Digital Image Forensics and Counter Anti-forensics

Conference paper


The use of digital images in journalism and as evidence in the court of law for crime investigation and law enforcement are some application areas where it is extremely important to ensure authenticity of the images being used. Wide availability of sophisticated image processing software has simplified image manipulation. Image forensics deals with the study of the images to reconstruct their history and detect if it has undergone some intentional or unintentional modifications. This paper presents an introductory overview of the digital image forensics and its counterpart aiming to help the beginners understand their alliance so as to develop robust forensic tools against intentional and unintentional attacks on the multimedia. A brief look into counter anti-forensics is also presented in this paper.


Digital image forensics Anti-forensics Counter anti-forensics Image tampering 


  1. 1.
    Guojuan, Z., Dianji, L.: An overview of digital watermarking in image forensics. In: IEEE Proceedings of Fourth International Joint Conference on Computational Sciences and Optimization, pp. 332−335 (2011)Google Scholar
  2. 2.
    Mohammad, N., Sun, X., Yang, H.: An adaptive visible watermarking algorithm for BTC compressed images. Inf. Technol. J. 13(3), 536–541 (2014)CrossRefGoogle Scholar
  3. 3.
    Qazi, T., Hayat, K., Khan, S.U., Madani, S.A., Khan, I.A., Kołodziej, J., Li, H., Lin, W.Y.K.C., Xu, C.Z.: Survey on blind image forgery detection. IET Image Process. 7(7), 1–11 (2013)CrossRefGoogle Scholar
  4. 4.
    Abhitha, E., Karthick, V.J.A.: Forensic technique for detecting tamper in digital image compression. Int. J. Adv. Res. Comput. Commun. Eng. 2(3), 1325–1330 (2013)Google Scholar
  5. 5.
    Swaminathan, A., Wu, M., Liu, K.J.R.: Digital image forensics via intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 3(1), 101–117 (2008)CrossRefGoogle Scholar
  6. 6.
    Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1–26 (2012)CrossRefGoogle Scholar
  7. 7.
    Bayram, S., Sencar, H.T., Memon, N.: A survey of copy-move forgery detection techniques. In: Proceedings of the IEEE Western New York Image Processing Workshop, pp. 538–542, IEEE (2008)Google Scholar
  8. 8.
    Weiqi, L., Zhenhua, Q., Feng, P., Jiwu, H.: A survey of passive technology for digital image forensics. Review article. Front. Comput. China (2007)Google Scholar
  9. 9.
    Lin, H.J., Wang, C.W., Kao, Y.T.: Fast copy-move forgery detection. WSEAS Trans. Signal Process. 5(5), 188–197 (2009)Google Scholar
  10. 10.
    Singh, V.K., Tripathi, R.C.: Fast and efficient region duplication detection in digital images using sub-blocking method. Int. J. Adv. Sci. Technol. 35, 93–102 (2011)Google Scholar
  11. 11.
    Yang, B., Sun, X., Chen, X., Zhang, J., Li, X.: An efficient forensic method for copy–move forgery detection based on DWT-FWHT. Radioengineering 22(4), 1098–1105 (2013)Google Scholar
  12. 12.
    Kaur, A., Sharma, R.: Optimization of copy-move forgery detection technique. Int. J. Adv.Res. Comput. Sci. Software Eng. 3(4), 576–578 (2013)Google Scholar
  13. 13.
    Kaur, A., Sharma, R.: Copy-move forgery detection using DCT and SIFT. Int. J. Comput. Appl. 70(7) (2013)Google Scholar
  14. 14.
    Böhme, R., Kirchner, M.: Counter-forensics: attacking image forensics. In: Digital Image Forensics. Springer, New York (2012)Google Scholar
  15. 15.
    Manimurugan, S., Kaimal, A.B.: A tailored anti-forensic technique for digital image applications. Int. J. Comput. Appl. 53(9) (2012)Google Scholar
  16. 16.
    Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.J.R.: Anti-forensics of JPEG compression. In: Proceedings of IEEE conference on ICASSP 2010, pp. 1694−1697 (2010)Google Scholar
  17. 17.
    Stamm, M.C., Liu, K.J.R.: Wavelet-based image compression anti-forensics. In: Proceedings of 2010 IEEE 17th International Conference on Image Processing, Hong Kong, pp. 1737–1740 (2010)Google Scholar
  18. 18.
    Sreelakshmi, M.S., Venkataraman, D.: Image compression using anti-forensics method. Int. J. Comput. Sci. Eng. Appl. 3(1), 81–89 (2013)Google Scholar
  19. 19.
    Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.J.R.: Undetectable image tampering through JPEG compression anti-forensics. In: Proceedings of 2010 IEEE 17th International Conference on Image Processing, Hong Kong, pp. 2109–2112 (2010)Google Scholar
  20. 20.
    Dang-Nguyen, D.T., Gebru, I.D., Conotter, V., Boato, G., De Natale, F.G.B.: Counter-forensics of median filtering. In: IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp. 260–265 (2013)Google Scholar
  21. 21.
    Fontani, M., Barni, M.: Hiding traces of median filtering in digital images. In: EUSIPCO, pp. 1239–1243 (2012)Google Scholar
  22. 22.
    Pandit, P.D., Rajput, M.: Survey on anti-forensics operations in image forensics. Int. J. Comput. Sci. Inf. Technol. 5(2), 1570–1573 (2014)Google Scholar
  23. 23.
    Fontani, M., Bonchi, A., Piva, A., Barni, M.: Countering anti-forensics by means of data fusion. In: Proceedings of SPIE Electronic Imaging Conference, 2–6 Feb 2014Google Scholar
  24. 24.
    Li, H., Luo, W., Huang, J.: Countering anti-JPEG compression forensics. In: 19th IEEE International Conference on Image Processing (ICIP), pp. 241–244 (2012)Google Scholar
  25. 25.
    Wang, M., Chen, Z., Fan, W., Xiong, Z.: Countering anti-forensics to wavelet-based compression. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), Paris, France, pp. 5382–5386 (2014)Google Scholar
  26. 26.
    Zeng, H., Qin, T., Kang, X., Liu, L.: Countering anti-forensics of median filtering. In: IEEE International Conference on Acoustic, Speech and Signal Processing, pp. 2723–2727 (2014)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Department of CSEManipal University JaipurJaipurIndia

Personalised recommendations