Skip to main content
Top
Published in: Neural Computing and Applications 10/2019

11-04-2018 | Original Article

Hopfield network-based approach to detect seam-carved images and identify tampered regions

Authors: Jyh-Da Wei, Hui-Jun Cheng, Che-Wen Chang

Published in: Neural Computing and Applications | Issue 10/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Seam carving is a content-aware algorithm for image resizing and tampering. This algorithm assigns an energy map to an image and removes the seams with low energy from the image. By doing this, seam carving makes it possible to reduce the image size and eliminate specific content from images. The detection of seam carving has lately been an important but challenging area of research. In past work, we had proposed a method that involved analyzing optimal patch types to recover seams and thus to detect seam-carved images. This method yielded highly accurate detection results. In this paper, we introduce an auto-associated Hopfield network to determine the optimal patch type for seam recovery. We use the Hebbian learning rule to choose, among candidate patch types, the one that most closely resembles the relevant target pattern. Experiments showed that the retrieval process usually converged within eight iterations and that the converged patterns improved the detection accuracy, e.g., with rates of 95.97 and 98.55% for 20 and 50% seam-carved images respectively. We also used this enhanced patch analysis method to identify the seam-carved regions of a tampered image. Its accuracy for the identification of tampered regions was higher than 70% for images with < 30% seam carving.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Dong W, Zhou N, Paul JC, Zhang X (2009) Optimized image resizing using seam carving and scaling. ACM Trans Graph 28(10):125:1–125:10 Dong W, Zhou N, Paul JC, Zhang X (2009) Optimized image resizing using seam carving and scaling. ACM Trans Graph 28(10):125:1–125:10
2.
go back to reference Elliott T (2003) An analysis of synaptic normalization in a general class of hebbian models. Neural Comput 15(4):937–963CrossRef Elliott T (2003) An analysis of synaptic normalization in a general class of hebbian models. Neural Comput 15(4):937–963CrossRef
3.
go back to reference Fillion C, Sharma G (2010) Detecting content adaptive scaling of images for forensic applications. Proc SPIE: Media Forensics Secur 7541:36–47 Fillion C, Sharma G (2010) Detecting content adaptive scaling of images for forensic applications. Proc SPIE: Media Forensics Secur 7541:36–47
4.
go back to reference Galtier MN, Faugeras OD, Bressloff PC (2012) Hebbian learning of recurrent connections: a geometrical perspective. Neural Comput 24(9):2346–2383MathSciNetCrossRef Galtier MN, Faugeras OD, Bressloff PC (2012) Hebbian learning of recurrent connections: a geometrical perspective. Neural Comput 24(9):2346–2383MathSciNetCrossRef
5.
go back to reference Gonzalez RC, Woods RE (2001) Digital image processing, 2nd edn. Prentice Hall, Englewood Cliffs Gonzalez RC, Woods RE (2001) Digital image processing, 2nd edn. Prentice Hall, Englewood Cliffs
6.
go back to reference Goodall TR, Katsavounidis I, Li Z, Aaron A, Bovik AC (2016) Blind picture upscaling ratio prediction. IEEE Signal Process Lett 23:1801–1805CrossRef Goodall TR, Katsavounidis I, Li Z, Aaron A, Bovik AC (2016) Blind picture upscaling ratio prediction. IEEE Signal Process Lett 23:1801–1805CrossRef
7.
go back to reference Jacyna GM, Malaret ER (1989) Classification performance of a hopfield neural network based on a hebbian-like learning rule. IEEE Trans Inf Theory 35(2):263–280MathSciNetCrossRef Jacyna GM, Malaret ER (1989) Classification performance of a hopfield neural network based on a hebbian-like learning rule. IEEE Trans Inf Theory 35(2):263–280MathSciNetCrossRef
8.
go back to reference Krizhevsky A, Sutskever I, Hinton GE (2017) Imagenet classification with deep convolutional neural networks. Commun ACM 60(6):84–90CrossRef Krizhevsky A, Sutskever I, Hinton GE (2017) Imagenet classification with deep convolutional neural networks. Commun ACM 60(6):84–90CrossRef
