An information theoretic framework for order of operations forensics

To verify the authenticity of easily manipulated multimedia content, forensic researchers have proposed many techniques to estimate the processing history of given multimedia content. When multiple operations may be applied on multimedia content, a complete processing history would involve the information of not only what manipulation operations have been applied, but also in what order they were applied. However, there are few works considering the problem of detecting the order of operations. Moreover, due to the interplay among operations, the order of operations may not always be detectable. This leads to a fundamental question of when we can or cannot detect the order of operations. In this paper, we propose an information theoretical framework to answer this question. Specifically, we formulate the problem of detecting the order of operations into a multiple hypotheses testing problem. Then, we propose an information theoretical framework to characterize the relationship between the true hypothesis and the detected hypothesis. Under this framework, we propose a mutual information based criterion to determine the detectability of the order of operations. Furthermore, conditional fingerprints are defined in this framework to understand why the order of operations is not always detectable. The detection of the order of resizing and blurring is examined in this paper, where the order detection scheme has been proposed and the effectiveness of our framework has been demonstrated by simulations.

[1]  K. J. Ray Liu,et al.  Compressive Sensing Forensics , 2015, IEEE Transactions on Information Forensics and Security.

[2]  Matthias Kirchner,et al.  Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.

[3]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[4]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[5]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[6]  Hanghang Tong,et al.  Blur detection for digital images using wavelet transform , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[7]  ZhaoYao,et al.  Contrast Enhancement-Based Forensics in Digital Images , 2014 .

[8]  Alessandro Piva,et al.  Reverse engineering of double compressed images in the presence of contrast enhancement , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[9]  K. J. Ray Liu,et al.  Information theoretical limit of compression forensics , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[10]  Shijian Lu,et al.  Blurred image region detection and classification , 2011, ACM Multimedia.

[11]  Yao Zhao,et al.  Edge-based Blur Metric for Tamper Detection , 2010, J. Inf. Hiding Multim. Signal Process..

[12]  K. J. Ray Liu,et al.  Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Yao Zhao,et al.  Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.

[14]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[15]  Bin Li,et al.  Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[16]  Alessandro Piva,et al.  Reverse engineering of double JPEG compression in the presence of image resizing , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[17]  Pedro Comesaña Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[18]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[19]  Fernando Pérez-González,et al.  Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[21]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[22]  K. J. Ray Liu,et al.  Forensically determining the order of signal processing operations , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).