A Image Forensics Analysis by Using DST, Fuzzy and Bayesian Approaches

作者: G.Selvavinayagam , D.Gokila Bharathi

DOI:

关键词: Data miningImage (mathematics)Focus (optics)Hash functionBayesian probabilityComputer scienceFuzzy logicProbabilistic logic

摘要: A Forensic Image is often accompanied by a calculated Hash signature to validate that the image an exact duplicate of original. It mainly focus on detection artifacts introduced single processing tool. Hence making it necessary for developing several artifacts. In this paper we introduce different theoretical frameworks, based Dempster-Shafer’s Theory Evidence, Fuzzy and Bayesian decision fusion respectively, perform heterogeneous, incomplete or conflicting outputs forensic algorithms. These models are easily expandable arbitrary number tools, do not require tools output be probabilistic take into account available information about reliability. To proposed approaches, carried out some experiments addressing simple yet realistic scenario in which three exploit double JPEG compression detect cut paste tampering within specified region image. The results obtained encouraging, especially when compared with performance method binary OR operator.

参考文章(10)
Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon, Improving steganalysis by fusion techniques: a case study with image steganography conference on security steganography and watermarking of multimedia contents. ,vol. 6072, pp. 123- 137 ,(2006) , 10.1117/12.645510
Zhouchen Lin, Junfeng He, Xiaoou Tang, Chi-Keung Tang, Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis Pattern Recognition. ,vol. 42, pp. 2492- 2501 ,(2009) , 10.1016/J.PATCOG.2009.03.019
Tiziano Bianchi, Alessandro Piva, Detection of non-aligned double JPEG compression with estimation of primary compression parameters 2011 18th IEEE International Conference on Image Processing. pp. 1929- 1932 ,(2011) , 10.1109/ICIP.2011.6115848
Sevinç Bayram, İsmail Avcıbaş, Bülent Sankur, Nasir Memon, Image manipulation detection Journal of Electronic Imaging. ,vol. 15, pp. 041102- ,(2006) , 10.1117/1.2401138
Weiqi Luo, Zhenhua Qu, Jiwu Huang, Guoping Qiu, A Novel Method for Detecting Cropped and Recompressed Image Block international conference on acoustics, speech, and signal processing. ,vol. 2, pp. 217- 220 ,(2007) , 10.1109/ICASSP.2007.366211
H. Farid, Exposing Digital Forgeries From JPEG Ghosts IEEE Transactions on Information Forensics and Security. ,vol. 4, pp. 154- 160 ,(2009) , 10.1109/TIFS.2008.2012215
Yu-Feng Hsu, Shih-Fu Chang, Statistical fusion of multiple cues for image tampering detection asilomar conference on signals, systems and computers. pp. 1386- 1390 ,(2008) , 10.1109/ACSSC.2008.5074646
M. Fontani, T. Bianchi, A. De Rosa, A. Piva, M. Barni, A Dempster-Shafer framework for decision fusion in image forensics international workshop on information forensics and security. pp. 1- 6 ,(2011) , 10.1109/WIFS.2011.6123156