Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients

Here we propose a unique anti-forensics method using the approximation of DCT coefficients for security analysis of forensics schemes that are dependent on the distortions produced by JPEG compression to detect forgery. Approximation process first builds a model of the AC component of DCT coefficients. Then it uses that model to restore the values of the DCT coefficients. The beauty of the proposed anti-forensics technique is that one can specify any distortion measure and it is capable of minimizing that distortion as long as the specified distortion is produced by JPEG compression or the distortion is measurable in the DCT domain. We specifically mount our anti-forensics technique on three leading JPEG compression detection schemes (Fan and de Queiroz, IEEE Trans Image Process 12(2):230–235, 2003; Lai and Böhme 2011) to highlight their weaknesses. Though these schemes are based on three different distortions metrics, still we could achieve 100%$100\%$ missed detection rate for JPEG images having quality factor more than equal to 60%$60\%$. Our analysis raises a serious question regarding the robustness and security of JPEG artifact based forgery detection schemes.

[1]  Rainer Böhme,et al.  Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.

[2]  H. Farid A Survey of Image Forgery Detection , 2008 .

[3]  Subhamoy Maitra,et al.  Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme , 2005, IEEE Transactions on Signal Processing.

[4]  Mauro Barni,et al.  Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics , 2015, IEEE Signal Processing Letters.

[5]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[6]  David S. Rosenblum,et al.  From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.

[7]  Zhang Xiong,et al.  A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[8]  Subhamoy Maitra,et al.  Cryptanalysis of correlation-based watermarking schemes using single watermarked copy , 2004, IEEE Signal Processing Letters.

[9]  D. Brillinger,et al.  Handbook of methods of applied statistics , 1967 .

[10]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[11]  Yun Q. Shi,et al.  Anti-Forensics of Double JPEG Compression Detection , 2011, IWDW.

[12]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[13]  Kim-Kwang Raymond Choo,et al.  A novel audio forensic data-set for digital multimedia forensics , 2018 .

[14]  Alessandro Piva,et al.  Reliability assessment of principal point estimates for forensic applications , 2017, J. Vis. Commun. Image Represent..

[15]  Stefano Tubaro,et al.  Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.

[16]  Zhang Xiong,et al.  JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.

[17]  Luming Zhang,et al.  Fortune Teller: Predicting Your Career Path , 2016, AAAI.

[18]  Joseph W. Goodman,et al.  A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..

[19]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[20]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[21]  Jiwu Huang,et al.  JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.

[22]  Yu Zheng,et al.  Urban Water Quality Prediction Based on Multi-Task Multi-View Learning , 2016, IJCAI.

[23]  Muhammad Khurram Khan,et al.  Digital multimedia audio forensics: past, present and future , 2016, Multimedia Tools and Applications.

[24]  Luming Zhang,et al.  Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.

[25]  Hongbin Zha,et al.  Tracking Generic Human Motion via Fusion of Low- and High-Dimensional Approaches , 2013, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[26]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[27]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.