Information theoretical limit of compression forensics

Multimedia forensics concerns on extracting forensic information from suspicious multimedia contents. This information was embedded into the content inadvertently whenever an operation happened. Investigators may estimate the possible operations by obtaining features from the multimedia content and applying detection algorithms based on the statistics. While most existing works focus on improving detection performance and finding what more we can do, understanding the fundamental limit on the forensic information that we can obtain from the extracted features is also important. It enables us to understand the limit of forensicability. In this paper, we explore the fundamental limit of forensicability by introducing an information theoretical framework for multimedia forensics. We use mutual information as the measure of forensic information conveyed by features to investigators. To show the analytical process, we take the case of multiple JPEG compression forensics as an example. We claim that, under typical circumstances, the maximum number of compressions that we can detect by examine DCT coefficients is up to 4, in an expected sense. In addition, we also find the patterns of compression quality factors that contain the most and least forensic information.

[1]  Jessica J. Fridrich,et al.  On detection of median filtering in digital images , 2010, Electronic Imaging.

[2]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[3]  Babak Mahdian,et al.  Detecting double compressed JPEG images , 2009, ICDP.

[4]  K. J. Ray Liu,et al.  Forensically determining the order of signal processing operations , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[5]  K. J. Ray Liu,et al.  Digital image source coder forensics via intrinsic fingerprints , 2009, IEEE Transactions on Information Forensics and Security.

[6]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[7]  Chiou-Ting Hsu,et al.  Detecting doubly compressed images based on quantization noise model and image restoration , 2009, 2009 IEEE International Workshop on Multimedia Signal Processing.

[8]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[9]  Mauro Barni,et al.  A fuzzy approach to deal with uncertainty in image forensics , 2012, Signal Process. Image Commun..

[10]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[11]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[12]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[13]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[14]  Min Wu,et al.  "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing , 2011, ACM Multimedia.

[15]  Joseph W. Goodman,et al.  A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..

[16]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[17]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[18]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[19]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[20]  K. J. Ray Liu,et al.  Forensic identification of compressively sensed images , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[21]  Stefano Tubaro,et al.  Discriminating multiple JPEG compressions using first digit features , 2012, APSIPA Transactions on Signal and Information Processing.

[22]  Min Wu,et al.  Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.

[23]  James F. O'Brien,et al.  Exposing photo manipulation with inconsistent shadows , 2013, TOGS.

[24]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[25]  Gwenaël J. Doërr,et al.  JPEG recompression detection , 2010, Electronic Imaging.