<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An Algorithm for Image Time Series Forgery Detection Based on the Anomalies Detection</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nadezhda Evdokimova</string-name>
          <email>nadezh.evdokimova@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vladislav Myasnikov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Samara National Research University</institution>
          ,
          <addr-line>Samara 443086</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The present work is devoted to the development and investigation of the algorithm for detection intentional distortions (forgeries) of a single digital image in an image time series (time sequences) of one scene. The proposed algorithm consists of three stages. At the rst stage, a set of errors that were calculated during reconstruction the fragments of the analyzed image by the 'neighboring' ones are estimated. After errors were calculated throughout image, we analyze their distribution on the second stage. At the nal stage, fragments of the analyzed image that are anomalies are selected as 'suspicious'. The proposed algorithm, unlike existing algorithms, will allow uni ed detection of such attacks as intra-image copy-move and inter-image copy-move. Also, copy-move fragments may fall under geometric transformation, linear enhancement and other distortions. The investigation results of intra-image copy-move and inter-image copy-move detection using the proposed solution are presented.</p>
      </abstract>
      <kwd-group>
        <kwd>time series</kwd>
        <kwd>image time series</kwd>
        <kwd>image forgery</kwd>
        <kwd>detection</kwd>
        <kwd>anomaly</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Nowadays the image forgery methods complexity increases in relation to their
detection complexity. This is due to the number spheres increasing using digital
images in their work, as well as their processing tools availability and
popularization. Image time series show the scene dynamics and allow it to be compared
over time. So, having an image time series of some scene, with some admission,
you can model an image that will be next in the scene, or an image that may
have been distorted.</p>
      <p>
        This algorithm will allow detection spatial tampering attacks. At the
moment, several detection techniques were development. They are technique based
on camera's ngerprint, technique based on coding artifacts, and techniques that
use temporal and spatial correlation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Their main weakness is absence of
robustness to di erent distortions. Proposed algorithm uses correlation between
corresponding fragments of di erent images in the image series and allows
detection intra-image copy-move and inter-image copy-move.
      </p>
      <p>
        We will mean forgery in the sense of an anomaly to develop an algorithm for
image forgery detection. In the general sense, an anomaly is a data fragment that
does not correspond to the precisely de ned concept of normal behavior [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In
accordance with the de nition given above, within the framework of this paper,
we will consider forgery image regions as anomalies. The proposed algorithm
uses the concept of anomaly in the sense of the least probable points [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]1.
      </p>
      <p>The work consists of two parts, namely, description of the proposed algorithm
and analysis of experiments results. The description of the proposed algorithm is
subdivided into the three sections. The rst section contains a characteristic of
the image fragments description method. The second section de nes the statistic
construction method. The third section explains the rule for assigning fragments
of the analyzed image to anomalies.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Description of the proposed algorithm</title>
      <p>Let It (n1; n2), t = 0; T is an image series (time sequence) of one scene. Every
image in the series has the same size N1 N2, ni 2 0; Ni 1 (i = 1; 2; T 1).</p>
      <p>For de niteness, we assume that the image I0(n1; n2) is checked, although
it can be located in the sequence anywhere. We analyze a certain square region
of the image D(n1; n2) 0; N1 1 0; N2 1 in a sliding window with a
position (n1; n2). For certain region D(n1; n2), we have image fragments It(m1; m2),
where (m1; m2) 2 D(n1; n2). To simplify the exposition, the arguments of the
region in the record D(n1; n2) can be omitted. Experimentally, we have spotted
the best in terms of detection quality and runtime window has 15 15 size.
2.1</p>
      <sec id="sec-2-1">
        <title>Image fragments description</title>
        <p>For each possible position of the window D in the image plane, the
corresponding fragments It(m1; m2) are successively divided into k fragments, k = 2p, by
clustering by brightness (a k-means clustering algorithm is used). An example
of such splitting under k = 22 is shown in Figure 1:</p>
        <p>The new fragments of the image obtained in this way on step k can be
denoted by Itj (n1; n2), j = 0; k 1. Next, we solve the problem of image I0
fragment representation for this region by means of corresponding by the window
D position fragments I10; I11; :::; I1k 1; :::; IT0 ; IT1 ; :::; ITk 1 linear combination, that
is:</p>
        <p>I0</p>
        <p>
          T k 1
X X
1 A comprehensive coverage of the eld of outlier analysis from a computer science
point of view can be found in [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]
using mean squared deviation "2k minimization:
        </p>
        <p>0</p>
        <p>We perform this procedure for k = 4; 8; 16. The rst stage result for each
position of the analysis region is a normalized mean squared deviations set of
the analyzed image fragment representation. For convenience of further use, we
designate them as a vector:
We represent the obtained vectors x(n1; n2) set in the coordinate system "~24"~28"~216.
