On the Security of Image Manipulation Forensics
In this paper, we present a unified understanding on the formal performance evaluation for image manipulation forensics techniques. With hypothesis testing model, security is qualified as the difficulty for defeating an existing forensics system and making it generate two types of forensic errors, i.e., missing and false alarm detection. We point out that the security on false alarm risk, which is rarely addressed in current literatures, is equally significant for evaluating the performance of manipulation forensics techniques. With a case study on resampling-based composition forensics detector, both qualitative analyses and experimental results verify the correctness and rationality of our understanding on manipulation forensics security.
KeywordsSecurity Image manipulation forensics Anti-forensics Hypothesis testing Forging attack
- 1.Zhao, X., Wang, S., Li, S., Li, J., Yuan, Q.: Image splicing detection based on noncausal markov model. In: IEEE International Conference on Image Processing, Melbourne, pp. 4462–4466 (2013)Google Scholar
- 11.Fan, W., Wang, K., Cayre, F., Xiong, Z.: A variational approach to jpeg anti-forensics. In: IEEE International Conference on Acoustics, Speech and Signal, Vancouver, pp. 3058–3062 (2013)Google Scholar
- 12.Barni, M., Fontani, M., Tondi, B.: A universal technique to hide traces of histogram-based image manipulations. In: ACM Workshop on Multimedia and Security, Coventry, pp. 97–104 (2012)Google Scholar
- 14.Glasner, D., Bagon, S., Irani, M.: Super-resolution from a single image. In: IEEE International Conference on Computer Vision, Kyoto, pp. 349–356 (2009)Google Scholar