簡易檢索 / 詳目顯示

研究生: LE THANH NAM
LE - THANH NAM
論文名稱: Tools for Detecting Digital Image Forgeries and Extended Applications
Tools for Detecting Digital Image Forgeries and Extended Applications
指導教授: 郭景明
Jing-Ming Guo
口試委員: 鍾聖倫
Sheng-Luen Chung
姚嘉瑜
Chia-Yu Yao
王鵬華
Peng-Hua Wang
學位類別: 碩士
Master
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2011
畢業學年度: 99
語文別: 英文
論文頁數: 94
中文關鍵詞: image forgeries detectionimage forensicsJPEG compressionrobust invariant featuresSIFTSURFduplicated detection
外文關鍵詞: image forgeries detection, image forensics, JPEG compression, robust invariant features, SIFT, SURF, duplicated detection
相關次數: 點閱:213下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

  • It is indisputable that digital image has brought a revolutionary impact to our daily lives. With the convenience, low-cost, reproducibility, and ease of storage, the amount of digital image has surpassed and overwhelmed that of analog photos from all history of photography. However, while in the age of analog photography, images may imply truth, nowadays tampered images are being produced with an alarming frequency. With the aid of powerful technology and availability of image manipulating software, creating fake image has become easier than ever and digital image forgery is not an uncommon thing today. That leads to a growing concern about the authenticity of digital image.

    This concern has motivated a new research trend of detecting traces of manipulation that has been done to a digital image. Most of the works are based on the assumption that, a tampered image, even created by a skilled forger and leaves no visual sign of being tampered, still leaves some traces in statistical properties. By properly modeling and extracting these statistical parameters, the tampered images can be distinguished from the authentic ones.

    A survey for the obtained results in the field is often desired as a fundamental background for further research in a thesis. Such a study for tampering techniques and existing state-of-the-art forensics techniques has been carried out and summarized in Chapters 1 and 2. From the knowledge gathered, Chapters 3 and 4 specifically investigate two techniques of tampering detection. One technique is to deal with resaved JPEG images, often for detecting splicing tamper; the other one is to deal with another very common type of forgery: duplicate a portion and paste it to another area of the image. In Chapter 3, we also describe an extended application derived from forensics, which is secret communication and semi-fragile watermark by controlling quantization tables in JPEG compression scheme. In Chapter 4, we propose a scheme for detecting copy-moved tampering by finding matched robust features extracted from the well-known algorithms SIFT (Scale Invariant Features Transform) and SURF (Speeded Up Robust Features). In comparison with other schemes, this scheme excels in detecting performance since it is capable of detecting duplicated regions even with the presence of noise, rotation, scaling and blurring, without having to store and lexicographically sort a huge matrix of features extract from overlapping blocks as in traditional approaches.

    I introduction 1 1 introduction 2 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Types of Image Manipulation . . . . . . . . . . . . . . . . . . . . 9 1.3 Digital Watermarking Authentication . . . . . . . . . . . . . . . 13 1.3.1 Exact Authentication . . . . . . . . . . . . . . . . . . . . . 14 1.3.2 Localized Authentication . . . . . . . . . . . . . . . . . . 15 1.3.3 Drawbacks of Watermark Authentication . . . . . . . . . 15 1.3.4 Advantage of Blind Image Forensics . . . . . . . . . . . . 16 1.4 Thesis Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . 17 II digital image forgery detection tools 18 2 literature survey 19 2.1 Source Identification Techniques . . . . . . . . . . . . . . . . . . 