JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality

This paper proposes a JPEG anti-forensic method, which aims at removing from a given image the footprints left by JPEG compression, in both the spatial domain and DCT domain. With reasonable loss of image quality, the proposed method can defeat existing forensic detectors that attempt to identify traces of the image JPEG compression history or JPEG anti-forensic processing. In our framework, first because of a total variation-based deblocking operation, the partly recovered DCT information is thereafter used to build an adaptive local dithering signal model, which is able to bring the DCT histogram of the processed image close to that of the original one. Then, a perceptual DCT histogram smoothing is carried out by solving a simplified assignment problem, where the cost function is established as the total perceptual quality loss due to the DCT coefficient modification. The second-round deblocking and de-calibration operations successfully bring the image statistics that are used by the JPEG forensic detectors to the normal status. Experimental results show that the proposed method outperforms the state-of-the-art methods in a better tradeoff between the JPEG forensic undetectability and the visual quality of processed images. Moreover, the application of the proposed anti-forensic method in disguising double JPEG compression artifacts is proven to be feasible by experiments.

[1]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[2]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[3]  Alessandro Piva,et al.  Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[5]  Joseph W. Goodman,et al.  A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..

[6]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[7]  R. Stevenson,et al.  DCT quantization noise in compressed images , 2005 .

[8]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[9]  Christian Ullerich,et al.  Weaknesses of MB2 , 2007, IWDW.

[10]  L. Rudin,et al.  Nonlinear total variation based noise removal algorithms , 1992 .

[11]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[12]  Stefano Tubaro,et al.  Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.

[13]  K. J. Ray Liu,et al.  Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.

[14]  Jiwu Huang,et al.  JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.

[15]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[16]  Jiwu Huang,et al.  Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.

[17]  H. Farid A Survey of Image Forgery Detection , 2008 .

[18]  Yun Q. Shi,et al.  Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.

[19]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[20]  Stefano Tubaro,et al.  Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.

[21]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[22]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[23]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[24]  H. Kuhn The Hungarian method for the assignment problem , 1955 .

[25]  Rainer Böhme,et al.  Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.

[26]  Zhang Xiong,et al.  JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics , 2013, IH&MMSec '13.

[27]  King Ngi Ngan,et al.  Spatio-Temporal Just Noticeable Distortion Profile for Grey Scale Image/Video in DCT Domain , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[28]  Jacques Froment,et al.  Adapted Total Variation for Artifact Free Decompression of JPEG Images , 2005, Journal of Mathematical Imaging and Vision.

[29]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[30]  Mauro Barni,et al.  A universal technique to hide traces of histogram-based image manipulations , 2012, MM&Sec '12.

[31]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[32]  Stefano Tubaro,et al.  The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[33]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[34]  Fernando Pérez-González,et al.  Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[35]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[36]  Zhang Xiong,et al.  A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[37]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[38]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[39]  Majid Rabbani,et al.  Biased reconstruction for JPEG decoding , 1999, IEEE Signal Processing Letters.