Multimedia Forensic Analysis via Intrinsic and Extrinsic Fingerprints

Title of Dissertation: MULTIMEDIA FORENSIC ANALYSIS VIA INTRINSIC AND EXTRINSIC FINGERPRINTS Ashwin Swaminathan, Doctor of Philosophy, 2008 Dissertation directed by: Professor Min Wu Department of Electrical and Computer Engineering Digital imaging has experienced tremendous growth in recent decades, and digital images have been used in a growing number of applications. With such increasing popularity of imaging devices and the availability of low-cost image editing software, the integrity of image content can no longer be taken for granted. A number of forensic and provenance questions often arise, including how an image was generated; from where an image was from; what has been done on the image since its creation, by whom, when and how. This thesis presents two different sets of techniques to address the problem via intrinsic and extrinsic fingerprints. The first part of this thesis introduces a new methodology based on intrinsic fingerprints for forensic analysis of digital images. The proposed method is motivated by the observation that many processing operations, both inside and outside acquisition devices, leave distinct intrinsic traces on the final output data. We present methods to identify these intrinsic fingerprints via component forensic analysis, and demonstrate that these traces can serve as useful features for such forensic applications as to build a robust device identifier and to identify potential technology infringement or licensing. Building upon component forensics, we develop a general authentication and provenance framework to reconstruct the processing history of digital images. We model post-device processing as a manipulation filter and estimate its coefficients using a linear time invariant approximation. Absence of in-device fingerprints, presence of new post-device fingerprints, or any inconsistencies in the estimated fingerprints across different regions of the test image all suggest that the image is not a direct device output and has possibly undergone some kind of processing, such as content tampering or steganographic embedding, after device capture. While component forensics is widely applicable in a number of scenarios, it has performance limitations. To understand the fundamental limits of component forensics, we develop a new theoretical framework based on estimation and pattern classification theories, and define formal notions of forensic identifiability and classifiability of components. We show that the proposed framework provides a solid foundation to study information forensics and helps design optimal input patterns to improve parameter estimation accuracy via semi non-intrusive forensics. The final part of the thesis investigates a complementing extrinsic approach via image hashing that can be used for content-based image authentication and other media security applications. We show that the proposed hashing algorithm is robust to common signal processing operations and present a systematic evaluation of the security of image hash against estimation and forgery attacks. MULTIMEDIA FORENSIC ANALYSIS VIA INTRINSIC AND EXTRINSIC FINGERPRINTS by Ashwin Swaminathan Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park in partial fulfillment of the requirements for the degree of Doctor of Philosophy 2008 Advisory Committee: Professor Min Wu, Chair / Advisor Professor K. J. Ray Liu Professor Alexander Barg Professor Adrian Papamarcou Professor Douglas W. Oard c ©Copyright by Ashwin Swaminathan 2008

[1]  Min Wu,et al.  Rotation-, scale-, and translation-resilient public watermarking for images , 2000, Electronic Imaging.

[2]  Min Wu,et al.  Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[3]  Shih-Fu Chang,et al.  Columbia Photographic Images and Photorealistic Computer Graphics Dataset , 2005 .

[4]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[5]  Nasir D. Memon,et al.  Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.

[6]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[7]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[8]  K. J. Ray Liu,et al.  Component Forensics: Theory, Methodologies, , 2009 .

[9]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[10]  H. Matthies,et al.  Introduction to Scientific Computing , 2006 .

[11]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[12]  Min Wu,et al.  Security of feature extraction in image hashing , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[13]  On the security of the visual hash function , 2005, J. Electronic Imaging.

[14]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[15]  Nasir D. Memon,et al.  Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[16]  Eric A. Wan,et al.  Neural network classification: a Bayesian interpretation , 1990, IEEE Trans. Neural Networks.

[17]  Vishal Monga,et al.  A clustering based approach to perceptual image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[18]  Chai Wah Wu,et al.  On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..

[19]  Ching-Chih Weng,et al.  A novel automatic white balance method for digital still cameras , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[20]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[21]  Min Wu,et al.  Robust scanner identification based on noise features , 2007, Electronic Imaging.

[22]  Ramarathnam Venkatesan,et al.  The randlet transform: Applications to universal perceptual hash- ing and image identi¯cation , 2004 .

