digital image forensic| copy move forgery

25
Digital Image Forensics : Copy move forgery Digital Image Forensics Copy Move Forgery Mr Patrick NIYISHAKA Reg: 14mcpc21 Supervised by: Prof. Chakravarthy Bhagvati School Of Computer and InformationScience Hyderabad Central University December 9, 2016 Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 1/25

Upload: niyishaka-patrick

Post on 08-Jan-2017

104 views

Category:

Education


7 download

TRANSCRIPT

Page 1: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Digital Image ForensicsCopy Move Forgery

Mr Patrick NIYISHAKAReg: 14mcpc21

Supervised by: Prof. Chakravarthy Bhagvati

School Of Computer and InformationScienceHyderabad Central University

December 9, 2016

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 1/25

Page 2: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Overview

1 Previous Work.

2 Problem Statements : Challenges to tackle.

3 Proposed Solutions.

4 Conclusion and Future Scope.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 2/25

Page 3: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Previous Work

1 Introduction to Digital Image Forensics.

2 Image Forgery Types and Their Detection: A Review.

3 Copy Move Attack forgery

4 Comparative study on forgery detection techniques

5 Literature Survey.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 3/25

Page 4: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Review I. Brief History of Image Tampering

Photography lost itsinnocence many yearsago. Only a few decadesafter Niepce created thefirst photograph in 1814,photographs were alreadybeing manipulated.

Circa 1865

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 4/25

Page 5: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Review II. Brief History of Image tampering

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 5/25

Page 6: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Review III. Copy Move Attack — Definition

In the Copy-Move imagemanipulation technique apart of the sameimage is copied andpasted into anotherpart of that imageitself..

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 6/25

Page 7: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Review IV. Robust Match Detection Technique — Block Diagram

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 7/25

Page 8: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Problem statements I. Challenges To Tackle

1 Computational complexity(Time and space) very high.

2 This kind of attack is not detectable using forensicmethods that look for incompatibilities in statisticalmeasures since The copied parts are from the sameimage,components (e.g., noise, color,..) will becompatible with the rest of the image.

3 Spot which is the original patch,between two copies.

4 Poor performance in detecting small copied regions,(up tonow, attacks on very smooth regions, e.g., depicting thesky, are usually considered false positives).

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 8/25

Page 9: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Problem statements II. Challenges To Tackle.

1 The process of creating fake image has beentremendously simple with the introduction of powerfulcomputer graphics editing software such as AdobePhotoshop, GIMP, and Corel Paint Shop, some of whichare available for free.

2 It is not easy to objectively assess the performance ofthese techniques because, being human assisted, theycannot be tested on massive amounts of data.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 9/25

Page 10: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Proposed Solution I. Reducing Space Complexity Using CDF.

Figure: Existing Method.Two identical rows in the matrixA correspond to Two identicalBxB blocks.(M—B+1)(N—B+1)rows andB2 Columns.

Figure: Proposed Method.Compute cdf for each BxB blockand store their sum result in anarray.We obtain 1D array,each valuefor each block BXB

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 10/25

Page 11: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

CDF : Cumulative Density function — Definition.

1 The distribution functionD(x), also called thecumulative distributionfunction (CDF) orcumulative frequencyfunction, describes theprobability that a variateX takes on a value lessthan or equal to anumber x. Thedistribution function issometimes also denotedF(x)

FX(x)=P(X ≤ x), for all x R.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 11/25

Page 12: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Benefit I. CDF

Cdf always has positive slopeOne of the main advantages of the CDF is the fact thatmain and important key values and features likeminimum, maximum, median, quantiles, percentiles, etc.can be directly read from the diagram.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 12/25

Page 13: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Benefit II. CDF

The CDF is much more suitable for comparisons ofseveral data sets . An arbitrary number of CDFs can beplotted into the same axes without any problems forcomparisons. Hereby it is irrelevant how much data eachset actually contains.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 13/25

Page 14: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Extract windows Which Have Matching CDF Values

Index = Window Number

Duplicate Indexes [ 7, 104]Values [194.078, 194.078]

Duplicate Indexes :[ 0, 10,20, 21]Values : [200.7, 200.7, 200.7, 200.7]

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 14/25

Page 15: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Proposed Solutions II. Robust Detection Using Regression Analysis/Cdf

Regression estimates are used to describe data and toexplain the relationship between one dependent variableand one or more independent variables.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 15/25

Page 16: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Proposed Solutions II. Linear Regression

Linear regression is the most basicand commonly used predictiveanalysis.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 16/25

Page 17: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Proposed Solutions II. Block Diagram

Robust Detection Usingproposedmethods—Apply aRegression Analysis onblocks with matching cdfvalues.Finally getmatching slopes andintercepts.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 17/25

Page 18: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 18/25

Page 19: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Result : Sample output

Figure: Input Image. Figure: Tampered Image.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 19/25

Page 20: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Result : Sample output

Figure: Detection withno-overlapping windows.Windows Size 8x8

Figure: Detection with step 4overlapping windows.WindowsSize 8x8

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 20/25

Page 21: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Conclusion

1 Proposed Solutions I.1 With the Cdf proposed method the computing

complexity(space) have been reduced from (M—B+1)(N—B+1)rows and B2 columns matrix to 1D array.

2 Outperforms contemporary algorithms in storage byReducing memory requirements.

2 Proposed Solutions II.1 The detection using linear regression is not robust:

[ Not Working when Image is compressed eg: Jpg][ Not detecting matching for some images]

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 21/25

Page 22: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Future Scope: Extract Matching blocks using cdf features

For blocks with matching Cdfs we extract features :Minimum,Median,Quantile,and Maximum and we useany similarity measure to match.

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 22/25

Page 23: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

Questions or Suggestions

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 23/25

Page 24: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

References

1 2014-08-11 15:28 by Andreas Kuhn—Why we love the CDFand do not like histograms that much - ANDATA

2 H. Huang, W. Guo, Y. Zhang, Detection of copymove forgeryin digital images using sift algorithm, in: PACIIA 08:Proceedings of the 2008 IEEE Pacific-Asia Workshop onComputational Intelligence and Industrial Application, IEEEComputer Society, Washington, DC, USA, 2008, pp. 272276.

3 T.-T. Ng, S.-F. Chang, C.-Y. Lin, Q. Sun, Passive-blindimage forensics, in: W. Zeng, H. Yu, C.Y. Lin (Eds.),Multimedia Security Technologies for Digital Rights, Elsevier,Hawthorne, NY, USA, 2006.

4 W. Luo, Z. Qu, J. Huang, G. Qiu, A novel method fordetecting cropped and recompressed image block, in: IEEEInternational Conference on Acoustics, Speech and SignalProcessing, vol. 2, Honolulu, HI, USA, April 2007, pp.217220.Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 24/25

Page 25: Digital Image Forensic| Copy Move Forgery

Digital Image Forensics : Copy move forgery

Previous WorkProblem StatementsProposed SolutionsConclusion and Future Scope

End

Thank you!

Patrick NIYISHAKA, PhD Scholar@HCU DRC on December 1,2016 25/25