19 2.1.1 Inside a Digital Camera . . . . . . . . . . . . . . . . . . . 20 2.1.2 Lens and Chromatic Aberration . . . . . . . . . . . . . . 21 2.1.3 Sensor Pattern Noise and Defection . . . . . . . . . . . . 22 2.1.4 CFA Interpolation . . . . . . . . . . . . . . . . . . . . . . . 23 2.2 Feature-Based Detection Techniques . . . . . . . . . . . . . . . . 24 2.2.1 Format-Based Techniques . . . . . . . . . . . . . . . . . . 24 2.2.2 Image Splicing Anomaly Detection . . . . . . . . . . . . . 26 2.2.3 Image Interpolation Detection . . . . . . . . . . . . . . . 27 2.2.4 Image Copy-Move (Cloning) Detection . . . . . . . . . . 28 2.2.5 Computer Graphics and Paintings Detection . . . . . . . 29 2.2.6 Physically-Based Techniques . . . . . . . . . . . . . . . . 30 2.2.7 Noise Level Analysis . . . . . . . . . . . . . . . . . . . . . 31 2.2.8 Blur and Sharpening . . . . . . . . . . . . . . . . . . . . . 32 2.3 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 3 jpeg-related forgeries detection 34 3.1 JPEG Compression Overview . . . . . . . . . . . . . . . . . . . . 34 3.2 Forensics by Investigating JPEG meta-data stream . . . . . . . . 36 3.3 Detect Previously Compressed JPEG via QT . . . . . . . . . . . 40 3.4 Splicing Detection by JPEG Double Compression . . . . . . . . 41 3.5 Extension to Secret Communication . . . . . . . . . . . . . . . . 45 3.5.1 Encryption stage . . . . . . . . . . . . . . . . . . . . . . . 45 3.5.2 Embedding Stage . . . . . . . . . . . . . . . . . . . . . . . 46 3.5.3 Experimental Results . . . . . . . . . . . . . . . . . . . . . 49 3.5.4 Section Summary . . . . . . . . . . . . . . . . . . . . . . . 54 4 copy-move forgeries detection by robust invariant features 56 4.1 SIFT Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 4.1.1 Build Image Scale Space . . . . . . . . . . . . . . . . . . . 58 4.1.2 Local Extrema Detection . . . . . . . . . . . . . . . . . . . 59 4.1.3 Remove Low Contrast Features and Edge Response . . . 60 4.1.4 Orientation Assignment . . . . . . . . . . . . . . . . . . . 61 4.1.5 Local Image Descriptor . . . . . . . . . . . . . . . . . . . 62 4.2 SURF Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 4.2.1 Integral Images . . . . . . . . . . . . . . . . . . . . . . . . 62 4.2.2 Fast Hessian Matrix . . . . . . . . . . . . . . . . . . . . . . 63 4.2.3 Interest Points Description . . . . . . . . . . . . . . . . . . 64 4.2.4 Orientation Assignment . . . . . . . . . . . . . . . . . . . 64 4.2.5 Component Descriptor . . . . . . . . . . . . . . . . . . . . 65 4.3 Proposed Copy-move detection scheme . . . . . . . . . . . . . . 67 4.4 Experimental Result . . . . . . . . . . . . . . . . . . . . . . . . . 68 4.4.1 Environment and Language . . . . . . . . . . . . . . . . . 68 4.4.2 Detection Result . . . . . . . . . . . . . . . . . . . . . . . . 69 4.5 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 5 conclusion remark 80 5.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 5.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 III appendix 83 A appendix 84 A.1 SURF Construction with OpenCV . . . . . . . . . . . . . . . . . 84 Bibliography 87

    [1] H. Bay, T. Tuytelaars, and L. V. Gool, “SURF: Speeded up robust features,” in In ECCV, 2006, pp. 404–417. (Cited on pages 57, 62, and 69.)
    [2] S. Bayram, H. Sencar, N. Memon, and I. Avcibas, “Source camera identification based on cfa interpolation,” in Proc. IEEE Int. Conf. Image Processing
    ICIP 2005, vol. 3, 2005. (Cited on page 23.)
    [3] S. Bayram, H. Sencar, and N. Memon, “An efficient and robust method for detecting copy-move forgery,” in Acoustics, Speech and Signal Processing,
    2009. ICASSP 2009. IEEE International Conference on, April 2009, pp. 1053–1056. (Cited on pages 29 and 56.)
    [4] G. Cao, Y. Zhao, and R. Ni, “Detection of image sharpening based on histogram aberration and ringing artifacts,” in Multimedia and Expo, 2009.
