Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images

Powerful image editing software is nowadays capable of creating sophisticated and visually compelling fake photographs, thus posing serious issues to the trustworthiness of digital contents as a true representation of reality. Digital image forensics has emerged to help regain some trust in digital images by providing valuable aids in learning the history of an image. Unfortunately, in real scenarios, its application is limited, since multiple processing operators are likely to be applied, which alters the characteristic footprints exploited by current forensic tools. In this paper, we develop a novel forensic technique that is able to detect chains of operators applied to an image. In particular, we study the combination of Joint Photographic Experts Group compression and full-frame linear filtering, and derive an accurate mathematical framework to fully characterize the probabilistic distributions of the discrete cosine transform (DCT) coefficients of the quantized and filtered image. We then exploit such knowledge to define a set of features from the DCT distribution and build an effective classifier able to jointly disclose the quality factor of the applied compression and the filter kernel. Extensive experimental analysis illustrates the efficiency and versatility of the proposed approach, which effectively overcomes the state-of-the-art.

[1]  James F. O'Brien,et al.  Exposing photo manipulation with inconsistent reflections , 2012, TOGS.

[2]  Fernando Pérez-González,et al.  The optimal attack to histogram-based forensic detectors is simple(x) , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[3]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[4]  A. Piva An Overview on Image Forensics , 2013 .

[5]  Fernando Pérez-González,et al.  Joint detection of full-frame linear filtering and JPEG compression in digital images , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[7]  Nasir D. Memon,et al.  Digital Forensics , 2009, IEEE Secur. Priv..

[8]  Fernando Pérez-González,et al.  Forensic analysis of full-frame linearly filtered JPEG images , 2013, 2013 IEEE International Conference on Image Processing.

[9]  Rainer Böhme,et al.  Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.

[10]  Jiwu Huang,et al.  JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.

[11]  Hyun Wook Park,et al.  A rate control algorithm for DCT-based video coding using simple rate estimation and linear source model , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Alessandro Piva,et al.  Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[14]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[15]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[16]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[17]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[18]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[19]  Zhang Xiong,et al.  JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.

[20]  Alessandro Piva,et al.  Reverse engineering of double JPEG compression in the presence of image resizing , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[21]  Giulia Boato,et al.  Detecting photo manipulation on signs and billboards , 2010, 2010 IEEE International Conference on Image Processing.

[22]  Stefano Tubaro,et al.  Discriminating multiple JPEG compression using first digit features , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Sanjeeb Dash,et al.  JPEG compression history estimation for color images , 2003, IEEE Transactions on Image Processing.

[24]  Giulia Boato,et al.  Analysis of sensor fingerprint for source camera identification , 2011 .

[25]  Min Wu,et al.  Digital forensics [From the Guest Editors] , 2009 .