By Topic

Blind Verification of Digital Image Originality: A Statistical Approach

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Mahdian, B. ; Inst. of Inf. Theor. & Autom., Prague, Czech Republic ; Nedbal, R. ; Saic, S.

Many methods for verifying the integrity of digital images employ various fingerprints associated with acquisition devices. Data on an acquisition device and fingerprints are extracted from an image and confronted with a reference data set that includes all possible fingerprints of the acquisition device. This allows us to draw a conclusion whether the digital image has been modified or not. Thus it is critical to have a sufficiently large, reliable, and true reference data set, otherwise critical miscalculations can arise. Reference data sets are extracted from image data sets that in turn are collected from unknown and nonguaranteed environments (mostly from the Internet). Since often software modifications leave no obvious traces in the image file (e.g., in metadata), it is not easy to recognize original images, from which fingerprints of acquisition devices can be extracted to form true reference data sets. This is the problem addressed in this paper. Given a database consisting of “unguaranteed” images, we introduce a statistical approach for assessing image originality by using the image file's header information (e.g., JPEG compression parameters). First a general framework is introduced. Then the framework is applied to several fingerprint types selected for image integrity verification.

Published in:

Information Forensics and Security, IEEE Transactions on  (Volume:8 ,  Issue: 9 )