{"title":"复制-移动伪造检测中的JPEG压缩模型","authors":"Adam Novozámský, M. Šorel","doi":"10.1109/IPTA.2017.8310139","DOIUrl":null,"url":null,"abstract":"The integrity of visual data is important for the credibility of news media and especially when used as an evidence in court or during criminal investigation. The common way to manipulate image content is copying an object and pasting in another location of the same image. In this paper, we describe a new idea for the detection of this type of forgery in JPEG images, where the compression significantly degrades detection by popular algorithms. We derive a JPEG-based constraint that any pair of patches must satisfy to be considered a valid candidate for tampered area. We propose also efficient algorithm to verify the constraint that can be integrated into most existing methods. Experiments show significant improvement of detection, especially for difficult cases, such as small objects, objects covered by textureless areas and repeated patterns.","PeriodicalId":316356,"journal":{"name":"2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"JPEG compression model in copy-move forgery detection\",\"authors\":\"Adam Novozámský, M. Šorel\",\"doi\":\"10.1109/IPTA.2017.8310139\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The integrity of visual data is important for the credibility of news media and especially when used as an evidence in court or during criminal investigation. The common way to manipulate image content is copying an object and pasting in another location of the same image. In this paper, we describe a new idea for the detection of this type of forgery in JPEG images, where the compression significantly degrades detection by popular algorithms. We derive a JPEG-based constraint that any pair of patches must satisfy to be considered a valid candidate for tampered area. We propose also efficient algorithm to verify the constraint that can be integrated into most existing methods. Experiments show significant improvement of detection, especially for difficult cases, such as small objects, objects covered by textureless areas and repeated patterns.\",\"PeriodicalId\":316356,\"journal\":{\"name\":\"2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IPTA.2017.8310139\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IPTA.2017.8310139","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
JPEG compression model in copy-move forgery detection
The integrity of visual data is important for the credibility of news media and especially when used as an evidence in court or during criminal investigation. The common way to manipulate image content is copying an object and pasting in another location of the same image. In this paper, we describe a new idea for the detection of this type of forgery in JPEG images, where the compression significantly degrades detection by popular algorithms. We derive a JPEG-based constraint that any pair of patches must satisfy to be considered a valid candidate for tampered area. We propose also efficient algorithm to verify the constraint that can be integrated into most existing methods. Experiments show significant improvement of detection, especially for difficult cases, such as small objects, objects covered by textureless areas and repeated patterns.