Image counter-forensics based on feature injection

نویسندگان

  • Massimo Iuliani
  • Simone Rossetto
  • Tiziano Bianchi
  • Alessia De Rosa
  • Alessandro Piva
  • Mauro Barni
چکیده

Starting from the concept that many image forensic tools are based on the detection of some features revealing a particular aspect of the history of an image, in this work we model the counter-forensic attack as the injection of a specific fake feature pointing to the same history of an authentic reference image. We propose a general attack strategy that does not rely on a specific detector structure. Given a source image x and a target image y, the adversary processes x in the pixel domain producing an attacked image x̃, perceptually similar to x, whose feature f(x̃) is as close as possible to f(y) computed on y. Our proposed counter-forensic attack consists in the constrained minimization of the feature distance Φ(z) =| f(z)−f(y) | through iterative methods based on gradient descent. To solve the intrinsic limit due to the numerical estimation of the gradient on large images, we propose the application of a feature decomposition process, that allows the problem to be reduced into many subproblems on the blocks the image is partitioned into. The proposed strategy has been tested by attacking three different features and its performance has been compared to state-of-the-art counter-forensic methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Removal and injection of keypoints for SIFT-based copy-move counter-forensics

Recent studies exposed the weaknesses of scale-invariant feature transform (SIFT)-based analysis by removing keypoints without significantly deteriorating the visual quality of the counterfeited image. As a consequence, an attacker can leverage on such weaknesses to impair or directly bypass with alarming efficacy some applications that rely on SIFT. In this paper, we further investigate this t...

متن کامل

Countering Counter-Forensics: The Case of JPEG Compression

This paper summarizes several iterations in the cat-andmouse game between digital image forensics and counter-forensics related to an image’s JPEG compression history. Building on the counterforensics algorithm by Stamm et al. [1], we point out a vulnerability in this scheme when a maximum likelihood estimator has no solution. We construct a targeted detector against it, and present an improved...

متن کامل

Notes on Digital Image Forensics and Counter-Forensics

(Dartmouth College) were members of the doctoral committee. The thesis was supported by a scholarship from Deutsche Telekom Stiftung (Bonn, Germany). Parts of the third chapter were co-authored by Rainer Böhme and have been published as a book chapter " Counter-Forensics: Attacking Image Forensics " in the book " Digital Image Forensics. There is More to a Picture than Meets the Eye " , edited ...

متن کامل

Counter-Forensics: Attacking Image Forensics

This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images. Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of forensic analyses. Counter-forensics is first defined in a formal decis...

متن کامل

Forensics, Anti-forensics and Counter Anti-forensics for JPEG Compressed Images

-With the advancement in information technology and image processing software the manipulation of the images has increased considerably from past few decades. Retouching or tampering of the images has been so prevalent that nowadays one can hardly believe their originality. Image authenticity is done using forgery detection techniques. These methods are broadly classified as active and passive....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014