    ICME 2009. IEEE International Conference on, Jul. 2009, pp. 1026–1029. (Cited on page 33.)
    [5] W. Chen, Y. Shi, and G. Xuan, “Identifying computer graphics using HSV color model and statistical moments of characteristic functions,” in
    Multimedia and Expo, 2007 IEEE International Conference on, July 2007, pp. 1123–1126. (Cited on page 30.)
    [6] W. Chen, Y. Q. Shi, and W. Su, “Image splicing detection using 2-D phase congruency and statistical moments of characteristic function,” in
    Proceedings of SPIE: Security and Watermarking of Multimedia Content IX, vol. 6505, 2007, p. 65050R. (Cited on page 26.)
    [7] K. Choi, E. Y. Lam, and K. Y. Wong, “Source camera identification using footprints from lens aberration,” in Digital Photography II. SPIE, 2006, p.
    60690J. [Online]. Available: http://link.aip.org/link/?PSI/6069/60690J/1 (Cited on page 21.)
    [8] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd ed. San Francisco, CA, USA: Morgan Kaufmann
    Publishers Inc., 2007. (Cited on page 13.)
    [9] A. Dirik and N. Memon, “Image tamper detection based on demosaicing artifacts,” in Image Processing (ICIP), 2009 16th IEEE International Conference on, nov 2009, pp. 1497–1500. (Cited on page 24.)
    [10] A. Dirik, S. Bayram, H. Sencar, and N. Memon, “New features to identify computer generated images,” in Image Processing, 2007. ICIP 2007. IEEE
    International Conference on, vol. 4, Oct. 2007, pp. IV –433 –IV –436. (Cited on page 30.)
    [11] J. Dong, W. Wang, T. Tan, and Y. Shi, “Run-length and edge statistics based approach for image splicing detection,” in Digital Watermarking, ser. Lecture Notes in Computer Science, H.-J. Kim, S. Katzenbeisser, and
    A. Ho, Eds. Springer Berlin / Heidelberg, 2009, vol. 5450, pp. 76–87. (Cited on page 26.)
    [12] H. Farid, “Exposing digital forgeries from JPEG ghosts,” Information Forensics and Security, IEEE Transactions on, vol. 4, no. 1, pp. 154 –160, Mar.
    2009. (Cited on pages 25 and 43.)
    [13] H. Farid and S. Lyu, “Higher-order wavelet statistics and their application to digital forensics,” in IEEE Workshop on Statistical Analysis in Computer
    Vision (in conjunction with CVPR), Madison, Wisconsin, 2003. (Cited on page 30.)
    [14] H. Farid, “Hany Farid homepage,” http://www.cs.dartmouth.edu/farid/research/digitaltampering/index3.html. (Cited on pages 3, 4, 5, 6, and 9.)
    [15] H. Farid and M. J. Bravo, “Image forensic analyses that elude the human visual system,” in Media Forensics and Security II, vol. 7541. SPIE, 2010, p. 754106. (Cited on page 31.)
    [16] X. Feng and G. Doërr, “JPEG recompression detection,” in Media Forensics and Security II, N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. D. III, Eds., vol. 7541. SPIE, 2010, p. 75410J. (Cited on page 25.)
    [17] C. Fillion and G. Sharma, “Detecting content adaptive scaling of images for forensic applications,” in Media Forensics and Security II, vol. 7541. SPIE, 2010, p. 75410Z. (Cited on pages 27 and 28.)
    [18] J. Fridrich, “Image watermarking for tamper detection,” in Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on, vol. 2, 10 1998, pp. 404–408 vol.2. (Cited on page 13.)
    [19] J. Fridrich, M. Goljan, , and M. Du, “Invertible authentication,” in Proceedings of SPIE, Security and Watermarking of Multimedia Contents, 2001.(Cited on page 14.)
