Skip to main content

Advertisement

Log in

Understanding digital image anti-forensics: an analytical review

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image forensics is essential for detecting image manipulation, authenticating images, and identifying sources of images. A forensic analyst can make use of various artifacts to develop a powerful forensic technique. These artifacts include JPEG blocking and quantization artifacts, streaking artifacts and contrast enhancement artifacts, etc. With the introduction of anti-forensics, it has become difficult for forensic experts to identify forged images. There are various anti-forensic methods available that try to eradicate these detection footprints/artifacts to fool the existing forensic detectors. Thus the detection of anti-forensic attacks is very crucial and plays a vital role in forensic analysis. This paper presents a review of various types of anti-forensic attacks, such as JPEG anti-forensics, Contrast enhancement anti-forensics, and Median filtering anti-forensics. Firstly a brief introduction is given about image forgery, JPEG compression, contrast enhancement, and median filtering. Then, anti-forensics is described in detail, and finally, the recent state-of-the-art anti-forensic techniques are summarized in tabular form for better understanding. This may be helpful for the forensic analyst to develop robust methods for forgery detection that can be applied in various applications such as the identification of cybercrimes, identity thefts, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Kim D, Ahn W, Lee HK (2021) End to end anti-forensics method of single and double JPEG detection. IEEE Access 9:13390–13402

    Google Scholar 

  2.  Mehrish A, Subramanyam AV, Emmanuel S (2019) Joint spatial and discrete cosine transform domain based counter forensics for adaptive contrast enhancement. IEEE Access 7:27183–27195

    Google Scholar 

  3. Barni M, Fontani M, Tondi B (2015) Universal counterforensics of multiple compressed JPEG images. In: Proceedings of the 13th International Workshop Digital Forensics and Watermarking, p 31–46

  4. Bayar B, Stamm MC (2018) Adversarial multimedia forensics: Overview and challenges ahead. In: Proceedings of the European Signal Processing Conference (EUSIPCO)

  5. Bhardwaj D, Pankajakshan V (2018) A JPEG blocking artifact detector for image forensics. Signal Process Image Commun 68:155–161

    Google Scholar 

  6. Cao G, Zhao Y, Ni R, Tian H (2010) Anti-forensics of contrast enhancement in digital images. In: Proceedings of the 12th ACM workshop on Multimedia and security, p 25–34

  7. Cao G, Zhao Y, Ni R, Yu L, Tian H (2010) Forensic detection of median filtering in digital images. In: Proceedings of the IEEE international conference on multimedia expo, Singapore, p 89–94

  8. Cao G, Zhao Y, Ni R, Li X (2014) Contrast enhancement-based forensics in digital images. IEEE Trans Inf Forensic Secur 9:515–525

    Google Scholar 

  9. Chen C, Ni J (2011) Median filtering detection using edge based prediction matrix. In: Proceedings of the 10th international workshop on digital forensics and watermarking, p 361–375

  10. Chen C, Ni J, Huang R, Huang J (2012) Blind median filtering detection using statistics in difference domain. In: Information Hiding, IH 2012, volume 7692, p 1–15

  11. Chen C, Ni J, Huang J (2013) Blind detection of median filtering in digital images: a difference domain based approach. IEEE Trans  Image Process 22:4699–4710

    MathSciNet  Google Scholar 

  12. Chen J, Kang X, Liu Y, Wang ZJ (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett 22(11):1849–1853

    Google Scholar 

  13. Cruz F, Sidere N, Coustaty M, D’Andecy VP, Ogier JM (2017) Local binary patterns for document forgery detection. In: Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), Kyoto, volume 01, p 1223–1228

  14. Dang-Nguyen DT, Gebru ID, Conotter V, Boato G, De Natale FGB (2013) Counter-forensics of median filtering. In: Proceedings of the IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), Pula, Italy, p 260–265

