Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation

Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation

Sun Yuting (Tianjin Polytechnic University, Tianjin, China), Guo Jing (Tianjin Polytechnic University, Tianjin, China), Du Ling (Tianjin Polytechnic University, Tianjin, China) and Ke Yongzhen (Tianjin Polytechnic University, Tianjin, China)
Copyright: © 2018 |Pages: 14
DOI: 10.4018/IJDCF.2018070101


This article describes how to detect color manipulation which is a commonly used method in the field of digital image forgery. The difficulty that hue forgery does not change the image edges, shapes and gradations brings certain challenge to authenticity detection. Current methods utilize the PRNU from multiple un-tampered images, requiring the camera type to be known. However, the increasing varieties of digital devices greatly complicates the preparation of prior knowledge. This article proposes a blind detection method for partial color manipulation based on self-PRNU of suspicious image, eliminating the necessity of acquiring camera information. The authors estimate the PRNU of suspicious image by removing the regions due to its texture complexity. The tamper region is detected by calculating the correlation between estimated PRNU and residual noise. As to partial manipulation detection, an introduced threshold of connected components is used to reduce the false positive. The experimental results show that the method can effectively detect and locate the partial color manipulation.
Article Preview


With the rapid development of the Internet and the widespread popularity of digital images devices, digital images have become our main source of information. At the same time, since the advent of a large number of low-cost, easy to operate image editing software, people can easily modify the digital images, which makes the images are suspected the truth of the fact that as the event record. So, the detection of the images authenticity becomes more and more important. Modern digital images can be tampered by a lot of ways, such as image synthesis, inpainting, enhancement, the computer generated and paintings, etc. To cope with that, the image tampering detection algorithm for various tamper methods has also made some achievements, the main methods include the detection of image copy-and-move based on principal component analysis (Fridrich, 2003), a double JPEG compression testing (Farid, 2009), the fuzzy inpainting operation (Hsiao, 2005), tampering detection based on pattern noise and photo-response non-uniformity noise (PRNU) (Lukas, 2006; Mo Chen, 2008; Chierchia, 2010; Chierchia, 2014), tamper detection based on color filter array (C. H. Choi, 2011), etc.

In a variety of tampering strategies, one of which is color modification. Hue is the main property of color, so the tampering of the color will mainly modify the hue value. In HSV color space, H represents hue. The value ranges from 0 to 360. S represents the saturation value. The value ranges from 0 to 1, where V represents the brightness, and the value ranges from 0 to 1. The modification of the hue is the rotation of hue value in the HSV color space. This tampering strategy does not modify the image texture, edges, lighting functions, and so on. It is relatively difficult to detect the color change.

Chang-Hee Choi (2013) in 2013 first proposed a camera color filter array (CFA) based detection method. The algorithm estimates the hue modification using the neighborhood correlation (C. H. Choi, 2011) induced by the color filter array (CFA). They proposed a simple measure to detect the CFA mode changes, by calculating the number of adjacent pixel which meets the interpolation conditions and the number of pixels obtained by the original camera. Based on this, the algorithm requires the CFA Bayer pattern of the suspicious image to be known before detection. At the same time, some basic processing of image, such as image scaling and JPEG compression, will destroy the demosaicing trace of the original image, which will destroy the CFA Bayer pattern. Therefore, this algorithm doesn’t have a good accuracy for detecting the image after resizing and JPEG compression processing.

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 11: 4 Issues (2019): 2 Released, 2 Forthcoming
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing