Cargando…
An image forensic technique based on JPEG ghosts
The unprecedented growth in the easy availability of photo-editing tools has endangered the power of digital images. An image was supposed to be worth more than a thousand words, but now this can be said only if it can be authenticated or the integrity of the image can be proved to be intact. In thi...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9522542/ https://www.ncbi.nlm.nih.gov/pubmed/36196270 http://dx.doi.org/10.1007/s11042-022-13699-x |
_version_ | 1784800091145502720 |
---|---|
author | Singh, Divakar Singh, Priyanka Jena, Riyanka Chakraborty, Rajat Subhra |
author_facet | Singh, Divakar Singh, Priyanka Jena, Riyanka Chakraborty, Rajat Subhra |
author_sort | Singh, Divakar |
collection | PubMed |
description | The unprecedented growth in the easy availability of photo-editing tools has endangered the power of digital images. An image was supposed to be worth more than a thousand words, but now this can be said only if it can be authenticated or the integrity of the image can be proved to be intact. In this paper, we propose a digital image forensic technique for JPEG images. It can detect any forgery in the image if the forged portion called a ghost image is having a compression quality different from that of the cover image. It is based on resaving the JPEG image at different JPEG qualities, and the detection of the forged portion is maximum when it is saved at the same JPEG quality as the cover image. Also, we can precisely predict the JPEG quality of the cover image by analyzing the similarity using Structural Similarity Index Measure (SSIM) or the energy of the images. The first maxima in SSIM or the first minima in energy correspond to the cover image JPEG quality. We created a dataset for varying JPEG compression qualities of the ghost and the cover images and validated the scalability of the experimental results. We also, experimented with varied attack scenarios, e.g. high-quality ghost image embedded in low quality of cover image, low-quality ghost image embedded in high-quality of cover image, and ghost image and cover image both at the same quality. The proposed method is able to localize the tampered portions accurately even for forgeries as small as 10 × 10 sized pixel blocks. Our technique is also robust against other attack scenarios like copy-move forgery, inserting text into image, rescaling (zoom-out/zoom-in) ghost image and then pasting on cover image. |
format | Online Article Text |
id | pubmed-9522542 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-95225422022-09-30 An image forensic technique based on JPEG ghosts Singh, Divakar Singh, Priyanka Jena, Riyanka Chakraborty, Rajat Subhra Multimed Tools Appl Article The unprecedented growth in the easy availability of photo-editing tools has endangered the power of digital images. An image was supposed to be worth more than a thousand words, but now this can be said only if it can be authenticated or the integrity of the image can be proved to be intact. In this paper, we propose a digital image forensic technique for JPEG images. It can detect any forgery in the image if the forged portion called a ghost image is having a compression quality different from that of the cover image. It is based on resaving the JPEG image at different JPEG qualities, and the detection of the forged portion is maximum when it is saved at the same JPEG quality as the cover image. Also, we can precisely predict the JPEG quality of the cover image by analyzing the similarity using Structural Similarity Index Measure (SSIM) or the energy of the images. The first maxima in SSIM or the first minima in energy correspond to the cover image JPEG quality. We created a dataset for varying JPEG compression qualities of the ghost and the cover images and validated the scalability of the experimental results. We also, experimented with varied attack scenarios, e.g. high-quality ghost image embedded in low quality of cover image, low-quality ghost image embedded in high-quality of cover image, and ghost image and cover image both at the same quality. The proposed method is able to localize the tampered portions accurately even for forgeries as small as 10 × 10 sized pixel blocks. Our technique is also robust against other attack scenarios like copy-move forgery, inserting text into image, rescaling (zoom-out/zoom-in) ghost image and then pasting on cover image. Springer US 2022-09-30 2023 /pmc/articles/PMC9522542/ /pubmed/36196270 http://dx.doi.org/10.1007/s11042-022-13699-x Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Singh, Divakar Singh, Priyanka Jena, Riyanka Chakraborty, Rajat Subhra An image forensic technique based on JPEG ghosts |
title | An image forensic technique based on JPEG ghosts |
title_full | An image forensic technique based on JPEG ghosts |
title_fullStr | An image forensic technique based on JPEG ghosts |
title_full_unstemmed | An image forensic technique based on JPEG ghosts |
title_short | An image forensic technique based on JPEG ghosts |
title_sort | image forensic technique based on jpeg ghosts |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9522542/ https://www.ncbi.nlm.nih.gov/pubmed/36196270 http://dx.doi.org/10.1007/s11042-022-13699-x |
work_keys_str_mv | AT singhdivakar animageforensictechniquebasedonjpegghosts AT singhpriyanka animageforensictechniquebasedonjpegghosts AT jenariyanka animageforensictechniquebasedonjpegghosts AT chakrabortyrajatsubhra animageforensictechniquebasedonjpegghosts AT singhdivakar imageforensictechniquebasedonjpegghosts AT singhpriyanka imageforensictechniquebasedonjpegghosts AT jenariyanka imageforensictechniquebasedonjpegghosts AT chakrabortyrajatsubhra imageforensictechniquebasedonjpegghosts |