Tamper Hiding: Defeating Image Forensics

  • Matthias Kirchner
  • Rainer Böhme
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4567)

Abstract

This paper introduces novel hiding techniques to counter the detection of image manipulations through forensic analyses. The presented techniques allow to resize and rotate (parts of) bitmap images without leaving a periodic pattern in the local linear predictor coefficients, which has been exploited by prior art to detect traces of manipulation. A quantitative evaluation on a batch of test images proves the proposed method’s efficacy, while controlling for key parameters and for the retained image quality compared to conventional linear interpolation.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ng, T.-T., Chang, S.-F.: A Model for Image Splicing. In: Proc. of ICIP 2004, vol. 2, pp. 1169–1172 (2004)Google Scholar
  2. 2.
    Popescu, A., Farid, H.: Exposing Digital Forgeries in Color Filter Array Interpolated Images. IEEE Trans. on Signal Processing 53, 3948–3959 (2005)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Lukáš, J., Fridrich, J., Goljan, M.: Detecting Digital Image Forgeries Using Sensor Pattern Noise. In: Delp, E.J., Wong, P.W. (eds.) Proc. of SPIE: Security and Watermarking of Multimedia Content VII, vol. 6072, pp. 60720Y-1–60720Y-11 (2006)Google Scholar
  4. 4.
    Johnson, M., Farid, H.: Exposing Digital Forgeries through Chromatic Aberration. In: Proc. of ACM MM-Sec., pp. 48-55 (2006)Google Scholar
  5. 5.
    Swaminathan, A., Wu, M., Liu, K.: Image Tampering Identification Using Blind Deconvolution. In: Proc. of ICIP 2006, pp. 2311–2314 (2006)Google Scholar
  6. 6.
    Fridrich, J., Soukal, D., Lukáš, J.: Detection of Copy-Move Forgery in Digital Images. In: Proc. of the Digital Forensic Research Workshop (2003)Google Scholar
  7. 7.
    Popescu, A.C., Farid, H.: Exposing Digital Forgeries by Detecting Traces of Re-sampling. IEEE Trans. on Signal Processing 53, 758–767 (2005)CrossRefGoogle Scholar
  8. 8.
    Johnson, M.K., Farid, H.: Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In: Proc. of ACM MM-Sec., pp. 1–10 (2005)Google Scholar
  9. 9.
    Farid, H.: Exposing Digital Forgeries in Scientific Images. In: Proc. of ACM MM-Sec. pp. 29–36 (2006)Google Scholar
  10. 10.
    Thévenaz, P., Blu, T., Unser, M.: Interpolation Revisited. IEEE Trans. on Medical Imaging 19, 739–758 (2000)CrossRefGoogle Scholar
  11. 11.
    Dempster, A.P., Laird, N.M., Rubin, D.: Maximum Likelihood from Incomplete Data via the EM Algorithm. Journal of the Royal Statistical Society, Series B 39, 1–38 (1977)MathSciNetMATHGoogle Scholar
  12. 12.
    Pitas, I.: Digital Image Processing Algorithms and Applications. John Wiley & Sons, Inc., Chichester (2000)MATHGoogle Scholar
  13. 13.
    Petitcolas, F., Anderson, R., Kuhn, M.: Attacks on Copyright Marking Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  14. 14.
    Bernstein, R.: Adaptive Nonlinear Filters for Simultaneous Removal of Different Kinds of Noise in Images. IEEE Trans. on Circuits and Systems 34, 1275–1291 (1987)CrossRefGoogle Scholar
  15. 15.
    Langelaar, G.C., Biemond, J., Lagendijk, R.L.: Removing Spatial Spread Spectrum Watermarks by Non-Linear Filtering. In: Proc. of EUSIPCO 1998, pp. 2281–2284 (1998)Google Scholar
  16. 16.
    Voloshynovskiy, S., Pereira, S., Herrigel, A., Baumgaertner, N., Pun, T.: Generalized Watermarking Attack Based on Watermark Estimation and Perceptual Remodulation. In: Wong, P.W., Delp, E.J. (eds.) Proc. of SPIE: Security and Watermarking of Multimedia Content II, vol. 3971, pp. 358–370 (2000)Google Scholar
  17. 17.
    Voloshynovskiy, S., Herrigel, A., Baumgaertner, N., Pun, T.: A stochastic Approach to Content Adaptive Digital Image Watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 212–236. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  18. 18.
    Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires IX, 5–38, 161–191 (1883)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Matthias Kirchner
    • 1
  • Rainer Böhme
    • 1
  1. 1.Institute for System ArchitectureTechnische UniversitŠt DresdenGermany

Personalised recommendations