    [20] J. Fridrich, D. Soukal, and Lukas, “Detection of copy-move forgery in digital images,” Proc. of DFRWS 2003, vol. 1, pp. 90–105, 2003. (Cited on pages 28, 29, and 56.)
    [21] D. Fu, Y. Shi, and W. Su, “Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition,” in Digital Watermarking, ser. Lecture Notes in Computer
    Science, Y. Shi and B. Jeon, Eds. Springer Berlin / Heidelberg, 2006, vol. 4283, pp. 177–187. (Cited on page 26.)
    [22] A. C. Gallagher, “Detection of linear and cubic interpolation in JPEG compressed images,” in Proceedings of the 2nd Canadian conference on Computer
    and Robot Vision, ser. CRV ’05. Washington, DC, USA: IEEE Computer Society, 2005, pp. 65–72. (Cited on page 27.)
    [23] Z. J. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki, and N. Saitoh, “Methods for identi?cation of images acquired with digital cameras,” in
    Enabling Technologies for Law Enforcement and Security, S. K. Bramble, E. M. Carapezza, and L. I. Rudin, Eds., vol. 4232. SPIE, 2001, pp. 505–512. (Cited on page 22.)
    [24] S. Gholap and P. Bora, “Illuminant colour based image forensics,” in TENCON 2008 - 2008 IEEE Region 10 Conference, Nov. 2008, pp. 1–5. (Cited on page 31.)
    [25] T. Gloe, K. Borowka, and A. Winkler, “Ef?cient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics,” in
    Media Forensics and Security II, vol. 7541. SPIE, 2010, p. 754107. (Cited on page 22.)
    [26] H. Gou, A. Swaminathan, and M. Wu, “Noise features for image tampering detection and steganalysis,” in Image Processing, 2007. ICIP 2007. IEEE International Conference on, vol. 6, Oct. 2007, pp. VI –97 –VI –100. (Cited
    on page 32.)
    [27] J.-M. Guo and T.-N. Le, “Secret communication using JPEG double compression,” Signal Processing Letters, IEEE, vol. 17, no. 10, pp. 879–882, Oct. 2010. (Cited on page 54.)
    [28] C. Hass, “JPEG tutorial website,” http://www.impulseadventure.com/photo/jpeg-quantization.html, 2010. (Cited on page 42.)
    [29] D.-Y. Hsiao and S.-C. Pei, “Detecting digital tampering by blur estimation,” in Proc. of the 1st Int’l Workshop on Systematic Approaches to Digital Forensic
    Eng. Washington, DC, USA: IEEE Computer Society, 2005, p. 264. (Cited on page 32.)
    [30] Y.-F. Hsu and S.-F. Chang, “Image splicing detection using camera re-
    sponse function consistency and automatic segmentation,” in Multimedia and Expo, 2007 IEEE International Conference on, Jul. 2007, pp. 28 –31. (Cited
    on page 26.)
    [31] Y. Huang and Y. Long, “Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model,” in Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE
    Conference on, June 2008, pp. 1 –8. (Cited on page 24.)
    [32] W. Jing and Z. Hongbin, “Exposing digital forgeries by detecting traces of image splicing,” in Signal Processing, 2006 8th International Conference on,
    vol. 2, 2006, pp. 16–20. (Cited on page 26.) [33] M. K. Johnson and H. Farid, “Exposing digital forgeries through
    chromatic aberration,” in Proceedings of the 8th workshop on Multimedia and security. New York, NY, USA: ACM, 2006, pp. 48–55. [Online]. Available:
    http://doi.acm.org/10.1145/1161366.1161376 (Cited on page 22.)
    [34] M. Johnson and H. Farid, “Exposing digital forgeries in complex light-
    ing environments,” IEEE Transactions on Information Forensics and Security,
    vol. 3, no. 2, pp. 450–461, 2007. (Cited on page 30.)
    [35] N. Khanna, G.-C. Chiu, J. Allebach, and E. Delp, “Forensic techniques for classifying scanner, computer generated and digital camera images,”
    in Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, 2008, pp. 1653 –1656. (Cited on page 30.)