9.
go back to reference Li ZN, Drew MS, Liu J (2014) Image compression standards. In: Fundamentals of multimedia, 2 edn, chap. 9. Springer, Berlin, pp 281–315 Li ZN, Drew MS, Liu J (2014) Image compression standards. In: Fundamentals of multimedia, 2 edn, chap. 9. Springer, Berlin, pp 281–315
10.
go back to reference Liu Q (2016) An approach to detecting jpeg down-recompression and seam carving forgery under recompression anti-forensics. Pattern Recognit 65:35–46CrossRef Liu Q (2016) An approach to detecting jpeg down-recompression and seam carving forgery under recompression anti-forensics. Pattern Recognit 65:35–46CrossRef
11.
go back to reference Liu Q, Chen Z (2014) Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in jpeg images. ACM Trans Intell Syst Technol 5(4):63:1–63:30 Liu Q, Chen Z (2014) Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in jpeg images. ACM Trans Intell Syst Technol 5(4):63:1–63:30
12.
go back to reference Liu Q, Sung AH, Qiao M (2011) Neighboring joint density-based jpeg steganalysis. ACM Trans Intell Syst Technol 2(2):16:1–16:16CrossRef Liu Q, Sung AH, Qiao M (2011) Neighboring joint density-based jpeg steganalysis. ACM Trans Intell Syst Technol 2(2):16:1–16:16CrossRef
13.
go back to reference Lu W, Varna AL, Wu M (2010) Forensic hash for multimedia information. In: SPIE Media Forensics and Security, pp 75410–75419 Lu W, Varna AL, Wu M (2010) Forensic hash for multimedia information. In: SPIE Media Forensics and Security, pp 75410–75419
14.
go back to reference Palmieri F, Zhu J (1995) Self-association and hebbian learning in linear neural networks. IEEE Trans Neural Netw 6(5):1165–1184CrossRef Palmieri F, Zhu J (1995) Self-association and hebbian learning in linear neural networks. IEEE Trans Neural Netw 6(5):1165–1184CrossRef
15.
go back to reference Rubinstein M, Gutierrez D, Sorkine O, Shamir A (2010) A comparative study of image retargeting. ACM Trans Graph 29:160:1–160:10CrossRef Rubinstein M, Gutierrez D, Sorkine O, Shamir A (2010) A comparative study of image retargeting. ACM Trans Graph 29:160:1–160:10CrossRef
16.
go back to reference Rubinstein M, Shamir A, Avidan S (2008) Improved seam carving for video retargeting. ACM Trans Graph 27(3):16:1–16:9CrossRef Rubinstein M, Shamir A, Avidan S (2008) Improved seam carving for video retargeting. ACM Trans Graph 27(3):16:1–16:9CrossRef
17.
go back to reference Ryu SJ, Lee HY, Lee HK (2013) Detection of content-aware image resizing using seam properties. Appl Mech Mater 284:3074–3078CrossRef Ryu SJ, Lee HY, Lee HK (2013) Detection of content-aware image resizing using seam properties. Appl Mech Mater 284:3074–3078CrossRef
18.
go back to reference Sarkar A, Nataraj L, Manjunath BS (2009) Detection of seam carving and localization of seam insertions in digital images. In: Proceedings of 11th ACM workshop on multimedia and security, pp 107–116 Sarkar A, Nataraj L, Manjunath BS (2009) Detection of seam carving and localization of seam insertions in digital images. In: Proceedings of 11th ACM workshop on multimedia and security, pp 107–116
19.
go back to reference Schaefer G, Stich M (2003) UCID: an uncompressed color image database. In: Proceedings of SPIE 5307, pp 472–480 Schaefer G, Stich M (2003) UCID: an uncompressed color image database. In: Proceedings of SPIE 5307, pp 472–480
20.
go back to reference Shamir A, Avidan S (2007) Seam carving for content aware image resizing. ACM Trans Graph 26(3):107–216CrossRef Shamir A, Avidan S (2007) Seam carving for content aware image resizing. ACM Trans Graph 26(3):107–216CrossRef
21.
go back to reference Sheng G, Li T, Su Q, Chen B, Tang Y (2016) Detection of content-aware image resizing based on benfords law. Soft Computing, pp 1–9 Sheng G, Li T, Su Q, Chen B, Tang Y (2016) Detection of content-aware image resizing based on benfords law. Soft Computing, pp 1–9
22.