  15. Datta P, Rani S, Koundal D (2020) Detection of eye ailments using segmentation of blood vessels from eye fundus image. In: Proceedings of the ICRIC 2019, p 515–531

  16. De Rosa A, Fontani M, Massai M, Piva A, Barni M (2015) Second-order statistics analysis to cope with contrast enhancement counter-forensics. IEEE Signal Process Lett 22(8):1132–1136

    Google Scholar 

  17. Fan Z, De Queiroz RL (2003) Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process 12(2):230–235

    Google Scholar 

  18. Fan W, Wang K, Cayre F, Xiong Z (2013) A variational approach to JPEG anti-forensics. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013, Vancouver, p 3058–3062

  19. Fan W, Wang K, Cayre F, Xiong Z (2014) JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality. IEEE Trans Inf Forensic Secur 9(8):1211–1226

    Google Scholar 

  20. Fan W, Wang K, Cayre F, Xiong Z (2015) Median filtered image quality enhancement and anti-forensics via variational deconvolution. IEEE Trans Inf Forensic Secur 10(5):1076–1091

    Google Scholar 

  21. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868–882

    Google Scholar 

  22. Priyanka, Singh G, Singh K(2020) An improved block based copy-move forgery detection technique. Multimed Tools Appl 79(5):13011–13035

    Google Scholar 

  23. Ravi H, Subramanyam AV, Emmanuel S (2015) Ace - an effective anti-forensic contrast enhancement technique. IEEE Signal Process Lett 23(2):212–216

    Google Scholar 

  24. Hingrajiya KH, Sheth RK (2021) Comparative study of digital image forgery detection techniques. In: Proceedings of the International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), p 83–86

  25. Kaimal A, Priestly B (2019) Removing the traces of median filtering via unsharp masking as an anti-forensic approach in medical imaging. Biomed Pharmacol J 12(3):1395–1402

  26. Kang X, Stamm MC, Peng A, Ray Liu KJ (2013) Robust median filtering forensics using an autoregressive model. IEEE Trans Inf Forensic Secur 8:1456–1468

    Google Scholar 

  27. Kang X, Qin T, Zeng H (2015) Countering median filtering anti-forensics and performance evaluation of forensics against intentional attacks. In: Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), p 483–487

  28. Kejun Zhang Y, Liang JZ, Wang Z, Li X (2019) No one can escape: a general approach to detect tampered and generated image. IEEE Access 7:129494–129503

    Google Scholar 

  29. Kim D, Jang HU, Mun SM, Choi S, Lee HK (2018) Median filtered image restoration and anti-forensics using adversarial networks. IEEE Signal Process Lett 25(2):278–282

    Google Scholar 

  30. Kumar A, Kansal A, Singh K (2019) An improved anti-forensic technique for JPEG compression. Multimed Tools Appl 78(18):25427–25453

    Google Scholar 

  31. Kumar A, Singh G, Kansal A, Singh K (2021) Digital image forensic approach to counter the JPEG anti-forensic attacks. IEEE Access 9:4364–4375

    MathSciNet  Google Scholar 

  32. Kumawat C, Pankajakshan V (2020) A robust JPEG compression detector for image forensics. Signal Process Image Commun 89:116008

    Google Scholar 

  33. Kwok CW, Oscar A, Chui SH (2011) Alternative anti-forensics method for contrast enhancement. In: Proceedings of the 10th International Workshop, IWDW 2011, p 398–410

  34. Lai S, Böhme R (2011) Countering counter-forensics: the case of JPEG compression. Information hiding. Lecture notes in computer science, Springer, 6958:285–298

  35. Lalitha RVSS, Naga Srinivasu P (2017) An efficient data encryption through image via prime order symmetric key and bit shuffle technique. In: proceedings of the computer communication, networking and internet security, Springer Singapore, Singapore, p 261–270

  36. Li H, Luo W, Huang J (2012) Countering anti-JPEG compression forensics. In: Proceedings of the 19th IEEE International Conference on Image Processing, p 241–244