    [36] M. Kirchner, “Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue,” in Proceedings of the 10th ACM workshop
    on Multimedia and security. New York, NY, USA: ACM, 2008, pp. 11–20. (Cited on page 27.)
    [37] D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper
    proofing and authentication,” Proceedings of the IEEE, vol. 87, no. 7, pp.
    1167–1180, Jul. 1999. (Cited on page 15.)
    [38] A. Leykin and F. Cutzu, “Differences of edge properties in photographs
    and paintings,” in Image Processing, 2003. ICIP 2003. Proceedings. 2003
    International Conference on, vol. 3, Sep. 2003, pp. III – 541–4 vol.2. (Cited
    on page 30.)
    [39] G. Li, Q. Wu, D. Tu, and S. Sun, “A sorted neighborhood approach for
    detecting duplicated regions in image forgeries based on DWT and SVD,”
    in Multimedia and Expo, 2007 IEEE International Conference on, July 2007,
    pp. 1750–1753. (Cited on page 29.)
    [40] H. J. Lin, C. W. Wang, and Y. T. Kao, “Fast copy-move forgery detection,”
    WSEAS Trans. Sig. Proc., vol. 5, pp. 188–197, May 2009. (Cited on pages 28
    and 56.)
    [41] Z. Lin, R. Wang, X. Tang, and H.-Y. Shum, “Detecting doctored images
    using camera response normality and consistency,” in Computer Vision
    and Pattern Recognition, CVPR ’05. IEEE Comp. Soc. Conf. on, vol. 1, 2005,
    pp. 1087–1092 vol. 1. (Cited on page 26.)
    [42] D. G. Lowe, “Distinctive image features from scale-invariant keypoints,”
    Int. Journal of Computer Vision, vol. 60, pp. 91–110, November 2004. (Cited
    on pages 57, 58, 69, and 73.)
    [43] J. Lukas, J. Fridrich, and M. Goljan, “Digital camera identi?cation from
    sensor pattern noise,” Information Forensics and Security, IEEE Transactions
    on, vol. 1, no. 2, pp. 205 – 214, June 2006. (Cited on page 23.)
    [44] J. Lukas and J. Fridrich, “Estimation of primary quantization matrix in
    double compressed JPEG images,” in Proc. of DFRWS, 2003. (Cited on
    page 25.)
    [45] W. Luo, Z. Qu, J. Huang, and G. Qiu, “A novel method for detecting
    cropped and recompressed image block,” in Acoustics, Speech and Signal
    Processing, 2007. ICASSP 2007. IEEE International Conference on, vol. 2, Apr.
    2007, pp. II–217 –II–220. (Cited on page 25.)
    [46] S. Lyu and H. Farid, “Steganalysis using color wavelet statistics and one-
    class support vector machines,” in SPIE Symposium on Electronic Imaging,
    2004, pp. 35–45. (Cited on page 53.)
    [47] B. Mahdian and S. Saic, “Blind authentication using periodic properties
    of interpolation,” Information Forensics and Security, IEEE Transactions on,
    vol. 3, no. 3, pp. 529 –538, Sep. 2008. (Cited on page 27.)
    [48] ——, “Detection of resampling supplemented with noise inconsistencies
    analysis for image forensics,” in Computational Sciences and Its Applications,
    2008. ICCSA ’08. International Conference on, Jul. 2008, pp. 546 –556. (Cited
    on page 32.)
    [49] ——, “Detection of copy-move forgery using a method based on blur
    moment invariants,” Forensic Science International, vol. 171, no. 2-3, pp.
    180–189, 2007. (Cited on pages 28, 29, 56, and 76.)
    [50] K. Mikolajczyk and C. Schmid, “A performance evaluation of local de-
    scriptors,” IEEE Transactions on Pattern Analysis & Machine Intelligence,
    vol. 27, no. 10, pp. 1615–1630, 2005. (Cited on page 57.)
