Camera Obscura: Exploiting in-camera processing for image counter forensics

Abstract For the last two decades Image Forensics has been providing an arsenal of forensic tools to detect tampered images. At the same time, anti-forensics technologies kept evolving to mislead forensic detectors. Such attacks are generally designed to affect a single forensic trace (e.g. JPEG compression, sensor patter noise, histogram statistics) without considering that the image alteration can negatively affect other traces, thus making harder to mimic multiple statistics of natural images. Nevertheless, performing of several attacks can ruin the image quality. In this paper we introduce Camera Obscura, a method that, given a tampered picture, generates a pristine image with native camera metadata, JPEG structure, Quantization Tables, Preview, Thumbnails, their corresponding Quantization Tables, single compression statistics and any in-camera (even proprietary) processing. The attack is performed by exploiting and extending Magic Lantern, an alternative camera firmware, to perform in-camera image buffer substitution. As opposed to available image anti-forensic techniques, Camera Obscura accurately reproduces multiple image statistics in one attack with a limited effect on global image quality. With these characteristics, it can be applied for many different applications such as injecting reference image statistics into a computer generated image, exchange the supposed source of a given image or hide any signal-based editing operation.

[1]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[2]  Hui Zeng,et al.  Countering anti-forensics of image resampling , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[3]  Henry G. Dietz,et al.  Self-contained, passive, non-contact, photoplethysmography: Real-time extraction of heart rates from live view within a Canon Powershot , 2019, Computational Imaging.

[4]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[5]  Mauro Barni,et al.  Image counter-forensics based on feature injection , 2014, Electronic Imaging.

[6]  Mauro Barni,et al.  Universal Counterforensics of Multiple Compressed JPEG Images , 2014, IWDW.

[7]  Nickolas J. G. Falkner,et al.  Reverse engineering the Raspberry Pi Camera V2: A study of pixel non-uniformity using a scanning electron microscope , 2019, Digit. Investig..

[8]  Toby N. Tonkin,et al.  Ground-Control Networks for Image Based Surface Reconstruction: An Investigation of Optimum Survey Designs Using UAV Derived Imagery and Structure-from-Motion Photogrammetry , 2016, Remote. Sens..

[9]  Kurt Debattista,et al.  Context-aware HDR video distribution for mobile devices , 2016, Multimedia Tools and Applications.

[10]  Kulbir Singh,et al.  Digital image forensic approach based on the second-order statistical analysis of CFA artifacts , 2020, Digit. Investig..

[11]  Paolo Bestagini,et al.  An overview on video forensics , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[12]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[13]  Rainer Böhme,et al.  Tamper Hiding: Defeating Image Forensics , 2007, Information Hiding.

[14]  Heiko Schuldt,et al.  The PS-Battles Dataset - an Image Collection for Image Manipulation Detection , 2018, ArXiv.

[15]  Stefano Tubaro,et al.  The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[16]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[17]  Jeremy Kyejo Software Enhancement for Creative Video Production and Photography with Digital Cameras , 2016 .

[18]  Alessandro Piva,et al.  Analysis of non-aligned double JPEG artifacts for the localization of image forgeries , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[19]  Andreas Uhl,et al.  Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection , 2009, PSIVT.

[20]  Andreas Uhl,et al.  Watermarking of Raw Digital Images in Camera Firmware , 2010, IPSJ Trans. Comput. Vis. Appl..

[21]  A. Piva An Overview on Image Forensics , 2013 .

[22]  Jarrod C Hodgson,et al.  Precision wildlife monitoring using unmanned aerial vehicles , 2016, Scientific Reports.

[23]  Zhang Xiong,et al.  JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.

[24]  Eli Shechtman,et al.  Patch-based high dynamic range video , 2013, ACM Trans. Graph..

[25]  Venkata Udaya Sameer,et al.  Universal Wavelet Relative Distortion: A New Counter-Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification , 2018, ISPEC.

[26]  Paul J Conroy,et al.  Corrigendum: N-terminal domain of Bothrops asper Myotoxin II Enhances the Activity of Endothelin Converting Enzyme-1 and Neprilysin , 2016, Scientific Reports.

[27]  Àlex Palomo Domínguez Depth map estimation using focus and aperture bracketing from a modified Canon 600D camera , 2017 .

[28]  Naser El-Sheimy,et al.  DESIGN AND IMPLEMENTATION OF A LOW-COST UAV-BASED MULTI-SENSOR PAYLOAD FOR RAPID-RESPONSE MAPPING APPLICATIONS , 2016 .

[29]  J. Shavit,et al.  Simple and rapid quantification of thrombocytes in zebrafish larvae. , 2015, Zebrafish.

[30]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[31]  P. Enderlein,et al.  A protocol for the aerial survey of penguin colonies using UAVs1 , 2015 .

[32]  Kulbir Singh,et al.  Counter JPEG Anti-Forensic Approach Based on the Second-Order Statistical Analysis , 2019, IEEE Transactions on Information Forensics and Security.

[33]  Sotirios A. Tsaftaris,et al.  Plant phenotyping with low cost digital cameras and image analytics , 2009, ITEE.