DOI QR코드

DOI QR Code

잠재성장모델링을 이용한 미디언 필터링 검출

Median Filtering Detection using Latent Growth Modeling

  • 이강현 (조선대학교 전자정보공과대학 전자공학과)
  • Rhee, Kang Hyeon (Chosun University, College of Electronics and Information Eng., Dept. of Electronics Eng.)
  • 투고 : 2014.11.08
  • 심사 : 2015.01.02
  • 발행 : 2015.01.25

초록

최근에 위,변조 영상의 처리이력 복구를 위한 포렌식 툴로서 미디언 필터링 (MF: Median Filtering) 검출기가 크게 고려되고 있다. 미디언 필터링의 분류를 위한 미디언 검출기는 적은 양의 특징 셋과 높은 검출율을 갖도록 설계되어야 한다. 본 논문은 변조된 영상의 미디언 필터링 검출을 위한 새로운 방법을 제안한다. BMP를 미디언 윈도우 사이즈에 의하여 여러 미디언 필터링 영상으로 변환하고, 윈도우 사이즈에 따른 차분포 값을 계산하여 그 값으로 미디언 필터링 윈도우 사이즈와 같은 특징 셋을 만든다. 미디언 필터링 검출기에서, 특징 셋은 잠재성장 모델링 (LFM: Latent Growth Modeling)을 사용하는 모델 특성으로 변환된다. 실험에서, 테스트 영상은 TP (True Positive)와 FN (False Negative) 두 분류로 판별된다. 제안된 알고리즘은 분류 효율성이 TP와 FN의 혼동에서 최소거리 평균이 0.119로서 훌륭한 성능임이 확인 되었다.

In recent times, the median filtering (MF) detector as a forensic tool for the recovery of forgery images' processing history has concerned broad interest. For the classification of MF image, MF detector should be designed with smaller feature set and higher detection ratio. This paper presents a novel method for the detection of MF in altered images. It is transformed from BMP to several kinds of MF image by the median window size. The difference distribution values are computed according to the window sizes and then the values construct the feature set same as the MF window size. For the MF detector, the feature set transformed to the model specification which is computed using latent growth modeling (LGM). Through experiments, the test image is classified by the discriminant into two classes: the true positive (TP) and the false negative (FN). It confirms that the proposed algorithm is to be outstanding performance when the minimum distance average is 0.119 in the confusion of TP and FN for the effectivity of classification.

키워드

참고문헌

  1. Kang Hyeon RHEE, "Image Forensic Decision Algorithm using Edge Energy Information of Forgery Image," Journal of the Institute of Electronics and Information Engineers, Vol. 51, No. 3, pp. 75-81, Mar. 2014. https://doi.org/10.5573/ieie.2014.51.3.075
  2. Il Yong CHUNG and Kang Hyeon RHEE, "Traitor Traceability of Colluded Multimedia Fingerprinting code Using Hamming Distance on XOR Collusion Attack," Journal of the Institute of Electronics and Information Engineers, Vol. 50, No. 7, pp. 175-180, July. 2013. https://doi.org/10.5573/ieek.2013.50.7.175
  3. M. Kirchner and J. Fridrich, "On detection of median filtering in digital images," in Proc. SPIE, Electron. Imaging, Media Forensics and Security II, vol. 7541, pp. 1-12, 2010.
  4. A. D. Ker and R. Bohme, "Revisiting weighted stego-image stegoanalysis," in Proc. SPIE, Electron. Imaging: Security, Forensics, Steganography and Watermarking of Multimedia Contents X, Vol. 6819, p. 5, 2008.
  5. Xiangui Kang, Matthew C. Stamm, Anjie Peng, and K. J. Ray Liu, "Robust Median Filtering Using an Autoregressive Model," IEEE Trans. on Information Forensics and Security, Vol. 8, no. 9, pp. 1456-1468, Sept. 2013. https://doi.org/10.1109/TIFS.2013.2273394
  6. G. Cao, Y. Zhao, R. Ni, L. Yu, and H. Tian, "Forensic detection of median filtering in digital images," in Multimedia and Expo (ICME), 2010, Jul. 2010, pp. 89-94. 2010.
  7. H. Yuan, "Blind forensics of median filtering in digital images," IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1335-1345, Dec.2 011. https://doi.org/10.1109/TIFS.2011.2161761
  8. Matthias Kirchner and Rainer B hme, "Tamper hiding: Defeating image forensics.," in Infor. Hiding '07, Jun. 2007, pp. 326-341, 2007.
  9. Stamm, M.C., Min Wu, Liu, K.J.R., "Information Forensics: An Overview of the First Decade," Access IEEE, pp. 167-200, 2013.
  10. C. Chen, J. Ni, R. Huang, and J. Huang, "Blind median filtering detection using statistics in difference domain," in Proc. of Infor. Hiding '12, May 2012.
  11. http://bows2.ec-lille.fr/ (Aug. 2014)

피인용 문헌

  1. Forensic Decision of Median Filtering by Pixel Value's Gradients of Digital Image vol.52, pp.6, 2015, https://doi.org/10.5573/ieie.2015.52.6.079
  2. Forensic Decision of Median Filtering Image Using a Coefficient of Variation of Fourier Transform vol.52, pp.8, 2015, https://doi.org/10.5573/ieie.2015.52.8.067
  3. Downscaling Forgery Detection using Pixel Value's Gradients of Digital Image vol.53, pp.2, 2016, https://doi.org/10.5573/ieie.2016.53.2.047