  37. Li H, Luo W, Qiu X, Huang J (2018) Identification of various image operations using residual-based features. IEEE Trans Circ Syst  Vid Technol 28(1):31–45

    Google Scholar 

  38. Lin X, Li CT, Hu Y (2013) Exposing image forgery through the detection of contrast enhancement. In: Proceedings of the IEEE International Conference on Image Processing, p 4467–4471

  39. Lin X, Wei X, Li CT (2014) Two improved forensic methods of detecting contrast enhancement in digital images. In: Proceedings of SPIE - The International Society for Optical Engineering 9028

    Google Scholar 

  40. Liu A, Zhao Z, Zhang C, Yuting S (2017) Median filtering forensics in digital images based on frequency-domain features. Multimed Tools  Appl 76

    Google Scholar 

  41. Luo W, Huang J, Qiu G (2010) JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forensic Secur 5(3):480–491

    Google Scholar 

  42. Naga Srinivasu P, Norwawi N, Amiripalli SS, Deepalakshmi P (2022) Secured compression for 2d medical images through the manifold and fuzzy trapezoidal correlation function. Gazi Univ J Sci 35(4):1372–1391

    Google Scholar 

  43. Pasquini C, Comesana-Alfaro P, Pérez-González F, Boato G (2014) Transportation-theoretic image counterforensics to first significant digit histogram forensics. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), p 2699–2703

  44. Peng A, Luo S, Zeng H, Yadong W (2019) Median filtering forensics using multiple models in residual domain. IEEE Access 7:28525–28538

    Google Scholar 

  45. Shaheed K, Mao A, Qureshi I, Abbas Q, Kumar M, Zhang X (2022) Finger-vein presentation attack detection using depthwise separable convolution neural network. Expert Syst  Appl 198:116786

    Google Scholar 

  46. Shaheed K, Mao A, Qureshi I, Kumar M, Hussain S, Ullah I, Zhang X (2022) Ds-cnn: a pre-trained xception model based on depth-wise separable convolutional neural network for finger vein recognition. Expert Syst  Appl 191:116288

    Google Scholar 

  47. Shaheed K, Mao A, Qureshi I, Kumar M, Hussain S, Zhang X (2022) Recent advancements in finger vein recognition technology: methodology, challenges and opportunities. Inf Fus 79:84–109

    Google Scholar 

  48. Shan RHW, Yi Y, Xie Y (2019) Robust contrast enhancement forensics based on convolutional neural networks. Signal Process Image Commun 71:138–146

    Google Scholar 

  49. Sharma K, Singh G, Goyal P (2023) Ipdcn2: Improvised patch-based deep cnn for facial retouching detection. Expert Syst  Appl 211:118612

    Google Scholar 

  50. Sharma S, Subramanyam AV, Jain M, Mehrish A, Emmanuel S (2016) Anti-forensic technique for median filtering using L1- L2 TV model. In: Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), p 1–6

  51. Singh G, Singh K (2017) Improved JPEG anti-forensics with better image visual quality and forensic undetectability. Forensic Sci Int 277:133–147

    Google Scholar 

  52. Singh G, Singh K (2019) Counter JPEG anti-forensic approach based on the second-order statistical analysis. IEEE Trans Inf Forensic Secur 14(5):1194–1209

    Google Scholar 

  53. Singh K, Kansal A, Singh G (2019) An improved median filtering anti-forensics with better image quality and forensic undetectability. Multidim Syst Sign Process, p 1–24

  54. Stamm MC, Ray Liu KJ (2011) Anti-forensics of digital image compression. IEEE Trans Inf Forensic Secur 6(3):1050–1065

    Google Scholar 

  55. Stamm MC, Tjoa SK, Lin WS, Liu KJR (2010) Anti-forensics of JPEG compression. In: Proceedings of the IEEE International Conference Acoustics, Speech and Signal Processing, Dallas, p 1694–1697

