Digital Image Authentication From JPEG Headers

It is often desirable to determine if an image has been modified in any way from its original recording. The JPEG format affords engineers many implementation trade-offs which give rise to widely varying JPEG headers. We exploit these variations for image authentication. A camera signature is extracted from a JPEG image consisting of information about quantization tables, Huffman codes, thumbnails, and exchangeable image file format (EXIF). We show that this signature is highly distinct across 1.3 million images spanning 773 different cameras and cell phones. Specifically, 62% of images have a signature that is unique to a single camera, 80% of images have a signature that is shared by three or fewer cameras, and 99% of images have a signature that is unique to a single manufacturer. The signature of Adobe Photoshop is also shown to be unique relative to all 773 cameras. These signatures are simple to extract and offer an efficient method to establish the authenticity of a digital image.

[1]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[2]  Hany Farid Digital Image Ballistics from JPEG Quantization: A Followup Study , 2008 .

[3]  Yuting Su,et al.  Detection of Double-Compression in JPEG2000 Images , 2008, 2008 Second International Symposium on Intelligent Information Technology Application.

[4]  H. Farid A Survey of Image Forgery Detection , 2008 .

[5]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[6]  Christian Riess,et al.  Scene Illumination as an Indicator of Image Manipulation , 2010, Information Hiding.

[7]  Sevinc Bayram,et al.  A SURVEY OF COPY-MOVE FORGERY DETECTION TECHNIQUES , 2008 .

[8]  Hany Farid,et al.  Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.

[9]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[10]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Jessica J. Fridrich,et al.  Managing a large database of camera fingerprints , 2010, Electronic Imaging.

[12]  Matthias Kirchner Efficient estimation of CFA pattern configuration in digital camera images , 2010, Electronic Imaging.

[13]  Jiwu Huang,et al.  A convolutive mixing model for shifted double JPEG compression with application to passive image authentication , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[14]  Hany Farid,et al.  Digital Image Ballistics from JPEG Quantization , 2006 .

[15]  Tom E. Bishop,et al.  Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[16]  Matthias Kirchner,et al.  On resampling detection in re-compressed images , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[17]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[18]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[19]  Jessica J. Fridrich,et al.  Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.

[20]  Babak Mahdian,et al.  Detecting double compressed JPEG images , 2009, ICDP.

[21]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1991, CACM.

[22]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[23]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .

[24]  Xiaochun Cao,et al.  Detecting photographic composites using shadows , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[25]  Hany Farid,et al.  Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[26]  Hany Farid,et al.  Digital image authentication from thumbnails , 2010, Electronic Imaging.

[27]  Paul Alvarez,et al.  Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis , 2004, Int. J. Digit. EVid..

[28]  Thomas Gloe,et al.  Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics , 2010, Electronic Imaging.

[29]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[30]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[31]  Jesse D. Kornblum Using JPEG quantization tables to identify imagery processed by software , 2008, Digit. Investig..

[32]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[33]  Nasir D. Memon,et al.  Efficient techniques for sensor fingerprint matching in large image and video databases , 2010, Electronic Imaging.

[34]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[35]  Matthew Sorell Conditions for effective detection and identification of primary quantization of re-quantized JPEG images , 2008, e-Forensics '08.