Camera Trace Erasing

Camera trace is a unique noise produced in digital imaging process. Most existing forensic methods analyze camera trace to identify image origins. In this paper, we address a new low-level vision problem, camera trace erasing, to reveal the weakness of trace-based forensic methods. A comprehensive investigation on existing anti-forensic methods reveals that it is non-trivial to effectively erase camera trace while avoiding the destruction of content signal. To reconcile these two demands, we propose Siamese Trace Erasing (SiamTE), in which a novel hybrid loss is designed on the basis of Siamese architecture for network training. Specifically, we propose embedded similarity, truncated fidelity, and cross identity to form the hybrid loss. Compared with existing anti-forensic methods, SiamTE has a clear advantage for camera trace erasing, which is demonstrated in three representative tasks.

[1]  Jian Yang,et al.  MemNet: A Persistent Memory Network for Image Restoration , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[2]  Yunjin Chen,et al.  Trainable Nonlinear Reaction Diffusion: A Flexible Framework for Fast and Effective Image Restoration , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  Miroslav Goljan,et al.  Digital Camera Identification from Images - Estimating False Acceptance Probability , 2008, IWDW.

[4]  Zhiwei Xiong,et al.  Deep Boosting for Image Denoising , 2018, ECCV.

[5]  Farbod Razzazi,et al.  A dictionary based approach to JPEG anti-forensics , 2016, 2016 IEEE 8th International Conference on Intelligent Systems (IS).

[6]  Vladimir Iglovikov,et al.  Camera Model Identification Using Convolutional Neural Networks , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[7]  David Zhang,et al.  A Trilateral Weighted Sparse Coding Scheme for Real-World Image Denoising , 2018, ECCV.

[8]  Davide Cozzolino,et al.  Noiseprint: A CNN-Based Camera Model Fingerprint , 2018, IEEE Transactions on Information Forensics and Security.

[9]  Stefan Roth,et al.  Neural Nearest Neighbors Networks , 2018, NeurIPS.

[10]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Lei Zhang,et al.  Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising , 2016, IEEE Transactions on Image Processing.

[12]  Larry S. Davis,et al.  Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[13]  K. J. Ray Liu,et al.  Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.

[14]  Brian Kulis,et al.  Metric Learning: A Survey , 2013, Found. Trends Mach. Learn..

[15]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[16]  Zhiwei Xiong,et al.  Real-World Image Denoising with Deep Boosting , 2020, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  Jessica J. Fridrich,et al.  Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.

[18]  Alessandro Foi,et al.  Image Denoising by Sparse 3-D Transform-Domain Collaborative Filtering , 2007, IEEE Transactions on Image Processing.

[19]  Z. Jane Wang,et al.  Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.

[20]  Samy Bengio,et al.  Adversarial Machine Learning at Scale , 2016, ICLR.

[21]  Yann LeCun,et al.  Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[22]  Alan C. Bovik,et al.  Making a “Completely Blind” Image Quality Analyzer , 2013, IEEE Signal Processing Letters.

[23]  Rainer Böhme,et al.  Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.

[24]  Stefan Roth,et al.  Benchmarking Denoising Algorithms with Real Photographs , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[25]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[26]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[27]  Heung-Kyu Lee,et al.  Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks , 2018, IEEE Signal Processing Letters.

[28]  Patrick D. McDaniel,et al.  Making machine learning robust against adversarial inputs , 2018, Commun. ACM.

[29]  Luisa Verdoliva,et al.  Analysis of Adversarial Attacks against CNN-based Image Forgery Detectors , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[30]  Sergei Vassilvitskii,et al.  k-means++: the advantages of careful seeding , 2007, SODA '07.

[31]  John C. Russ Forensic Uses of Digital Imaging , 2001 .

[32]  Xiaoming Liu,et al.  Face De-Spoofing: Anti-Spoofing via Noise Modeling , 2018, ECCV.

[33]  Florian Jug,et al.  Noise2Void - Learning Denoising From Single Noisy Images , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[34]  Premkumar Natarajan,et al.  ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[35]  Zhenxing Qian,et al.  Improved anti-forensics of JPEG compression , 2014, J. Syst. Softw..

[36]  Xing Zhang,et al.  Exposing Region Splicing Forgeries with Blind Local Noise Estimation , 2013, International Journal of Computer Vision.

[37]  Qihe Liu,et al.  Review of Artificial Intelligence Adversarial Attack and Defense Technologies , 2019, Applied Sciences.

[38]  Yasuyuki Matsushita,et al.  A Holistic Approach to Cross-Channel Image Noise Modeling and Its Application to Image Denoising , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[39]  Gerald C. Holst,et al.  CCD arrays, cameras, and displays , 1996 .

[40]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[41]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[42]  Luca Antiga,et al.  Automatic differentiation in PyTorch , 2017 .

[43]  Marco Fontani,et al.  VISION: a video and image dataset for source identification , 2017, EURASIP Journal on Information Security.

[44]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[45]  Hai-Dong Yuan,et al.  Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.

[46]  Qiong Zhang,et al.  Anti-Forensics of JPEG Compression Using Generative Adversarial Networks , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[47]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[48]  Stephen Lin,et al.  A High-Quality Denoising Dataset for Smartphone Cameras , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[49]  Alan C. Bovik,et al.  Streaking in median filtered images , 1987, IEEE Trans. Acoust. Speech Signal Process..

[50]  Zhang Xiong,et al.  A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[51]  Ying Zhang,et al.  A survey on image tampering and its detection in real-world photos , 2019, J. Vis. Commun. Image Represent..

[52]  Larry S. Davis,et al.  Two-Stream Neural Networks for Tampered Face Detection , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).