Counter-Forensics: Attacking Image Forensics

نویسندگان

  • Rainer Böhme
  • Matthias Kirchner
  • H. T. Sencar
چکیده

This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images. Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of forensic analyses. Counter-forensics is first defined in a formal decision-theoretic framework. This framework is then interpreted and extended to encompass the requirements to forensic analyses in practice, including a discussion of the notion of authenticity in the presence of legitimate processing, and the role of image models with regard to the epistemic underpinning of the forensic decision problem. A terminology is developed that distinguishes security from robustness properties, integrated from post-processing attacks, and targeted from universal attacks. This terminology is directly applied in a self-contained technical survey of counter-forensics against image forensics, notably techniques that suppress traces of image processing and techniques that synthesize traces of authenticity, including examples and brief evaluations. A discussion of relations to other domains of multimedia security and an overview of open research questions concludes the chapter. 1 Definition of Counter-Forensics This final chapter changes the perspective. It is devoted to digital image counterforensics, the art and science of impeding and misleading forensic analyses of digital images. Rainer Böhme Westfälische Wilhelms-Universität Münster, Dept. of Information Systems, Leonardo-Campus 3, 48149 Münster, Germany e-mail: [email protected] Matthias Kirchner International Computer Science Institute, 1947 Center Street, Berkeley, CA 94704 e-mail: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Notes on Digital Image Forensics and Counter-Forensics

(Dartmouth College) were members of the doctoral committee. The thesis was supported by a scholarship from Deutsche Telekom Stiftung (Bonn, Germany). Parts of the third chapter were co-authored by Rainer Böhme and have been published as a book chapter " Counter-Forensics: Attacking Image Forensics " in the book " Digital Image Forensics. There is More to a Picture than Meets the Eye " , edited ...

متن کامل

Image counter-forensics based on feature injection

Starting from the concept that many image forensic tools are based on the detection of some features revealing a particular aspect of the history of an image, in this work we model the counter-forensic attack as the injection of a specific fake feature pointing to the same history of an authentic reference image. We propose a general attack strategy that does not rely on a specific detector str...

متن کامل

Forensics, Anti-forensics and Counter Anti-forensics for JPEG Compressed Images

-With the advancement in information technology and image processing software the manipulation of the images has increased considerably from past few decades. Retouching or tampering of the images has been so prevalent that nowadays one can hardly believe their originality. Image authenticity is done using forgery detection techniques. These methods are broadly classified as active and passive....

متن کامل

Countering Counter-Forensics: The Case of JPEG Compression

This paper summarizes several iterations in the cat-andmouse game between digital image forensics and counter-forensics related to an image’s JPEG compression history. Building on the counterforensics algorithm by Stamm et al. [1], we point out a vulnerability in this scheme when a maximum likelihood estimator has no solution. We construct a targeted detector against it, and present an improved...

متن کامل

Counter-forensics in machine learning based forgery detection

With the powerful image editing tools available today, it is very easy to create forgeries without leaving visible traces. Boundaries between host image and forgery can be concealed, illumination changed, and so on, in a naive form of counter-forensics. For this reason, most modern techniques for forgery detection rely on the statistical distribution of micro-patterns, enhanced through high-lev...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012