Pacific Rim Conference on Multimedia

Advances in Multimedia Information Processing -- PCM 2015 pp 97-105 | Cite as

On the Security of Image Manipulation Forensics

  • Gang Cao
  • Yongbin Wang
  • Yao Zhao
  • Rongrong Ni
  • Chunyu Lin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9314)


In this paper, we present a unified understanding on the formal performance evaluation for image manipulation forensics techniques. With hypothesis testing model, security is qualified as the difficulty for defeating an existing forensics system and making it generate two types of forensic errors, i.e., missing and false alarm detection. We point out that the security on false alarm risk, which is rarely addressed in current literatures, is equally significant for evaluating the performance of manipulation forensics techniques. With a case study on resampling-based composition forensics detector, both qualitative analyses and experimental results verify the correctness and rationality of our understanding on manipulation forensics security.


Security Image manipulation forensics Anti-forensics Hypothesis testing Forging attack 


  1. 1.
    Zhao, X., Wang, S., Li, S., Li, J., Yuan, Q.: Image splicing detection based on noncausal markov model. In: IEEE International Conference on Image Processing, Melbourne, pp. 4462–4466 (2013)Google Scholar
  2. 2.
    Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRefGoogle Scholar
  3. 3.
    Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Signal Process. 53(6), 758–767 (2005)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Trans. Inf. Forensics Secur. 3(3), 529–538 (2008)CrossRefGoogle Scholar
  5. 5.
    Luo, W., Huang, J., Qiu, G.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3), 480–491 (2010)CrossRefGoogle Scholar
  6. 6.
    Stamm, M., Liu, K.J.R.: Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 5(3), 492–506 (2010)CrossRefGoogle Scholar
  7. 7.
    Cao, G., Zhao, Y., Ni, R., Li, X.: Contrast enhancement-based forensics in digital images. IEEE Trans. Inf. Forensics Secur. 9(3), 515–525 (2014)CrossRefGoogle Scholar
  8. 8.
    Chen, C., Ni, J., Huang, J.: Blind detection of median filtering in digital images: a difference domain based approach. IEEE Trans. Image Process. 22(12), 4699–4710 (2013)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Cao, G., Zhao, Y., Ni, R., Kot, A.: Unsharp masking sharpening detection via overshoot artifacts analysis. IEEE Signal Process. Lett. 18(10), 603–607 (2011)CrossRefGoogle Scholar
  10. 10.
    Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Secur. 3(4), 582–592 (2008)CrossRefGoogle Scholar
  11. 11.
    Fan, W., Wang, K., Cayre, F., Xiong, Z.: A variational approach to jpeg anti-forensics. In: IEEE International Conference on Acoustics, Speech and Signal, Vancouver, pp. 3058–3062 (2013)Google Scholar
  12. 12.
    Barni, M., Fontani, M., Tondi, B.: A universal technique to hide traces of histogram-based image manipulations. In: ACM Workshop on Multimedia and Security, Coventry, pp. 97–104 (2012)Google Scholar
  13. 13.
    Cao, G., Zhao, Y., Ni, R.: Attacking contrast enhancement forensics in digital images. Sci. China Inf. Sci. 57(5), 052110(1)–052110(13) (2014)CrossRefGoogle Scholar
  14. 14.
    Glasner, D., Bagon, S., Irani, M.: Super-resolution from a single image. In: IEEE International Conference on Computer Vision, Kyoto, pp. 349–356 (2009)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Gang Cao
    • 1
  • Yongbin Wang
    • 1
  • Yao Zhao
    • 2
  • Rongrong Ni
    • 2
  • Chunyu Lin
    • 2
  1. 1.School of Computer ScienceCommunication University of ChinaBeijingChina
  2. 2.Institute of Information ScienceBeijing Jiaotong UniversityBeijingChina

Personalised recommendations