Exposing image forgery by detecting traces of feather operation

Jiang Bin Zheng, Ting Ge Zhu, Zhe Li, Wei Wei Xing, Jin Chang Ren

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Powerful digital image editing tools make it very easy to produce a perfect image forgery. The feather operation is necessary when tampering an image by copy-paste operation because it can help the boundary of pasted object to blend smoothly and unobtrusively with its surroundings. We propose a blind technique capable of detecting traces of feather operation to expose image forgeries. We model the feather operation, and the pixels of feather region will present similarity in their gradient phase angle and feather radius. An effectual scheme is designed to estimate each feather region pixel’s gradient phase angle and feather radius, and the pixel’s similarity to its neighbor pixels is defined and used to distinguish the feathered pixels from unfeathered pixels. The degree of image credibility is defined, and it is more acceptable to evaluate the reality of one image than just using a decision of YES or NO. Results of experiments on several forgeries demonstrate the effectiveness of the technique.

Original languageEnglish
Title of host publicationProceedings
Subtitle of host publicationDMS 2014 - 20th International Conference on Distributed Multimedia Systems
PublisherKnowledge Systems Institute Graduate School
Pages143-150
Number of pages8
ISBN (Electronic)1891706365
StatePublished - 2014
Event20th International Conference on Distributed Multimedia Systems, DMS 2014 - Pittsburgh, United States
Duration: 27 Aug 201429 Aug 2014

Publication series

NameProceedings: DMS 2014 - 20th International Conference on Distributed Multimedia Systems

Conference

Conference20th International Conference on Distributed Multimedia Systems, DMS 2014
Country/TerritoryUnited States
CityPittsburgh
Period27/08/1429/08/14

Keywords

  • Feather operation
  • Image forgery
  • Tampered image
  • Tampering detection

Fingerprint

Dive into the research topics of 'Exposing image forgery by detecting traces of feather operation'. Together they form a unique fingerprint.

Cite this