Welcome to:   Multimedia Forensics Group   |   Computer Science Department   
Download
Image Database    |    Audio Database    |    Code

Image Database

Our seam-carving-based forgery database contains 500 untouched JPEG images and 500 JPEG images that were manipulated by seam-carving, bot at the quality of 75. We appreciate your interests and citations on our relevant work.

Seam-carving image database

The relevant papers:

  • Q. Liu and Z. Chen (2014), “Improved Appraches with Calibrated Neighboring joint density to Steganalysis and Seam-carved Forgery Detection in JPEG images", ACM Transactions on Intelligent Systems and Technology, 5(4), article 63.

      

    Our raw-image database contains 5150 raw color images and they are never compressed. Due to the storage capacity limitation, we are currently not be able to provide our steganography and forgery images that were used in the following papers. To validate our algorithms or your detection methods, You may convert these raw images into JPEG images and build steganalysis and forgery databases for your purposes. We appreciate your interests and citations on our relevant work.

    Never-compressed image database

    The relevant papers:

  • Q. Liu and Z. Chen (2014), “Improved Appraches with Calibrated Neighboring joint density to Steganalysis and Seam-carved Forgery Detection in JPEG images", ACM Transactions on Intelligent Systems and Technology, 5(4), article 63.
  • Q. Liu (2011), “Steganalysis of DCT-embedding based adaptive steganography and YASS”, in Proc. ACM Workshop on Multimedia & Security, Buffalo, NY, September 29-30, 2011
  • Q. Liu (2011), “Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery”, in Proc. ACM Multimedia Workshop on Multimedia Forensics and Intelligence, Scottsdale, Arizona, USA, November 29, 2011
  • Q. Liu, A. H. Sung, M. Qiao (2011), "A Method to Detect JPEG-Based Double Compression". ISNN (2) 2011: 466-476.
  • Q. Liu , A. Sung, and M. Qiao (2011), “Neighboring joint density-based JPEG Steganalysis”, ACM Transactions on Intelligent Systems and Technology, 2(2), article 16:1-16.
  • Q. Liu , A. Sung, M. Qiao, Z. Chen and B. Ribeiro (2010), “An Improved Approach to Steganalysis of JPEG Images”, Information Sciences, 180(9):1643-1655.
  • Q. Liu , A. Sung, Z. Chen, J. Xu (2008), “Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images”, Pattern Recognition, 41 (1): 56-66. doi: 10.1016/j.patcog.2007.06.005.

      

    Note: We are not able to provide our audio database due to storage limitation, but some of our source codes will be available soon.

  • Home   |    Teaching   |    Research   |    Publications   |    People   |    Downloads   |    Resources
    Copyright © 2011. All Rights Reserved. Site designed by Multimedia Forensics Group .