[23]  Deepa Kundur,et al.  Blind image deconvolution revisited , 1996 .

[24]  Edward Y. Chang,et al.  Color filter array recovery using a threshold-based variable number of gradients , 1999, Electronic Imaging.

[25]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.

[26]  Dimitrios Hatzinakos,et al.  Watermark detection for noisy interpolated images , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[27]  J. Hiriart-Urruty,et al.  Convex analysis and minimization algorithms , 1993 .

[28]  K.J.R. Liu,et al.  Component Forensics of Digital Cameras: A Non-Intrusive Approach , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[29]  Jr. James E. Adams,et al.  Interactions between color plane interpolation and other image processing functions in electronic photography , 1995, Electronic Imaging.

[30]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[31]  Aaron D. Wyner,et al.  The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.

[32]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[33]  Mahalingam Ramkumar,et al.  A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[34]  R. Blahut Theory and practice of error control codes , 1983 .

[35]  B. Frieden Science from Fisher Information , 2004 .

[36]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[37]  Allen Gersho,et al.  Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.

[38]  Kevin E. Spaulding,et al.  Color processing in digital cameras , 1998, IEEE Micro.

[39]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[40]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[41]  Min Wu,et al.  A pattern classification framework for theoretical analysis of component forensics , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[42]  Benoit M. Macq,et al.  A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[43]  Min-Jen Tsai,et al.  Camera/Mobile Phone Source Identification for Digital Forensics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[44]  Min Wu,et al.  Image acquisition forensics: Forensic analysis to identify imaging source , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[45]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[46]  Petra Mutzel,et al.  A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.

[47]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[48]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[49]  Min Wu,et al.  Noise Features for Image Tampering Detection and Steganalysis , 2007, 2007 IEEE International Conference on Image Processing.

[50]  Hany Farid,et al.  Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.

[51]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[52]  Olivier Pironneau,et al.  Introduction to Scientific Computing , 1998 .

[53]  B. Sankur,et al.  Source Cell-phone Identification , 2006, 2006 IEEE 14th Signal Processing and Communications Applications.

[54]  Jan Lukás,et al.  Determining digital image origin using sensor imperfections , 2005, IS&T/SPIE Electronic Imaging.

[55]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[56]  ラシュコフスキー,オレグ,et al.  Software correction of the image distortion in a digital camera , 2000 .

[57]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.

[58]  Min-Jen Tsai,et al.  USING Image Features to Identify Camera Sources , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[59]  Deepa Kundur,et al.  Blind Image Deconvolution , 2001 .

[60]  Michael H. Brill,et al.  Color appearance models , 1998 .

[61]  Jean-Didier Legat,et al.  RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.

[62]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[63]  Tiago Rosa Maria Paula Queluz Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[64]  Mohan S. Kankanhalli,et al.  A Survey on Digital Camera Image Forensic Methods , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[65]  Edmund Y. Lam,et al.  Source camera identification using footprints from lens aberration , 2006, Electronic Imaging.

[66]  Min Wu,et al.  Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[67]  Deepa Kundur,et al.  A novel blind deconvolution scheme for image restoration using recursive filtering , 1998, IEEE Trans. Signal Process..

[68]  Chih-Jen Lin,et al.  Probability Estimates for Multi-class Classification by Pairwise Coupling , 2003, J. Mach. Learn. Res..

[69]  Zeno Geradts,et al.  Methods for identification of images acquired with digital cameras , 2001, SPIE Optics East.

[70]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[71]  Deepa Kundur,et al.  Statistical Invisibility for Collusion-Resistant , 2005 .

[72]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[73]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[74]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[75]  Shih-Fu Chang,et al.  Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.

[76]  Shu Lin,et al.  An Extendible Hash for Multi-Precision Similarity Querying of Image Databases , 2001, VLDB.

[77]  Glenn Healey,et al.  Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..

[78]  Aarnout Brombacher,et al.  Probability... , 2009, Qual. Reliab. Eng. Int..

[79]  Andreas Uhl,et al.  Analysis of a wavelet-based robust hash algorithm , 2004, IS&T/SPIE Electronic Imaging.

[80]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[81]  Min Wu,et al.  Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[82]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.

[83]  R. Nosofsky Tests of an exemplar model for relating perceptual classification and recognition memory. , 1991, Journal of experimental psychology. Human perception and performance.

[84]  Chiou-Ting Hsu,et al.  Source Camera Identification Based on Camera Gain Histogram , 2007, 2007 IEEE International Conference on Image Processing.

[85]  John Platt,et al.  Probabilistic Outputs for Support vector Machines and Comparisons to Regularized Likelihood Methods , 1999 .

[86]  Ramarathnam Venkatesan,et al.  A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding , 2001, Information Hiding.

[87]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[88]  Jessica J. Fridrich Visual hash for oblivious watermarking , 2000, Electronic Imaging.

[89]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[90]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[91]  Bülent Sankur,et al.  Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.

[92]  Hany Farid,et al.  Blind inverse gamma correction , 2001, IEEE Trans. Image Process..

[93]  David G. Stork,et al.  Pattern classification, 2nd Edition , 2000 .

[94]  Yizhen Huang,et al.  Image Based Source Camera Identification using Demosaicking , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.

[95]  Ramarathnam Venkatesan,et al.  New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.

[96]  Jan P. Allebach,et al.  A survey of forensic characterization methods for physical devices , 2006, Digit. Investig..

[97]  Jessica J. Fridrich,et al.  Perturbed quantization steganography , 2005, Multimedia Systems.

[98]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[99]  Min Wu,et al.  Image Tampering Identification using Blind Deconvolution , 2006, 2006 International Conference on Image Processing.

[100]  Mark S. Drew,et al.  Diagonal transforms suffice for color constancy , 1993, 1993 (4th) International Conference on Computer Vision.

[101]  Bo Zhang,et al.  An efficient and effective region-based image retrieval framework , 2004, IEEE Transactions on Image Processing.

[102]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[103]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[104]  Jan-Olof Eklundh,et al.  Automatic estimation of the projected light source direction , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[105]  Mark D. Fairchild,et al.  Color Appearance Models , 1997, Computer Vision, A Reference Guide.

[106]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[107]  Min Wu,et al.  A Component Estimation Framework for Information Forensics , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.

[108]  Min Wu,et al.  Intrinsic fingerprints for image authentication and steganalysis , 2007, Electronic Imaging.

[109]  J. C. Dainty,et al.  Iterative blind deconvolution method and its applications , 1988 .

[110]  A. Murat Tekalp,et al.  Robust color histogram descriptors for video segment retrieval and identification , 2002, IEEE Trans. Image Process..

[111]  Pierre Moulin,et al.  Design and statistical analysis of a hash-aided image watermarking system , 2004, IEEE Transactions on Image Processing.

[112]  Jessica J. Fridrich,et al.  Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.

[113]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[114]  Min Wu,et al.  A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing , 2007, 2007 IEEE/SP 14th Workshop on Statistical Signal Processing.

[115]  Raimondo Schettini,et al.  Color balancing of digital photos using simple image statistics , 2004, Pattern Recognit..

[116]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[117]  Kobus Barnard,et al.  COMPUTATIONAL COLOR CONSTANCY: TAKING THEORY INTO PRACTICE , 1995 .

[118]  Min Wu,et al.  Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.

[119]  D H Brainard,et al.  Analysis of the retinex theory of color vision. , 1986, Journal of the Optical Society of America. A, Optics and image science.

[120]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[121]  Sevinc Bayram,et al.  IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION , 2005 .

[122]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[123]  Miodrag Potkonjak,et al.  Computational forensic techniques for intellectual property protection , 2001, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[124]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[125]  Bernhard P. Wrobel,et al.  Multiple View Geometry in Computer Vision , 2001 .

[126]  Shoji Kawamura Capturing images with digital still cameras , 1998, IEEE Micro.

[127]  D. F. Mcgahn Copyright infringement of protected computer software: an analytical method to determine substantial similarity , 1995 .

[128]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[129]  Vishal Monga,et al.  Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[130]  H. Farid,et al.  Blind Removal of Image Non-Linearities , 2001, ICCV.

[131]  Brian A. Wandell,et al.  Preferred color spaces for white balancing , 2003, IS&T/SPIE Electronic Imaging.

[132]  David G. Stork,et al.  Pattern Classification , 1973 .

[133]  Hany Farid,et al.  Digital Image Ballistics from JPEG Quantization , 2006 .

[134]  Kannan Ramchandran,et al.  Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[135]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.