Blind Authentication Using Periodic Properties of Interpolation
In this paper, we analyze and analytically describe the specific statistical changes brought into the covariance structure of signal by the interpolation process. We show that interpolated signals and their derivatives contain specific detectable periodic properties. Based on this, we propose a blin...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2008-09, Vol.3 (3), p.529-538 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 538 |
---|---|
container_issue | 3 |
container_start_page | 529 |
container_title | IEEE transactions on information forensics and security |
container_volume | 3 |
creator | Mahdian, B. Saic, S. |
description | In this paper, we analyze and analytically describe the specific statistical changes brought into the covariance structure of signal by the interpolation process. We show that interpolated signals and their derivatives contain specific detectable periodic properties. Based on this, we propose a blind, efficient, and automatic method capable of finding traces of resampling and interpolation. The proposed method can be very useful in many areas, especially in image security and authentication. For instance, when two or more images are spliced together, to create high quality and consistent image forgeries, almost always geometric transformations, such as scaling, rotation, or skewing are needed. These procedures are typically based on a resampling and interpolation step. By having a method capable of detecting the traces of resampling, we can significantly reduce the successful usage of such forgeries. Among other points, the presented method is also very useful in estimation of the geometric transformations factors. |
doi_str_mv | 10.1109/TIFS.2004.924603 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIFS_2004_924603</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4540058</ieee_id><sourcerecordid>875089580</sourcerecordid><originalsourceid>FETCH-LOGICAL-c430t-b150b8df4f0c4422b75edb1fb97dede90ba3b1ec9c70d8b1c88e00ad78bcb8a53</originalsourceid><addsrcrecordid>eNpd0DFPwzAQBWALgUQp7EgsEQtTyjmxE2dCpaJQqRKVaGcrti_gKo2DnQz8e1KCGJjuhu-dTo-QawozSqG4366Wb7MEgM2KhGWQnpAJ5TyLM0jo6d9O03NyEcJ-cIxmYkIeHmvbmGjedx_YdFaXnXVNtAu2eY826K0zVkcb71r0ncUQuSpaNR361tU_9JKcVWUd8Op3Tslu-bRdvMTr1-fVYr6ONUuhixXloISpWAWasSRROUejaKWK3KDBAlSZKoq60DkYoagWAgFKkwullSh5OiV3493Wu88eQycPNmis67JB1wcpcg6i4AIGeftP7l3vm-E5KbIkS5OcFgOCEWnvQvBYydbbQ-m_JAV57FMe-5THPuXY5xC5GSMWEf844wyAi_QbPYxx4Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>862632719</pqid></control><display><type>article</type><title>Blind Authentication Using Periodic Properties of Interpolation</title><source>IEEE Electronic Library (IEL)</source><creator>Mahdian, B. ; Saic, S.</creator><creatorcontrib>Mahdian, B. ; Saic, S.</creatorcontrib><description>In this paper, we analyze and analytically describe the specific statistical changes brought into the covariance structure of signal by the interpolation process. We show that interpolated signals and their derivatives contain specific detectable periodic properties. Based on this, we propose a blind, efficient, and automatic method capable of finding traces of resampling and interpolation. The proposed method can be very useful in many areas, especially in image security and authentication. For instance, when two or more images are spliced together, to create high quality and consistent image forgeries, almost always geometric transformations, such as scaling, rotation, or skewing are needed. These procedures are typically based on a resampling and interpolation step. By having a method capable of detecting the traces of resampling, we can significantly reduce the successful usage of such forgeries. Among other points, the presented method is also very useful in estimation of the geometric transformations factors.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2004.924603</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Blinds ; Derivatives ; Digital forgery ; Digital images ; Forensics ; Forgery ; Geometric transformation ; image forensics ; Interpolation ; interpolation detection ; Mathematical analysis ; Periodic structures ; Resampling ; resampling detection ; Security ; Signal analysis ; Signal processing ; Statistics ; Studies ; tampering detection</subject><ispartof>IEEE transactions on information forensics and security, 2008-09, Vol.3 (3), p.529-538</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c430t-b150b8df4f0c4422b75edb1fb97dede90ba3b1ec9c70d8b1c88e00ad78bcb8a53</citedby><cites>FETCH-LOGICAL-c430t-b150b8df4f0c4422b75edb1fb97dede90ba3b1ec9c70d8b1c88e00ad78bcb8a53</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4540058$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4540058$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mahdian, B.</creatorcontrib><creatorcontrib>Saic, S.</creatorcontrib><title>Blind Authentication Using Periodic Properties of Interpolation</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>In this paper, we analyze and analytically describe the specific statistical changes brought into the covariance structure of signal by the interpolation process. We show that interpolated signals and their derivatives contain specific detectable periodic properties. Based on this, we propose a blind, efficient, and automatic method capable of finding traces of resampling and interpolation. The proposed method can be very useful in many areas, especially in image security and authentication. For instance, when two or more images are spliced together, to create high quality and consistent image forgeries, almost always geometric transformations, such as scaling, rotation, or skewing are needed. These procedures are typically based on a resampling and interpolation step. By having a method capable of detecting the traces of resampling, we can significantly reduce the successful usage of such forgeries. Among other points, the presented method is also very useful in estimation of the geometric transformations factors.</description><subject>Authentication</subject><subject>Blinds</subject><subject>Derivatives</subject><subject>Digital forgery</subject><subject>Digital images</subject><subject>Forensics</subject><subject>Forgery</subject><subject>Geometric transformation</subject><subject>image forensics</subject><subject>Interpolation</subject><subject>interpolation detection</subject><subject>Mathematical analysis</subject><subject>Periodic structures</subject><subject>Resampling</subject><subject>resampling detection</subject><subject>Security</subject><subject>Signal analysis</subject><subject>Signal processing</subject><subject>Statistics</subject><subject>Studies</subject><subject>tampering detection</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpd0DFPwzAQBWALgUQp7EgsEQtTyjmxE2dCpaJQqRKVaGcrti_gKo2DnQz8e1KCGJjuhu-dTo-QawozSqG4366Wb7MEgM2KhGWQnpAJ5TyLM0jo6d9O03NyEcJ-cIxmYkIeHmvbmGjedx_YdFaXnXVNtAu2eY826K0zVkcb71r0ncUQuSpaNR361tU_9JKcVWUd8Op3Tslu-bRdvMTr1-fVYr6ONUuhixXloISpWAWasSRROUejaKWK3KDBAlSZKoq60DkYoagWAgFKkwullSh5OiV3493Wu88eQycPNmis67JB1wcpcg6i4AIGeftP7l3vm-E5KbIkS5OcFgOCEWnvQvBYydbbQ-m_JAV57FMe-5THPuXY5xC5GSMWEf844wyAi_QbPYxx4Q</recordid><startdate>20080901</startdate><enddate>20080901</enddate><creator>Mahdian, B.</creator><creator>Saic, S.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>20080901</creationdate><title>Blind Authentication Using Periodic Properties of Interpolation</title><author>Mahdian, B. ; Saic, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c430t-b150b8df4f0c4422b75edb1fb97dede90ba3b1ec9c70d8b1c88e00ad78bcb8a53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Authentication</topic><topic>Blinds</topic><topic>Derivatives</topic><topic>Digital forgery</topic><topic>Digital images</topic><topic>Forensics</topic><topic>Forgery</topic><topic>Geometric transformation</topic><topic>image forensics</topic><topic>Interpolation</topic><topic>interpolation detection</topic><topic>Mathematical analysis</topic><topic>Periodic structures</topic><topic>Resampling</topic><topic>resampling detection</topic><topic>Security</topic><topic>Signal analysis</topic><topic>Signal processing</topic><topic>Statistics</topic><topic>Studies</topic><topic>tampering detection</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mahdian, B.</creatorcontrib><creatorcontrib>Saic, S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mahdian, B.</au><au>Saic, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Blind Authentication Using Periodic Properties of Interpolation</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2008-09-01</date><risdate>2008</risdate><volume>3</volume><issue>3</issue><spage>529</spage><epage>538</epage><pages>529-538</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>In this paper, we analyze and analytically describe the specific statistical changes brought into the covariance structure of signal by the interpolation process. We show that interpolated signals and their derivatives contain specific detectable periodic properties. Based on this, we propose a blind, efficient, and automatic method capable of finding traces of resampling and interpolation. The proposed method can be very useful in many areas, especially in image security and authentication. For instance, when two or more images are spliced together, to create high quality and consistent image forgeries, almost always geometric transformations, such as scaling, rotation, or skewing are needed. These procedures are typically based on a resampling and interpolation step. By having a method capable of detecting the traces of resampling, we can significantly reduce the successful usage of such forgeries. Among other points, the presented method is also very useful in estimation of the geometric transformations factors.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2004.924603</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2008-09, Vol.3 (3), p.529-538 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TIFS_2004_924603 |
source | IEEE Electronic Library (IEL) |
subjects | Authentication Blinds Derivatives Digital forgery Digital images Forensics Forgery Geometric transformation image forensics Interpolation interpolation detection Mathematical analysis Periodic structures Resampling resampling detection Security Signal analysis Signal processing Statistics Studies tampering detection |
title | Blind Authentication Using Periodic Properties of Interpolation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T09%3A39%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Blind%20Authentication%20Using%20Periodic%20Properties%20of%20Interpolation&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Mahdian,%20B.&rft.date=2008-09-01&rft.volume=3&rft.issue=3&rft.spage=529&rft.epage=538&rft.pages=529-538&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2004.924603&rft_dat=%3Cproquest_RIE%3E875089580%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=862632719&rft_id=info:pmid/&rft_ieee_id=4540058&rfr_iscdi=true |