Vision of the unseen: Current trends and challenges in digital image and video forensics

Digital images are everywhere—from our cell phones to the pages of our online news sites. How we choose to use digital image processing raises a surprising host of legal and ethical questions that we must address. What are the ramifications of hiding data within an innocent image? Is this an intentional security practice when used legitimately, or intentional deception? Is tampering with an image appropriate in cases where the image might affect public behavior? Does an image represent a crime, or is it simply a representation of a scene that has never existed? Before action can even be taken on the basis of a questionable image, we must detect something about the image itself. Investigators from a diverse set of fields require the best possible tools to tackle the challenges presented by the malicious use of today's digital image processing techniques. In this survey, we introduce the emerging field of digital image forensics, including the main topic areas of source camera identification, forgery detection, and steganalysis. In source camera identification, we seek to identify the particular model of a camera, or the exact camera, that produced an image. Forgery detection's goal is to establish the authenticity of an image, or to expose any potential tampering the image might have undergone. With steganalysis, the detection of hidden data within an image is performed, with a possible attempt to recover any detected data. Each of these components of digital image forensics is described in detail, along with a critical analysis of the state of the art, and recommendations for the direction of future research.

[1]  B. Coe The Birth of Photography: The Story of the Formative Years, 1800-1900 , 1976 .

[2]  共立出版株式会社 コンピュータ・サイエンス : ACM computing surveys , 1978 .

[3]  P. Vaidyanathan Quadrature mirror filter banks, M-band extensions and perfect-reconstruction techniques , 1987, IEEE ASSP Magazine.

[4]  C. Morandi,et al.  Registration of Translated and Rotated Images Using Finite Fourier Transforms , 1987, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  T. Newkirk Listening In , 1992 .

[6]  P. Reeves Mission impossible? , 1993, Health services management.

[7]  Jitendra Malik,et al.  Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[8]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[9]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[10]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[11]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[12]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[13]  Rafik A. Goubran,et al.  Robust voice activity detection using higher-order statistics in the LPC residual domain , 2001, IEEE Trans. Speech Audio Process..

[14]  Zeno Geradts,et al.  Methods for identification of images acquired with digital cameras , 2001, SPIE Optics East.

[15]  Jan-Olof Eklundh,et al.  Automatic estimation of the projected light source direction , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[16]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[17]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[18]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[19]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[20]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[21]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[22]  Nasir D. Memon,et al.  On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.

[23]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[24]  Yixian Yang,et al.  A LSB steganography detection algorithm , 2003, PIMRC.

[25]  S. Cass Listening in [electronic spying] , 2003 .

[26]  J. Kumagai Mission impossible? [FBI computer network] , 2003 .

[27]  Li Zhi,et al.  A LSB steganography detection algorithm , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[28]  P. Wallich Getting the message , 2003 .

[29]  E. Delp,et al.  Security, steganography, and watermarking of multimedia contents , 2004 .

[30]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[31]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[32]  Rajarathnam Chandramouli,et al.  Current trends in steganalysis: a critical survey , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

[33]  Heung-Yeung Shum,et al.  Radiometric calibration from a single image , 2004, CVPR 2004.

[34]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[35]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[36]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[37]  Nasir D. Memon,et al.  Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[38]  Shih-Fu Chang,et al.  Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.

[39]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..

[40]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[41]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[42]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[43]  M. Eisenstein Getting the message , 2005, Nature Methods.

[44]  Harry Shum,et al.  Image completion with structure propagation , 2005, ACM Trans. Graph..

[45]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[46]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[47]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[48]  Helen Pearson Image manipulation: CSI: cell biology , 2005, Nature.

[49]  Siwei Lyu,et al.  How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.

[50]  Nasir D. Memon,et al.  Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.

[51]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[52]  Tomás Pevný,et al.  Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.

[53]  Yun Q. Shi,et al.  Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in DFT Domain , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[54]  Sevinc Bayram,et al.  IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION , 2005 .

[55]  S. Paek,et al.  Patient-specific embryonic stem cells derived from human SCNT blastocysts. , 2005, Science.

[56]  Nasir D. Memon,et al.  Image manipulation detection , 2006, J. Electronic Imaging.

[57]  Ying Wang,et al.  On Discrimination between Photorealistic and Photographic Images , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[58]  Yun Q. Shi,et al.  JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.

[59]  Hany Farid,et al.  Exposing digital forgeries in scientific images , 2006, MM&Sec '06.

[60]  Yun Q. Shi,et al.  Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA) , 2006, IWDW.

[61]  mary-warner-marien Photography: A Cultural History , 2006 .

