Abstract
In this paper, we present a unified understanding on the formal performance evaluation for image manipulation forensics techniques. With hypothesis testing model, security is qualified as the difficulty for defeating an existing forensics system and making it generate two types of forensic errors, i.e., missing and false alarm detection. We point out that the security on false alarm risk, which is rarely addressed in current literatures, is equally significant for evaluating the performance of manipulation forensics techniques. With a case study on resampling-based composition forensics detector, both qualitative analyses and experimental results verify the correctness and rationality of our understanding on manipulation forensics security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhao, X., Wang, S., Li, S., Li, J., Yuan, Q.: Image splicing detection based on noncausal markov model. In: IEEE International Conference on Image Processing, Melbourne, pp. 4462–4466 (2013)
Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)
Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Signal Process. 53(6), 758–767 (2005)
Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Trans. Inf. Forensics Secur. 3(3), 529–538 (2008)
Luo, W., Huang, J., Qiu, G.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3), 480–491 (2010)
Stamm, M., Liu, K.J.R.: Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 5(3), 492–506 (2010)
Cao, G., Zhao, Y., Ni, R., Li, X.: Contrast enhancement-based forensics in digital images. IEEE Trans. Inf. Forensics Secur. 9(3), 515–525 (2014)
Chen, C., Ni, J., Huang, J.: Blind detection of median filtering in digital images: a difference domain based approach. IEEE Trans. Image Process. 22(12), 4699–4710 (2013)
Cao, G., Zhao, Y., Ni, R., Kot, A.: Unsharp masking sharpening detection via overshoot artifacts analysis. IEEE Signal Process. Lett. 18(10), 603–607 (2011)
Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Secur. 3(4), 582–592 (2008)
Fan, W., Wang, K., Cayre, F., Xiong, Z.: A variational approach to jpeg anti-forensics. In: IEEE International Conference on Acoustics, Speech and Signal, Vancouver, pp. 3058–3062 (2013)
Barni, M., Fontani, M., Tondi, B.: A universal technique to hide traces of histogram-based image manipulations. In: ACM Workshop on Multimedia and Security, Coventry, pp. 97–104 (2012)
Cao, G., Zhao, Y., Ni, R.: Attacking contrast enhancement forensics in digital images. Sci. China Inf. Sci. 57(5), 052110(1)–052110(13) (2014)
Glasner, D., Bagon, S., Irani, M.: Super-resolution from a single image. In: IEEE International Conference on Computer Vision, Kyoto, pp. 349–356 (2009)
Acknowledgements
This work was supported in part by the National NSF of China under Grants (61401408, 61332012, 61272355), Fundamental Research Funds for the Central Universities (2015JBZ002), Research Founds of CUC (3132015XNG1506), Open Projects Program of NLPR (201306309).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Cao, G., Wang, Y., Zhao, Y., Ni, R., Lin, C. (2015). On the Security of Image Manipulation Forensics. In: Ho, YS., Sang, J., Ro, Y., Kim, J., Wu, F. (eds) Advances in Multimedia Information Processing -- PCM 2015. PCM 2015. Lecture Notes in Computer Science(), vol 9314. Springer, Cham. https://doi.org/10.1007/978-3-319-24075-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-24075-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24074-9
Online ISBN: 978-3-319-24075-6
eBook Packages: Computer ScienceComputer Science (R0)