Robust Median Filtering Forensics Using Image Deblocking and Filtered Residual Fusion

Median filtering (MF) is frequently applied to conceal the traces of forgery and therefore can provide indirect forensic evidence of tampering when investigating composite images. The existing MF forensic methods, however, ignore how JPEG compression affects median filtered images, resulting in heavy performance degradation when detecting filtered images stored in the JPEG format. In this paper, we propose a new robust MF forensic method based on a modified convolutional neural network (CNN). First, relying on the analysis of the influence on median filtered images caused by JPEG compression, we effectively suppress the interference using image deblocking. Second, the fingerprints left by MF are highlighted via filtered residual fusion. These two functions are fulfilled with a deblocking layer and a fused filtered residual (FFR) layer. Finally, the output of the FFR layer becomes input when extracting multiple features for further classification using a tailor-made CNN. The extensive experimental results show that the proposed method outperforms the state-of-the-art methods in both JPEG compressed and small-sized MF image detection.

[1]  Jessica J. Fridrich,et al.  On detection of median filtering in digital images , 2010, Electronic Imaging.

[2]  Shaziya .P.S. Khan,et al.  Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .

[3]  Jiwu Huang,et al.  Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach , 2013, IEEE Transactions on Image Processing.

[4]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.

[5]  Belhassen Bayar,et al.  Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[6]  Jiwu Huang,et al.  JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.

[7]  Hai-Dong Yuan,et al.  Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.

[8]  James F. O'Brien,et al.  Exposing Photo Manipulation from Shading and Shadows , 2014, ACM Trans. Graph..

[9]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[10]  Jiwu Huang,et al.  Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization , 2017, IEEE Transactions on Information Forensics and Security.

[11]  Wen Gao,et al.  Reducing Image Compression Artifacts by Structural Sparse Representation and Quantization Constraint Prior , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Jiwu Huang,et al.  Detecting median filtering via two-dimensional AR models of multiple filtered residuals , 2018, Multimedia Tools and Applications.

[13]  K. J. Ray Liu,et al.  Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.

[14]  Deqing Sun,et al.  Postprocessing of Low Bit-Rate Block DCT Coded Images Based on a Fields of Experts Prior , 2007, IEEE Transactions on Image Processing.

[15]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[16]  Fusheng Yang,et al.  A forensic algorithm against median filtering based on coefficients of image blocks in frequency domain , 2018, Multimedia Tools and Applications.

[17]  Anderson Rocha,et al.  Illuminant-Based Transformed Spaces for Image Forensics , 2016, IEEE Transactions on Information Forensics and Security.

[18]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[19]  Jiwu Huang,et al.  Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.

[20]  Marc Chaumont,et al.  Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.

[21]  Bernhard E. Boser,et al.  A training algorithm for optimal margin classifiers , 1992, COLT '92.

[22]  Z. Jane Wang,et al.  Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.

[23]  Paolo Bestagini,et al.  First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.

[24]  Ming Xu,et al.  Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network , 2018, IEEE Access.

[25]  Seop Hyeong Park,et al.  Theory of projection onto the narrow quantization constraint set and its application , 1999, IEEE Trans. Image Process..

[26]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[27]  Yao Zhao,et al.  Forensic detection of median filtering in digital images , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[28]  Geoffrey E. Hinton,et al.  Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.

[29]  Hany Farid,et al.  Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[30]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[31]  A. Venetsanopoulos,et al.  Order statistics in digital image processing , 1992, Proc. IEEE.

[32]  Trevor Darrell,et al.  Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.

[33]  Jie Ren,et al.  Image Blocking Artifacts Reduction via Patch Clustering and Low-Rank Minimization , 2013, 2013 Data Compression Conference.

[34]  Yao Zhao,et al.  Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.

[35]  Jie Ren,et al.  Patch-based image deblocking using geodesic distance weighted low-rank approximation , 2014, 2014 IEEE Visual Communications and Image Processing Conference.

[36]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[37]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[38]  Mauro Barni,et al.  Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics , 2015, IEEE Signal Processing Letters.

[39]  James F. O'Brien,et al.  Exposing photo manipulation with inconsistent shadows , 2013, TOGS.

[40]  Jing Dong,et al.  Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.

[41]  Yao Zhao,et al.  Robust median filtering detection based on local difference descriptor , 2017, Signal Process. Image Commun..

[42]  Yun Q. Shi,et al.  Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns , 2014, IEEE Signal Processing Letters.

[43]  Mingwei Lin,et al.  SOMDNCD: Image Change Detection Based on Self-Organizing Maps and Deep Neural Networks , 2018, IEEE Access.

[44]  Wen Gao,et al.  CONCOLOR: Constrained Non-Convex Low-Rank Model for Image Deblocking , 2016, IEEE Transactions on Image Processing.

[45]  Xiao Jin,et al.  AMFNet: An Adversarial Network for Median Filtering Detection , 2018, IEEE Access.

[46]  Ronggang Huang,et al.  Robust contrast enhancement forensics based on convolutional neural networks , 2019, Signal Process. Image Commun..

[47]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[48]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[49]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[50]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[51]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[52]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[53]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .

[54]  Lawrence D. Jackel,et al.  Handwritten Digit Recognition with a Back-Propagation Network , 1989, NIPS.

[55]  Bin Li,et al.  Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.