Abstract

Median filtering is being used extensively for image enhancement and anti-forensics. It is also being used to disguise the traces of image processing operations such as JPEG compression and image resampling when utilized in image de-noising and smoothing tool. In this paper, a robust image forensic technique namely HSB-SPAM is proposed to assist in median filtering detection. The proposed technique considers the higher significant bit-plane (HSB) of the image to highlight the statistical changes efficiently. Further, multiple difference arrays along with the first order pixel difference is used to separate the pixel difference, and Laplacian pixel difference is applied to extract a robust feature set. To compact the size of feature vectors, the operation of thresholding on the difference arrays is also utilized. As a result, the proposed detector is able to detect median, mean and Gaussian filtering operations with higher accuracy than the existing detectors. In the experimental results, the performance of the proposed detector is validated on the small size and post JPEG compressed images, where it is shown that the proposed method outperforms the state of art detectors in the most of the cases.

Highlights

  • IntroductionToday, the communication communicationisisbeing beingdone done digital form, which opens aToday,most most of of the in in digital form, which opens a PanPandora box of security attacks such as editing, copying, deleting and so on.Sometimes, dora box of security attacks such as editing, copying, deleting and so on

  • The UCIDv2.0 [36] database (UCID) has been selected to evaluate the performance of the proposed method since the UCIDv2.0 [36] database (UCID) database has been one of the prime databases being used in literature

  • The images of size 256 × 256, 128 × 128, 64 × 64, and 32 × 32 pixels are considered for experimental purposes by cropping center part of original images of UCID database images as shown in Figure 7b, which can eliminate the padding artifacts

Read more

Summary

Introduction

IntroductionToday, the communication communicationisisbeing beingdone done digital form, which opens aToday,most most of of the in in digital form, which opens a PanPandora box of security attacks such as editing, copying, deleting and so on.Sometimes, dora box of security attacks such as editing, copying, deleting and so on. The communication communicationisisbeing beingdone done digital form, which opens a. Today,most most of of the in in digital form, which opens a PanPandora box of security attacks such as editing, copying, deleting and so on. Dora box of security attacks such as editing, copying, deleting and so on. Gonzalez tearing the copy of the US copy constitution. Publisher’s Note: MDPI stays neuPublisher’s Note: MDPI stays neutral tral with regard to jurisdictional with regard to jurisdictional claims in claims in published maps and institupublished maps and institutional affiltional affiliations. iations

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call