  56. Sun JY, Kim SW, Lee SW, Ko SJ (2018) A novel contrast enhancement forensics based on convolutional neural networks. Signal Process Image Commun 63:149-160

    Google Scholar 

  57. Sutthiwan P, Shi YQ (2012) Anti-forensics of double JPEG compression detection. In: Proceedings of the 10th International Workshop Digital Forensics and Watermarking, Springer, Berlin, Heidelberg, p 411–424

  58. Valenzise G, Tagliasacchi M, Tubaro S (2013) Revealing the traces of JPEG compression anti-forensics. IEEE Trans Inf Forensic  Secur 8(2):335–349

    Google Scholar 

  59. Walia S, Kumar K, Kumar M, Gao XZ (2021) Fusion of handcrafted and deep features for forgery detection in digital images. IEEE Access 9:99742–99755

    Google Scholar 

  60. Wen L, Qi H, Lyu S (2018) Contrast enhancement estimation for digital image forensics. ACM Trans  Multimed Comput Commun  Appl (TOMM)  14(2):1–21

    Google Scholar 

  61. Wu ZH, Stamm MC, Liu KJR (2013) Anti-forensics of median filtering. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, p 3043–3047

  62. Xie H, Ni J, Shi YQ (2021) Dual-domain generative adversarial network for digital image operation anti-forensics. IEEE Trans Circ Syst Vid Technol 32(3):1701–1706

  63. Yang P (2021) Dual-domain fusion convolutional neural network for contrast enhancement forensics. Entropy 23:1318

    Google Scholar 

  64. Yang J, Ren H, Zhu G, Huang J, Shi YQ (2017) Detecting median filtering via two-dimensional AR models of multiple filtered residuals. Multimed Tools Appl 77:7931–7953

    Google Scholar 

  65. Yang P, Ni R, Zhao Y, Zhao W (2018) Robust contrast enhancement forensics using pixel and histogram domain CNNs. 03

  66. Yuan HD (2011) Blind forensics of median filtering in digital images. IEEE Trans  Inf Forensic  Secur 6(4):1335–1345

    Google Scholar 

  67. Zeng H, Qin T, Kang X, Liu L (2014) Countering anti-forensics of median filtering. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),Florence, p 2704–2708

  68. Zhang Y, Li S, Wang S, Shi YQ (2014) Revealing the traces of median filtering using high-order local ternary patterns. IEEE Signal Process Lett 21:275–279

  69. Zhao M, Wang B, Wei F, Zhu M, Sui X (2020) Source camera identification based on coupling coding and adaptive filter. IEEE Access 8:54431–54440

    Google Scholar 

  70. Zou H, Pengpeng Y, Ni R, Zhao Y (2021) Anti-forensics of image contrast enhancement based on generative adversarial network. Secur  Commun Netw 2021:1–8

    Google Scholar 

  71. Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD - New Database for Copy-Move Forgery Detection. In: Proceedings of the 55th International Symposium ELMAR-2013, p 49–54

  72. Qazi T, Hayat K, Khan SU, Madani SV, Khan IA, Kolodziej Joanna, Hongxiang L, Weiyao Lin, Choong Yow Kin, Cheng-Zhong Xu (2013) Survey on blind image forgery detection. IET Image Processing 7(7):660–670

  73. Dong J, Wang W, Tan T (2013) CASIA Image Tampering Detection Evaluation Database. In: Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, Beijing, China, p 422–426

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neeti Taneja.

Ethics declarations

The authors declare that they do not have any personal or financial conflict of interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Taneja, N., Bramhe, V.S., Bhardwaj, D. et al. Understanding digital image anti-forensics: an analytical review. Multimed Tools Appl 83, 10445–10466 (2024). https://doi.org/10.1007/s11042-023-15866-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15866-0

Keywords

Navigation