This set is located in the three-dimensional cube with sides equal to 1 as shown
in Figure 2:
(2)
(3)
(4)
2.3</p>
      </sec>
      <sec id="sec-2-2">
        <title>Anomalies nding</title>
        <p>There are no absolute unchanging objects on images obtained in real conditions.
This is due both to real cameras properties that have their own noises and the
information transfer path properties of from the camera to the processing system.
In this path, the image is compressed before shipment and then decoded, which
often leads to additional system distortions. Moreover, there are often objects
on the scene that have certain dynamic characteristics although they are static
in our understanding. For example, it may be trees swaying in the wind.</p>
        <p>In accordance with this fact, it is impossible to obtain an errors vector with
coordinates (0; 0; 0) after authentic image fragment representation by means of
neighboring images fragments linear combination. So we can conclude the errors
vector with coordinates (0; 0; 0) corresponds to the image region, which is a
duplicate inserted from one of neighboring images of the image time series.</p>
        <p>On the other hand, the errors "~ , "~ , "~126 of an authentic fragment
represen2 2
4 8
tation must have values that do not exceed a certain threshold. It is obvious
the error value of the same fragment representation decreases with the clusters
number increasing. Therefore, it is justi ed to use di erent thresholds for "~42, "~8
2
and "~126. So the following relation should be observed:</p>
        <p>After the statistic construction stage, we analyze the distribution histograms
and select the thresholds according to the relation (5) as shown in Figure (3).
We choose rst local minimum and consider its value a threshold.</p>
        <p>Then the cube with the errors vectors x(n1; n2) set is splitted into three
areas:
1) Origin of the coordinate system;
2) A parallelepiped that is adjacent to the origin;
3) Rest area of the cube.</p>
        <p>In accordance with the above, vectors from the rst area correspond image
region which is a duplicate inserted from one of neighboring images of the image
time series (inter-image copy-move). Vectors from second area refer to authentic
image regions and vectors from third area correspond to fragments which is the
duplicate within one image (intra-image copy-move). This splitting is shown in
Figure 4.</p>
        <p>After extraction of errors vectors from the relevant area and labeling them as
suspicious, we create corresponding binary mask. After this, we process it with
a noise lter that removes regions from the binary mask that have a square less
than some value. So after this, we keep only errors vectors which corresponding
forgery regions in the set of suspicious errors vectors.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Analysis of experiments results</title>
      <p>The experiments were carried out on a desktop PC with Intel Core i5-4460
processor and 16 GB RAM using MATLAB R2016b software.
c</p>
      <p>Five image time series were obtained using the same camera. The camera
was still all the time. It has captured the scene and token image every 10 sec.
As result of this procedure, we have got ve image time series with six images
in every series. Next, we transform all images to gray-scale. Obtained images
have 920 1380 dimension. These time series were chosen as the objects of
experiments. We developed a copy-move generation procedure which enables to
add distortions and control their parameters.</p>
      <p>The experiment results that were carried out on all image series with
duplicate taken from another image of the image series are showed in the Table 1.
Example of this detection is shown in Figure 5.</p>
      <p>The experiment results with duplicate taken from the same image are shown
in the Table 2 and in the Figure 6</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Chandola</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Banerjee</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Anomaly detection: A survey</article-title>
          .
          <source>ACM Computing Surveys (CSUR) 41(3)</source>
          ,
          <year>15</year>
          .1{
          <fpage>15</fpage>
          .58 (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Christian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sheth</surname>
            ,
            <given-names>R.: Digital</given-names>
          </string-name>
          <string-name>
            <surname>Video Forgery Detection and Authentication Technique - A Review</surname>
          </string-name>
          .
          <source>International Journal of Scienti c Research in Science and Technology(IJSRST)</source>
          ,
          <volume>2</volume>
          (
          <issue>6</issue>
          ),
          <volume>138</volume>
          {
          <fpage>143</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Denisova</surname>
            ,
            <given-names>A.Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Myasnikov</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          :
          <article-title>Anomaly detection for hyperspectral imaginary</article-title>
          .
          <source>Computer Optics</source>
          <volume>38</volume>
          (
          <issue>2</issue>
          ),
          <volume>287</volume>
          {
          <fpage>296</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Aggarwal</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          :
          <article-title>Outlier Analysis</article-title>
          . 2nd ed., Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>