Countering Universal Image Tampering Detection with Histogram Restoration

In this paper, we point out state-of-the-art algorithm in natural image splicing detection, namely the transition probability matrix feature proposed by Shi, et al., can be attacked by modifying block discrete cosine transform (BDCT) coefficients without significantly degrading quality of the spliced image. BDCT coefficients of the spliced image are modified so that its distance to a close authentic image in feature space is minimized. The minimization is accomplished with a greedy algorithm. The modification makes the spliced image statistically similar to the authentic image so as to reduce the effectiveness of detection algorithm. The performance of the algorithm is evaluated on Columbia Image Splicing Detection Evaluation Dataset. With the proposed anti-forensics post processing, detection accuracy and true positive rate reduces to 69.4% and 62.5% respectively, while the processed images still maintain average peak signal-to-noise ratio (PSNR) at 42.22db.

[1]  Rainer Böhme,et al.  Synthesis of color filter array pattern in digital images , 2009, Electronic Imaging.

[2]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[3]  Yun Q. Shi,et al.  A natural image model approach to splicing detection , 2007, MM&Sec.

[4]  Rainer Böhme,et al.  Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.

[5]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[6]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[7]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[8]  Yao Zhao,et al.  Anti-forensics of contrast enhancement in digital images , 2010, MM&Sec '10.

[9]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[10]  Wei Su,et al.  Steganalysis Versus Splicing Detection , 2008, IWDW.

[11]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[12]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[13]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[14]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .