Exploiting perceptual quality issues in countering SIFT-based Forensic methods

Scale Invariant Feature Transform (SIFT) has been widely employed in several image application domains, including Image Forensics (e.g. detection of copy-move forgery or near duplicates). Recently, a number of methods allowing to remove SIFT keypoints from an original image have been devised studying the problem of SIFT security against malicious procedures. Such techniques are quite effective in producing an attacked image with very few (or no) keypoints, but at the expense of an image distortion. Final perceptual quality has been taken in account very roughly so far. In this paper, effectiveness of the attacking methods is evaluated also from the side of perceptual image quality; a new version of a SIFT keypoint removal method, based on a perceptual metric, is presented and an extended series of perceptive experiments is reported.

[1]  Soo-Chang Pei,et al.  Secure and robust SIFT , 2009, ACM Multimedia.

[2]  Mauro Barni,et al.  Counter-forensics of SIFT-based copy-move detection by means of keypoint classification , 2013, EURASIP J. Image Video Process..

[3]  Alessandro Neri,et al.  Image forgery detection by means of no-reference quality metrics , 2012, Other Conferences.

[4]  Christian Keimel,et al.  QualityCrowd — A framework for crowd-based quality evaluation , 2012, 2012 Picture Coding Symposium.

[5]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[6]  Laurent Amsaleg,et al.  Deluding image recognition in sift-based cbir systems , 2010, MiFor '10.

[7]  J. Astola,et al.  ON BETWEEN-COEFFICIENT CONTRAST MASKING OF DCT BASIS FUNCTIONS , 2007 .

[8]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[9]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[10]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[11]  Mauro Barni,et al.  On the effectiveness of local warping against SIFT-based copy-move detection , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.

[12]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[13]  ITU-T Rec. P.910 (04/2008) Subjective video quality assessment methods for multimedia applications , 2009 .