 ]
Casini, Matteo [1 ]
机构
[1] Univ Florence, MICC, I-50134 Florence, Italy
[2] CNIT, I-43124 Parma, Italy
关键词
Digital forensics - Search engines - Feature extraction;
D O I
10.1155/2015/653164
中图分类号
T [工业技术];
学科分类号
120111 [工业工程];
摘要
Nowadays, determining if an image appeared somewhere on the web or in a magazine or is authentic or not has become crucial. Image forensics methods based on features have demonstrated so far to be very effective in detecting forgeries in which a portion of an image is cloned somewhere else onto the same image. Anyway such techniques cannot be adopted to deal with splicing attack, that is, when the image portion comes from another picture that then, usually, is not available anymore for an operation of feature match. In this paper, a procedure in which these techniques could also be employed will be shown to get rid of splicing attack by resorting to the use of some repositories of images available on the Internet like Google Images or TinEye Reverse Image Search. Experimental results are presented on some real case images retrieved on the Internet to demonstrate the capacity of the proposed procedure.
引用
收藏
页数:6
相关论文
共 16 条
[1]
Amerini I., 2014, P SPIE, V9028
[2]
Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Del Tongo, Luca ;
Serra, Giuseppe .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (06) :659-669
[3]
Detection of manipulations on printed images to address crime scene analysis: A case study [J].
Amerini, Irene ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Di Fuccia, Andrea ;
Rizzo, Anna Paola ;
Saravo, Luigi .
FORENSIC SCIENCE INTERNATIONAL, 2015, 251 :E9-E14
[4]
Amerini I, 2014, IEEE INT WORKS INFOR, P143, DOI 10.1109/WIFS.2014.7084318
[5]
A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[6]
Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts [J].
Bianchi, Tiziano ;
Piva, Alessandro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :1003-1017
[7]
An Evaluation of Popular Copy-Move Forgery Detection Approaches [J].
Christlein, Vincent ;
Riess, Christian ;
Jordan, Johannes ;
Riess, Corinna ;
Angelopoulou, Elli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1841-1854
[8]
Hartley R. I., 2004, Multiple View Geometry in Computer Vision, DOI 10.1016/S0143-8166(01)00145-2
[9]
An efficient algorithm for Co-segmentation [J].
Hochbaum, Dorit S. ;
Singh, Vikas .
2009 IEEE 12TH INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2009, :269-276
[10]
Exposing Photo Manipulation with Inconsistent Shadows [J].
Kee, Eric ;
O'Brien, James ;
Farid, Hany .
ACM TRANSACTIONS ON GRAPHICS, 2013, 32 (03)