[62]  Yizhen Huang,et al.  Image Based Source Camera Identification using Demosaicking , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.

[63]  Min-Jen Tsai,et al.  USING Image Features to Identify Camera Sources , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[64]  B. Sankur,et al.  Source Cell-phone Identification , 2006, 2006 IEEE 14th Signal Processing and Communications Applications.

[65]  Edmund Y Lam,et al.  Automatic source camera identification using the intrinsic lens radial distortion. , 2006, Optics express.

[66]  Anderson Rocha,et al.  Progressive Randomization for Steganalysis , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.

[67]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[68]  Junfeng He,et al.  Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.

[69]  Min Wu,et al.  Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[70]  Hany Farid,et al.  Digital doctoring: how to tell the real from the fake , 2006 .

[71]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[72]  Lei Guo,et al.  Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[73]  Wenjun Zeng,et al.  Multimedia Security Technologies for Digital Rights Management , 2006 .

[74]  Nasir D. Memon,et al.  Improvements on Sensor Noise Based Source Camera Identification , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[75]  Sos S. Agaian,et al.  Steganography anomaly detection using simple one-class classification , 2007, SPIE Defense + Commercial Sensing.

[76]  Hany Farid,et al.  Exposing Digital Forgeries Through Specular Highlights on the Eye , 2007, Information Hiding.

[77]  Yun Q. Shi,et al.  A natural image model approach to splicing detection , 2007, MM&Sec.

[78]  Rainer Böhme,et al.  Can we trust digital image forensics? , 2007, ACM Multimedia.

[79]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting duplication , 2007, MM&Sec.

[80]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[81]  Anderson Rocha,et al.  PR: More than Meets the Eye , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[82]  E. Loftus,et al.  Changing history: doctored photographs affect memory for past public events , 2007 .

[83]  Andrew D. Ker Optimally weighted least-squares steganalysis , 2007, Electronic Imaging.

[84]  Mo Chen,et al.  Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries , 2007, Information Hiding.

[85]  Andrew D. Ker The ultimate steganalysis benchmark? , 2007, MM&Sec.

[86]  Nasir D. Memon,et al.  New Features to Identify Computer Generated Images , 2007, 2007 IEEE International Conference on Image Processing.

[87]  Weihong Wang,et al.  Exposing Digital Forgeries in Interlaced and Deinterlaced Video , 2007, IEEE Transactions on Information Forensics and Security.

[88]  Husrev T. Sencar,et al.  Overview of State-of-the-Art in Digital Image Forensics , 2007 .

[89]  Mo Chen,et al.  Source digital camcorder identification using sensor photo response non-uniformity , 2007, Electronic Imaging.

[90]  Tian-Tsong Ng,et al.  Recaptured photo detection using specularity distribution , 2008, 2008 15th IEEE International Conference on Image Processing.

[91]  Rainer Böhme,et al.  Weighted Stego-Image Steganalysis for JPEG Covers , 2008, Information Hiding.

[92]  Paul Debevec Rendering synthetic objects into real scenes: bridging traditional and image-based graphics with global illumination and high dynamic range photography , 2008, SIGGRAPH Classes.

[93]  Tsuhan Chen,et al.  Image authentication by detecting traces of demosaicing , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[94]  Jan Lukás,et al.  Camera identification from printed images , 2008, Electronic Imaging.

[95]  Nasir D. Memon,et al.  Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust , 2008, IEEE Transactions on Information Forensics and Security.

[96]  Anderson Rocha,et al.  The Unseen Challenge data sets , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[97]  Anderson Rocha,et al.  Steganography and Steganalysis in Digital Multimedia: Hype or Hallelujah? , 2008, RITA.

[98]  Ton Kalker,et al.  Chapter 12 – Steganography , 2008 .

[99]  Shih-Fu Chang,et al.  Identifying and prefiltering images , 2009, IEEE Signal Processing Magazine.

[100]  Anderson Rocha,et al.  High-profile forensic analysis of images , 2009, ICDP.

[101]  K. J. Ray Liu,et al.  Component forensics , 2009, IEEE Signal Processing Magazine.

[102]  Weihong Wang,et al.  Digital video forensics , 2009 .

[103]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[104]  Anderson Rocha,et al.  Progressive randomization: Seeing the unseen , 2010, Comput. Vis. Image Underst..

[105]  S. Peters Listening In , 2010, PACLIC.

[106]  B. Alberts Editorial expression of concern. , 2011, Science.

[107]  B. Alberts Editorial Expression of Concern , 2011, Science.

[108]  Rafael C. Gonzales,et al.  Digital Image Processing -3/E. , 2012 .

[109]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[110]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .