skip to main content
10.1145/2713168.2713194acmconferencesArticle/Chapter ViewAbstractPublication PagesmmsysConference Proceedingsconference-collections
short-paper

RAISE: a raw images dataset for digital image forensics

Published:18 March 2015Publication History

ABSTRACT

Digital forensics is a relatively new research area which aims at authenticating digital media by detecting possible digital forgeries. Indeed, the ever increasing availability of multimedia data on the web, coupled with the great advances reached by computer graphical tools, makes the modification of an image and the creation of visually compelling forgeries an easy task for any user. This in turns creates the need of reliable tools to validate the trustworthiness of the represented information. In such a context, we present here RAISE, a large dataset of 8156 high-resolution raw images, depicting various subjects and scenarios, properly annotated and available together with accompanying metadata. Such a wide collection of untouched and diverse data is intended to become a powerful resource for, but not limited to, forensic researchers by providing a common benchmark for a fair comparison, testing and evaluation of existing and next generation forensic algorithms. In this paper we describe how RAISE has been collected and organized, discuss how digital image forensics and many other multimedia research areas may benefit of this new publicly available benchmark dataset and test a very recent forensic technique for JPEG compression detection.

References

  1. I. Amerini et al. A sift-based forensic method for copy-move attack detection and transformation recovery,. IEEE Transactions on Information Forensics and Security, 6(3):1099--1110, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. F. Battisti et al. Watermarking and encryption of color images in the fibonacci domain. In SPIE Image Processing: Algorithms and Systems, volume 6812, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  3. V. Christlein et al. An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security, 7(6):1841--1854, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. V. Conotter and G. Boato. Analysis of sensor fingerprint for source camera identification. IEEE Electronic Letters, 47(25):1366--1367, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  5. V. Conotter et al. A crowdsourced data set of edited images online. In ACM Workshop on Crowdsourcing for Multimedia, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. V. Conotter et al. Physiologically-based detection of computer generated faces in video. In IEEE International Conference on Image Processing, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  7. A. Criminisi. Single-view metrology: Algorithms and applications. In Pattern Recognition, volume 2449 of Lecture Notes in Computer Science, pages 224--239. Springer Berlin Heidelberg, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. E. Delp et al. Special issue on digital forensics. IEEE Signal Processing Magazine, 2(26), 2009.Google ScholarGoogle Scholar
  9. J. Dong et al. Casia image tampering detection evaluation database. In IEEE International Conference on Signal and Information Processing, pages 422--426, 2013. Online at http://forensics.idealtest.org.Google ScholarGoogle ScholarCross RefCross Ref
  10. T. Gloe and R. Böhme. The 'Dresden Image Database' for benchmarking digital image forensics. In ACM Symposium On Applied Computing, volume 2, pages 1585--1591, 2010. Online at https://forensics.inf.tu-dresden.de/ddimgdb. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Goljan et al. Large scale test of sensor fingerprint camera identification. In SPIE Media Forensics and Security, volume 7254, 2009.Google ScholarGoogle Scholar
  12. Y.-F. Hsu and S.-F. Chang. Detecting image splicing using geometry invariants and camera characteristics consistency. In IEEE International Conference on Multimedia and Expo, pages 549--552, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  13. M. J. Huiskes and M. S. Lew. The MIR Flickr retrieval evaluation. In ACM International Conference on Multimedia Information Retrieval, pages 39--43, 2008. Online at http://press.liacs.nl/mirflickr/. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Kakar and N. Sudha. Verifying temporal data in geotagged images via sun azimuth estimation. IEEE Transactions on Information Forensics and Security, 7(3):1029--1039, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Lukas et al. Digital camera identification from sensor noise. IEEE Transactions on Information Forensics and Security, 1(2):205--214, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Pasquini et al. A Benford-Fourier JPEG compression detector. In IEEE International Conference on Image Processing, pages 5322--5326, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. Piva. An overview on image forensics. ISRN Signal Processing, 2013: 1--22, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  18. REWIND. Reverse engineering of audio-visual content data - datasets. Online at http://www.rewindproject.eu/.Google ScholarGoogle Scholar
  19. G. Schaefer and M. Stich. UCID - an uncompressed colour image database. In SPIE Conference on Storage and Retrieval Methods and Applications for Multimedia, pages 472--480, San Jose (CA), January 2004. Online at http://homepages.lboro.ac.uk/cogs/datasets/ucid/ucid.html.Google ScholarGoogle Scholar
  20. P. Zontone et al. Impact of contrast modification on human feeling: an objective and subjective assessment. In IEEE International Conference on Image Processing, 2010.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. RAISE: a raw images dataset for digital image forensics

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            MMSys '15: Proceedings of the 6th ACM Multimedia Systems Conference
            March 2015
            277 pages
            ISBN:9781450333511
            DOI:10.1145/2713168

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 18 March 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper

            Acceptance Rates

            MMSys '15 Paper Acceptance Rate12of41submissions,29%Overall Acceptance Rate176of530submissions,33%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader