Counter JPEG Anti-Forensic Approach Based on the Second-Order Statistical Analysis

The forensic investigation of JPEG compression generally relies on the analysis of first-order statistics based on image histogram. The JPEG compression detection methods based on such methodology can be effortlessly circumvented by adopting some anti-forensic attacks. This paper presents a counter JPEG anti-forensic method by considering the second-order statistical analysis based on the co-occurrence matrices (CMs). The proposed framework comprises three stages: selection of the target difference image, evaluation of CMs, and generation of second-order statistical feature based on CMs. In the first stage, we explore the effects of dithering operation of JPEG anti-forensics by analyzing the variance inconsistencies along the diagonals. Afterward, CMs are evaluated in the second stage to highlight the effects of grainy noise introduced during the dithering operation. The third stage is devoted to generate an optimal second-order statistical feature which is fed to the SVM classifier. The experimental results based on the uncompressed color image database and BOSSBase dataset images demonstrated that the proposed forensic detector based on CM is very efficient even in the presence of anti-forensic attacks. Moreover, the experimental results also confirm the competency of the proposed method in counter median filtering and contrast enhancement anti-forensics. The proposed scheme also provides satisfactory results in detecting other image processing operations such as mean filtering, Gaussian filtering, Weiner filtering, scaling, and rotation, thereby revealing its multi-purpose nature.

[1]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[2]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[3]  Zhang Xiong,et al.  Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Hui Zeng,et al.  A Multi-purpose countermeasure against image anti-forensics using autoregressive model , 2016, Neurocomputing.

[5]  Stefano Tubaro,et al.  The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  Jiwu Huang,et al.  Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach , 2013, IEEE Transactions on Image Processing.

[7]  Fernando Pérez-González,et al.  Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[8]  Jiwu Huang,et al.  Identification of Various Image Operations Using Residual-Based Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Kulbir Singh,et al.  Improved JPEG anti-forensics with better image visual quality and forensic undetectability. , 2017, Forensic science international.

[10]  K. J. Ray Liu,et al.  Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Yun Q. Shi,et al.  Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.

[12]  Alessandro Piva,et al.  Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Stefano Tubaro,et al.  Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.

[14]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[15]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[16]  Francesco G. B. De Natale,et al.  Counter-forensics of median filtering , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[17]  Jiwu Huang,et al.  JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.

[18]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[19]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[20]  Stefano Tubaro,et al.  Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.

[21]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[22]  Sabu Emmanuel,et al.  ACE–An Effective Anti-forensic Contrast Enhancement Technique , 2016, IEEE Signal Processing Letters.

[23]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[24]  Jiwu Huang,et al.  Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.

[25]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[26]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[27]  Yun Q. Shi,et al.  Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns , 2014, IEEE Signal Processing Letters.

[28]  Zhang Xiong,et al.  A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[29]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[30]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[31]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[32]  K. J. Ray Liu,et al.  Anti-forensics of median filtering , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[33]  K. J. Ray Liu,et al.  Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.

[34]  Zhang Xiong,et al.  JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.

[35]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[36]  Yao Zhao,et al.  Attacking contrast enhancement forensics in digital images , 2013, Science China Information Sciences.

[37]  Rainer Böhme,et al.  Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.

[38]  Kulbir Singh,et al.  Forensics for partially double compressed doctored JPEG images , 2016, Multimedia Tools and Applications.

[39]  Fenlin Liu,et al.  Blind image steganalysis based on wavelet coefficient correlation , 2012, Digit. Investig..

[40]  Robert M. Haralick,et al.  Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..

[41]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[42]  Jessica J. Fridrich,et al.  Steganalysis of Content-Adaptive Steganography in Spatial Domain , 2011, Information Hiding.

[43]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..