Blind Verification of Digital Image Originality: A Statistical Approach

Many methods for verifying the integrity of digital images employ various fingerprints associated with acquisition devices. Data on an acquisition device and fingerprints are extracted from an image and confronted with a reference data set that includes all possible fingerprints of the acquisition device. This allows us to draw a conclusion whether the digital image has been modified or not. Thus it is critical to have a sufficiently large, reliable, and true reference data set, otherwise critical miscalculations can arise. Reference data sets are extracted from image data sets that in turn are collected from unknown and nonguaranteed environments (mostly from the Internet). Since often software modifications leave no obvious traces in the image file (e.g., in metadata), it is not easy to recognize original images, from which fingerprints of acquisition devices can be extracted to form true reference data sets. This is the problem addressed in this paper. Given a database consisting of “unguaranteed” images, we introduce a statistical approach for assessing image originality by using the image file's header information (e.g., JPEG compression parameters). First a general framework is introduced. Then the framework is applied to several fingerprint types selected for image integrity verification.

[1]  Babak Mahdian,et al.  Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .

[2]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[3]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[4]  J. Fridrich,et al.  Digital image forensics , 2009, IEEE Signal Processing Magazine.

[5]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[6]  Jessica J. Fridrich,et al.  Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.

[7]  Nasir D. Memon,et al.  New Features to Identify Computer Generated Images , 2007, 2007 IEEE International Conference on Image Processing.

[8]  J. Fridrich,et al.  Detection of double-compression for applications in steganography , 2007 .

[9]  Jesse D. Kornblum Using JPEG quantization tables to identify imagery processed by software , 2008, Digit. Investig..

[10]  D. M. Hutton,et al.  Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia , 2005 .

[11]  Nasir D. Memon,et al.  Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[12]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[13]  Bülent Sankur,et al.  Blind Identification of Source Cell-Phone Model , 2008, IEEE Transactions on Information Forensics and Security.

[14]  K. J. Ray Liu,et al.  Component forensics , 2009, IEEE Signal Processing Magazine.

[15]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[16]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[17]  Yizhen Huang,et al.  Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[18]  Tian-Tsong Ng,et al.  Camera response function signature for digital forensics - Part I: Theory and data selection , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[19]  Nasir D. Memon,et al.  Classification of digital camera-models based on demosaicing artifacts , 2008, Digit. Investig..

[20]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[21]  Jiwu Huang,et al.  A convolutive mixing model for shifted double JPEG compression with application to passive image authentication , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[22]  Babak Mahdian,et al.  A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..

[23]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[24]  Babak Mahdian,et al.  Detecting double compressed JPEG images , 2009, ICDP.

[25]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[26]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[27]  Hany Farid,et al.  Digital image authentication from thumbnails , 2010, Electronic Imaging.

[28]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[29]  Nasir D. Memon,et al.  Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.

[30]  Kannan Ramchandran,et al.  Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[31]  Shih-Fu Chang,et al.  An online system for classifying computer graphics images from natural photographs , 2006, Electronic Imaging.

[32]  Hany Farid,et al.  Digital Image Ballistics from JPEG Quantization , 2006 .

[33]  Wen-Hsiang Tsai,et al.  A new technique for authentication of image/video for multimedia applications , 2001, MM&Sec '01.

[34]  Nasir D. Memon,et al.  Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust , 2008, IEEE Transactions on Information Forensics and Security.