Digital image forensics via intrinsic fingerprints

Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity and the availability of low-cost image editing software, the integrity of digital image content can no longer be taken for granted. This paper introduces a new methodology for the forensic analysis of digital camera images. The proposed method is based on the observation that many processing operations, both inside and outside acquisition devices, leave distinct intrinsic traces on digital images, and these intrinsic fingerprints can be identified and employed to verify the integrity of digital data. The intrinsic fingerprints of the various in-camera processing operations can be estimated through a detailed imaging model and its component analysis. Further processing applied to the camera captured image is modelled as a manipulation filter, for which a blind deconvolution technique is applied to obtain a linear time-invariant approximation and to estimate the intrinsic fingerprints associated with these postcamera operations. The absence of camera-imposed fingerprints from a test image indicates that the test image is not a camera output and is possibly generated by other image production processes. Any change or inconsistencies among the estimated camera-imposed fingerprints, or the presence of new types of fingerprints suggest that the image has undergone some kind of processing after the initial capture, such as tampering or steganographic embedding. Through analysis and extensive experimental studies, this paper demonstrates the effectiveness of the proposed framework for nonintrusive digital image forensics.

[1]  J. Hiriart-Urruty,et al.  Convex analysis and minimization algorithms , 1993 .

[2]  K.J.R. Liu,et al.  Component Forensics of Digital Cameras: A Non-Intrusive Approach , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[3]  Jr. James E. Adams,et al.  Interactions between color plane interpolation and other image processing functions in electronic photography , 1995, Electronic Imaging.

[4]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[5]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[6]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[7]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[8]  Min Wu,et al.  Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.

[9]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[10]  Dimitrios Hatzinakos,et al.  Watermark detection for noisy interpolated images , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[11]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[12]  Petra Mutzel,et al.  A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.

[13]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[14]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[15]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[16]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.

[17]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[18]  Hany Farid,et al.  Blind Removal of Image Non-Linearities , 2001, ICCV.

[19]  H. Farid,et al.  Blind Removal of Image Non-Linearities , 2001, ICCV.

[20]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[21]  Hany Farid,et al.  Digital Image Ballistics from JPEG Quantization , 2006 .

[22]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[23]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[24]  Mahalingam Ramkumar,et al.  A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[25]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[26]  Siwei Lyu,et al.  How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.

[27]  Deepa Kundur,et al.  A novel blind deconvolution scheme for image restoration using recursive filtering , 1998, IEEE Trans. Signal Process..

[28]  Min Wu,et al.  Intrinsic fingerprints for image authentication and steganalysis , 2007, Electronic Imaging.

[29]  J. C. Dainty,et al.  Iterative blind deconvolution method and its applications , 1988 .

[30]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[31]  Hany Farid,et al.  Blind inverse gamma correction , 2001, IEEE Trans. Image Process..

[32]  David G. Stork,et al.  Pattern classification, 2nd Edition , 2000 .

[33]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[34]  Hany Farid,et al.  Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.

[35]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[36]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[37]  Jessica J. Fridrich,et al.  Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.

[38]  Shih-Fu Chang,et al.  Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.

[39]  Glenn Healey,et al.  Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..

[40]  Kevin E. Spaulding,et al.  Color processing in digital cameras , 1998, IEEE Micro.

[41]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[42]  David G. Stork,et al.  Pattern Classification (2nd ed.) , 1999 .

[43]  Shih-Fu Chang,et al.  Columbia Photographic Images and Photorealistic Computer Graphics Dataset , 2005 .

[44]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[45]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[46]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[47]  Jessica J. Fridrich,et al.  Perturbed quantization steganography , 2005, Multimedia Systems.

[48]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[49]  Min Wu,et al.  Image Tampering Identification using Blind Deconvolution , 2006, 2006 International Conference on Image Processing.