go back to reference Shi Y.Q, Chen C, Chen W (2006) A markov process based approach to effective attacking jpeg steganography. In: Lecture notes in computer science, pp 249–264 Shi Y.Q, Chen C, Chen W (2006) A markov process based approach to effective attacking jpeg steganography. In: Lecture notes in computer science, pp 249–264
23.
go back to reference Wang Y, Liu J, Li Y, Yan J, Lu H (2016) Objectness-aware semantic segmentation. In: Proceedings of the 2016 ACM on multimedia conference (ACM MM 2016), pp 307–311 Wang Y, Liu J, Li Y, Yan J, Lu H (2016) Objectness-aware semantic segmentation. In: Proceedings of the 2016 ACM on multimedia conference (ACM MM 2016), pp 307–311
24.
go back to reference Wattanachote K, Shih TK, Chang WL, Chang HH (2015) Tamper detection of jpeg image due to seam modifications. IEEE Trans Inf Forensics Secur 10(12):2477–2491CrossRef Wattanachote K, Shih TK, Chang WL, Chang HH (2015) Tamper detection of jpeg image due to seam modifications. IEEE Trans Inf Forensics Secur 10(12):2477–2491CrossRef
25.
go back to reference Wei JD, Lin YJ, Wu YJ (2014) A patch analysis method to detect seam carved images. Pattern Recognit Lett 36:100–106CrossRef Wei JD, Lin YJ, Wu YJ (2014) A patch analysis method to detect seam carved images. Pattern Recognit Lett 36:100–106CrossRef
26.
go back to reference Wei JD, Lin YJ, Wu YJ, Kang LW (2013) A patch analysis approach for seam carved image detection. In: Proceedings of 40th international conference and exhibition on computer graphics and interactive techniques (ACM SIGGRAPH 2013) Wei JD, Lin YJ, Wu YJ, Kang LW (2013) A patch analysis approach for seam carved image detection. In: Proceedings of 40th international conference and exhibition on computer graphics and interactive techniques (ACM SIGGRAPH 2013)
27.
go back to reference Yan B, Yang X, Li K (2014) Efficient image retargeting via adaptive pixel fusion. In: Proceedings of ACM international conference on multimedia, pp 929–932 Yan B, Yang X, Li K (2014) Efficient image retargeting via adaptive pixel fusion. In: Proceedings of ACM international conference on multimedia, pp 929–932
28.
go back to reference Ye J, Shi YQ (2017) An effective method to detect seam carving. J Inf Secur Appl 35:13–22 Ye J, Shi YQ (2017) An effective method to detect seam carving. J Inf Secur Appl 35:13–22
29.
go back to reference Yin T, Yang G, Li L, Zhang D, Sun X (2015) Detecting seam carving based image resizing using local binary patterns. Comput Secur 55:130–141CrossRef Yin T, Yang G, Li L, Zhang D, Sun X (2015) Detecting seam carving based image resizing using local binary patterns. Comput Secur 55:130–141CrossRef
30.
go back to reference Zhang D, Li Q, Yang G, Li L, Sun X (2017) Detection of image seam carving by using weber local descriptor and local binary patterns. J Inf Secur Appl 36:135–144 Zhang D, Li Q, Yang G, Li L, Sun X (2017) Detection of image seam carving by using weber local descriptor and local binary patterns. J Inf Secur Appl 36:135–144
31.
go back to reference Zhang D, Yin T, Yang G, Xia M, Li L, Sun X (2017) Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies. J Vis Commun Image Represent 48:281–291CrossRef Zhang D, Yin T, Yang G, Xia M, Li L, Sun X (2017) Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies. J Vis Commun Image Represent 48:281–291CrossRef
32.
go back to reference Zhu N, Deng C, Gao X (2016) A learning-to-rank approach for image scaling factor estimation. Neurocomputing 204(C):33–40CrossRef Zhu N, Deng C, Gao X (2016) A learning-to-rank approach for image scaling factor estimation. Neurocomputing 204(C):33–40CrossRef
Metadata
Title
Hopfield network-based approach to detect seam-carved images and identify tampered regions
Authors
Jyh-Da Wei
Hui-Jun Cheng
Che-Wen Chang
Publication date
11-04-2018
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 10/2019
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-018-3463-8

Other articles of this Issue 10/2019

Neural Computing and Applications 10/2019 Go to the issue

Premium Partner