    [51] A. Myrna, M. Venkateshmurthy, and C. Patil, “Detection of region dupli-
    cation forgery in digital images using wavelets and log-polar mapping,”
    in Computational Intelligence and Multimedia Appl., Int. Conf. on, vol. 3, Dec.
    2007, pp. 371–377. (Cited on pages 29 and 56.)
    [52] T.-T. Ng, “Camera response function signature for digital forensics - part
    II: Signature extraction,” in Info. Forensics and Security. WIFS 2009. 1st
    IEEE Int Workshop on, Dec. 2009, pp. 161 –165. (Cited on page 26.)
    [53] T.-T. Ng and M.-P. Tsui, “Camera response function signature for digital
    forensics - part I: Theory and data selection,” in Info. Forensics and Security.
    WIFS 2009. 1st IEEE Int Workshop on, Dec. 2009, pp. 156 –160. (Cited on
    page 26.)
    [54] T.-T. Ng, S.-F. Chang, and Q. Sun, “Blind detection of photomontage
    using higher order statistics,” in Circuits and Systems, 2004. ISCAS ’04.
    Proceedings of the 2004 International Symposium on, vol. 5, May 2004, pp.
    V–688 – V–691 Vol.5. (Cited on page 26.)
    [55] T.-T. Ng, S.-F. Chang, J. Hsu, L. Xie, and M.-P. Tsui, “Physics-motivated
    features for distinguishing photographic images and computer graphics,”
    in Proceedings of the 13th annual ACM international conference on Multimedia,
    ser. MULTIMEDIA ’05. New York, NY, USA: ACM, 2005, pp. 239–248.
    (Cited on pages 26 and 29.)
    [56] T.-T. Ng, S.-F. Chang, and M.-P. Tsui, “Lessons learned from online
    classi?cation of photo-realistic computer graphics and photographs,” in
    Signal Processing Applications for Public Security and Forensics. SAFE ’07.
    IEEE Workshop on, 2007, pp. 1–6. (Cited on page 30.)
    [57] W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression
    Standard. New York: Springer, 1993. (Cited on page 34.)
    [58] A. P. Pentland, “Finding the illuminant direction,” Journal of Optical
    Society American, vol. 72, no. 4, pp. 448–455, Apr. 1982. [Online]. Available:
    http://www.opticsinfobase.org/abstract.cfm?URI=josa-72-4-448 (Cited
    on page 30.)
    [59] T. Pevny and J. Fridrich, “Detection of double-compression in JPEG im-
    ages for applications in steganography,” Information Forensics and Security,
    IEEE Transactions on, vol. 3, no. 2, pp. 247–258, June 2008. (Cited on
    page 25.)
    [60] A. Popescu and H. Farid, “Exposing digital forgeries in color ?lter ar-
    ray interpolated images,” Signal Processing, IEEE Transactions on, vol. 53,
    no. 10, pp. 3948 – 3959, Oct. 2005. (Cited on page 23.)
    [61] ——, “Statistical tools for digital forensics,” in 6th Int. Workshop on In-
    formation Hiding. Springer-Verlag, Berlin-Heidelberg, 2004, pp. 128–147.
    (Cited on pages 25 and 31.)
    bibliography 93
    [62] ——, “Exposing digital forgeries by detecting duplicated image regions,”
    Department of Computer Science, Dartmouth College, Tech. Rep. TR2004–
    515, 2004. (Cited on pages 28, 29, and 56.)
    [63] ——, “Exposing digital forgeries by detecting traces of resampling,” Signal
    Processing, IEEE Transactions on, vol. 53, no. 2, pp. 758–767, Feb. 2005.
    (Cited on page 27.)
    [64] N. Provos, “Outgess website,” http://www.outguess.org/. (Cited on
    page 53.)
    [65] G. Sankar, V. Zhao, and Y.-H. Yang, “Feature based classi?cation of
    computer graphics and real images,” in Proc. of the IEEE Int. Conf. on
    Acoustics, Speech and Signal Processing ICASSP ’09, Washington, DC, USA,
    2009, pp. 1513–1516. (Cited on page 30.)
