Surbhi Gupta, Neeraj Mohan, Parvinder Singh Sandhu


Advancement in information technology and image processing has resulted in image tampering and its forensics. This paper aims at detecting image manipulations by exploiting the various noise and texture characteristics of the image. Various filters and edge detectors are used to capture the noise and texture characterizes of the image. Statistical features such as mean and variance are extracted and then utilized for differentiating original image from manipulated one. SVM classifier is used for classifying images as authentic or forged. Experiments proved that proposed integrated technique performs much better than existing state of art techniques.


Image tampering, noise discrepancies, feature extraction, textural information, quality metrics, statistical evaluation

Full Text:



A. Rocha, W. Scheirer, T. Boult, S. Goldenstein, “Vision of the unseen: current trends and challenges in digital image and video forensics”. ACM Computer Survey, 2011; 43(4):26:1–26:42.

H. Farid, “Detecting digital forgeries using bispectral analysis”, Technical Report AIM-1657, AI Lab, Massachusetts Institute of Technology; 1999.

G. K. Birajdar and V. H. Mankar, “Digital image forgery detection using passive techniques: A survey”, Digital Investigation, 2013, 10(3), 226-245.

Li. Xin, “Blind image quality assessment”, Proceedings of International Conference on Image Processing, 2002, Vol. 1. IEEE.

I. Avcibas, S. Bayram, N. Memon, M. Ramkumar, B. Sankur, “A classifier design for detecting image manipulations”, Proc. International conference on image processing (ICIP), 2004. p. 2645–8.

A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions”, Technical Report TR 2004-515, Department of Computer Science, Dartmouth College, 2004.

S. Bayram, I. Avcibas, B. Sankur and N. Memon, “Image manipulation detection ”, Electron Imaging, 2006;15(4). 041102-1–041102-17.

H. Gou, A. Swaminathan, M. Wu, “Noise features for image tampering detection and steganalysis”, Proc. International conference on image processing (ICIP) 2007. p. 97–100.

Z. Zhang, J. Kang, Y. Ren, “An effective algorithm of image splicing detection”, Proc. International conference on computer science and software engineering, 2008. p. 1035–9.

B. Mahdian and S. Saic, “Using noise inconsistencies for blind image forensics”. Image and Vision Computing, 2009, 27(10), 1497-1503.

W. Wang, J. Dong and T. Tan, “Effective image splicing detection based on image chroma”. 16th IEEE International Conference on Image Processing (ICIP), 2009, (pp. 1257-1260). IEEE.

F. Battisti, M. Carli and A. Neri, “Image forgery detection by means of no-reference quality metrics”. IS&T/SPIE Electronic Imaging, 2012, pp. 83030K-83030K, International Society for Optics and Photonics.

Y. Ke, Q. Zhang, W. Min and S. Zhang, “Detecting Image Forgery Based on Noise Estimation”, 2014, International Journal of Multimedia and Ubiquitous Engineering, 9(1), 325-336.

B. Liu and C. M. Pun, “Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies”, 2015, International Journal of Computer and Communication Engineering, 4(1), 33.

Y. Q. Shi, C. Chen and W. Chen, “A natural image model approach to splicing detection”, Proc. of the 9th Workshop on Multimedia & Security (ACM), 51–62 (2007).

Z. He, W. Lu, W. Sun and J. Huang, “Digital image splicing detection based on Markov features in DCT and DWT domain”, Pattern Recognition, 45(12), 4292–4299 (2012).

G. Muhammad, M. S. Dewan, M. Moniruzzaman, M. Hussain and M. N. Huda, “Image forgery detection using Gabor filters and DCT”, Proc. IEEE Int. Conf. Electrical Engineering Inf. Communication Technol., Dhaka, Bangladesh, 1–5 (2014).

M. Hussain, S. Qasem, G. Bebis, G. Muhammad, H. Aboalsamh and H. Mathkour, “Evaluation of image forgery detection using multi-scale Weber local descriptors”, International Journal on Artificial Intelligence Tools, 24(4), 1540016-1540042 (2015).

X. Shen, Z. Shi, and H. Chen, “Splicing image forgery detection using textural features based on the grey level co-occurrence matrices”, IET Image Processing, 11(1), 44-53 (2016).

J. Dong and W. Wang, “CASIA tampered image detection evaluation database”, http://forensics.idealtest.org (2011).

C. C. Chang and C. J. Lin, “LIBSVM: a library for support vector machines”, ACM Transactions on Intelligent Systems and Technology, 2:27:1--27:27, (2011).

DOI: https://doi.org/10.26483/ijarcs.v8i8.3397


  • There are currently no refbacks.

Copyright (c) 2017 International Journal of Advanced Research in Computer Science