A second look at first significant digit histogram restoration

We analyze a class of first significant digit (FSD) histogram restoration techniques designed to cover up traces of previous JPEG compressions under a minimum cost constraint. We argue that such minimal distortion mappings introduce strong artifacts to the distribution of DCT coefficients, which become particularly prevalent in the domain of second significant digits (SSDs). Empirical findings from large image databases give insight into SSD distributions of DCT coefficients of natural images and demonstrate how images that underwent FSD histogram restoration deviate from natural images.

[1]  Giulia Boato,et al.  JPEG compression anti-forensics based on first significant digit distribution , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[2]  Fernando Pérez-González,et al.  The optimal attack to histogram-based forensic detectors is simple(x) , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[3]  Jiwu Huang,et al.  Estimating JPEG compression history of bitmaps based on factor histogram , 2015, Digit. Signal Process..

[4]  Rainer Böhme,et al.  Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.

[5]  Rainer Böhme,et al.  Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.

[6]  Bin Li,et al.  Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[7]  Zhang Xiong,et al.  A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[8]  Mauro Barni,et al.  The Source Identification Game: An Information-Theoretic Perspective , 2013, IEEE Transactions on Information Forensics and Security.

[9]  Giulia Boato,et al.  RAISE: a raw images dataset for digital image forensics , 2015, MMSys.

[10]  Stefano Tubaro,et al.  Antiforensics attacks to Benford's law for the detection of double compressed images , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[11]  Arno Berger,et al.  A basic theory of Benford's Law ∗ , 2011 .

[12]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[13]  Fernando Pérez-González,et al.  BENFORD ’ S LAW IN IMAGE PROCESSING , 2007 .

[14]  Stefano Tubaro,et al.  Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.

[15]  Fernando Pérez-González,et al.  Coping with the enemy: Advances in adversary-aware signal processing , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[16]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[17]  Fernando Pérez-González,et al.  Benford's Lawin Image Processing , 2007, 2007 IEEE International Conference on Image Processing.

[18]  Stefano Tubaro,et al.  Discriminating multiple JPEG compression using first digit features , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[19]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[20]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[21]  Fernando Pérez-González,et al.  Transportation-theoretic image counterforensics to First Significant Digit histogram forensics , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[22]  Fernando Pérez-González,et al.  Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[23]  P. Diaconis The Distribution of Leading Digits and Uniform Distribution Mod 1 , 1977 .