Improved JPEG anti-forensics with better image visual quality and forensic undetectability.

There is an immediate need to validate the authenticity of digital images due to the availability of powerful image processing tools that can easily manipulate the digital image information without leaving any traces. The digital image forensics most often employs the tampering detectors based on JPEG compression. Therefore, to evaluate the competency of the JPEG forensic detectors, an anti-forensic technique is required. In this paper, two improved JPEG anti-forensic techniques are proposed to remove the blocking artifacts left by the JPEG compression in both spatial and DCT domain. In the proposed framework, the grainy noise left by the perceptual histogram smoothing in DCT domain can be reduced significantly by applying the proposed de-noising operation. Two types of denoising algorithms are proposed, one is based on the constrained minimization problem of total variation of energy and other on the normalized weighted function. Subsequently, an improved TV based deblocking operation is proposed to eliminate the blocking artifacts in the spatial domain. Then, a decalibration operation is applied to bring the processed image statistics back to its standard position. The experimental results show that the proposed anti-forensic approaches outperform the existing state-of-the-art techniques in achieving enhanced tradeoff between image visual quality and forensic undetectability, but with high computational cost.

[1]  Zhang Xiong,et al.  A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[2]  Stefano Tubaro,et al.  Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.

[3]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[4]  K. J. Ray Liu,et al.  Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.

[5]  Zhang Xiong,et al.  JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.

[6]  Christian Ullerich,et al.  Weaknesses of MB2 , 2007, IWDW.

[7]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[8]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[9]  Giulia Boato,et al.  JPEG compression anti-forensics based on first significant digit distribution , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[10]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[11]  Sung Yong Shin,et al.  On pixel-based texture synthesis by non-parametric sampling , 2006, Comput. Graph..

[12]  M. Nikolova An Algorithm for Total Variation Minimization and Applications , 2004 .

[13]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[14]  Alessandro Piva,et al.  Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Zhenxing Qian,et al.  Improved anti-forensics of JPEG compression , 2014, J. Syst. Softw..

[16]  Fernando Pérez-González,et al.  Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[17]  Jiwu Huang,et al.  Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.

[18]  Yun Q. Shi,et al.  Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.

[19]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[20]  Stefano Tubaro,et al.  Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.

[21]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[22]  Rainer Böhme,et al.  Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.

[23]  Di Xiao,et al.  An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules , 2014, Multimedia Tools and Applications.

[24]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[25]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[26]  Stefano Tubaro,et al.  The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[27]  Junbin Fang,et al.  An improved parameter estimation scheme for image modification detection based on DCT coefficient analysis. , 2016, Forensic science international.

[28]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[29]  Na Fan,et al.  Digital image modification detection using color information and its histograms. , 2016, Forensic science international.

[30]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[31]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[32]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[33]  Mauro Barni,et al.  Universal Counterforensics of Multiple Compressed JPEG Images , 2014, IWDW.

[34]  Jiwu Huang,et al.  JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.

[35]  Jacques Froment,et al.  Adapted Total Variation for Artifact Free Decompression of JPEG Images , 2005, Journal of Mathematical Imaging and Vision.

[36]  Kulbir Singh,et al.  Forensics for partially double compressed doctored JPEG images , 2016, Multimedia Tools and Applications.