    [66] Y. Sutcu, B. Coskun, H. Sencar, and N. Memon, “Tamper detection based
    on regularity of wavelet transform coef?cients,” in Image Processing, 2007.
    ICIP 2007. IEEE International Conference on, vol. 1, oct 2007, pp. I–397–I–
    400. (Cited on page 33.)
    [67] H.-K. Tso, D.-C. Lou, K.-P. Wang, and C.-L. Liu, “A lossless secret image
    sharing method,” in Intelligent Systems Design and Applications, 2008. ISDA
    ’08. Eighth International Conference on, vol. 3, Nov. 2008, pp. 616–619. (Cited
    on page 45.)
    [68] G. Voyatzis and I. Pitas, “Applications of toral automorphisms in image
    watermarking,” in Image Processing, 1996. Proceedings., Int. Conf. on, vol. 1,
    Sep. 1996, pp. 237–240 vol.2. (Cited on page 45.)
    [69] W. Wang, J. Dong, and T. Tan, “Effective image splicing detection based
    on image chroma,” in Image Processing (ICIP) 2009, 16th IEEE International
    Conference on, Nov. 2009, pp. 1257–1260. (Cited on page 26.)
    [70] P. W. Wong, “A public key watermark for image veri?cation and authen-
    tication,” in Image Processing, 1998. ICIP 98. Proceedings. 1998 International
    Conference on, vol. 1, Oct. 1998, pp. 455–459 vol.1. (Cited on page 14.)
    [71] S. Ye, Q. Sun, and E. C. Chang, “Detecting digital image forgeries by
    measuring inconsistencies of blocking artifact,” in Multimedia and Expo,
    2007 IEEE Int. Conf. on, Jul. 2007, pp. 12–15. (Cited on page 25.)
    [72] M. Yeung and F. Mintzer, “An invisible watermarking technique for
    image verification,” in Image Processing, 1997. Proceedings., International
    Conference on, vol. 2, Oct. 1997, pp. 680–683 vol.2. (Cited on page 15.)
    [73] C. Zhang and Z. Hongbin, “Detecting digital image forgeries through
    weighted local entropy,” in Signal Processing and Information Technology,
    IEEE Int Symposium on, Dec. 2007, pp. 62–67. (Cited on page 33.)
    [74] J. Zhang, H. Wang, and Y. Su, “Detection of double-compression in
    JPEG2000 images,” in Intelligent Info. Tech. App., 2008, IITA. 2nd Int. Sym-
    posium on, vol. 1, dec 2008, pp. 418–421. (Cited on page 25.)
    [75] W. Zhang, X. Cao, J. Zhang, J. Zhu, and P. Wang, “Detecting photographic
    composites using shadows,” in Multimedia and Expo, 2009 ICME. IEEE Int.
    Conf. on, Jul. 2009, pp. 1042 –1045. (Cited on page 31.)
    [76] Z. Zhang, G. Wang, Y. Bian, and Z. Yu, “A novel model for splicing
    detection,” in Bio-Inspired Computing: Theories and Applications (BIC-TA),
    2010 IEEE Fifth International Conference on, Sep. 2010, pp. 962 –965. (Cited
    on page 26.)
    [77] Q. Zheng and R. Chellappa, “Estimation of illuminant direction, albedo,
    and shape from shading,” Pattern Analysis and Machine Intelligence, IEEE
    Transactions on, vol. 13, no. 7, pp. 680–702, Jul. 1991. (Cited on page 30.)
    [78] L. Zhou, D. Wang, Y. Guo, and J. Zhang, “Blur detection of digital
    forgery using mathematical morphology,” in Agent and Multi-Agent Sys-
    tems: Technologies and Applications, ser. Lecture Notes in Computer Science.
    Springer Berlin / Heidelberg, 2007, vol. 4496, pp. 990–998. (Cited on
    page 32.)

    QR CODE