Detectability-quality trade-off in JPEG counter-forensics

Removing JPEG quantization footprints from an image inevitably introduces artifacts and traces in the spatial domain. Recently, several robust methods have been proposed to detect footprints of counter-forensics and recover the image's compression history. In this paper we investigate the limitations of these detectors, by proposing an improved counter-forensic attack which adds a postprocessing denoising step besides dithering. We consider both a general-purpose denoising algorithm and one targeted to JPEG images. In the latter case, we show that this approach can successfully reduce the accuracy of detectors in the literature to that of a random decision. As a second contribution, we study the trade-off between the detectability of counter-forensics and quality of the tampered image, and show that the loss of quality is not sufficient for the analyst to use available no-reference quality assessment tools as an indicator of an attack.

[1]  Rainer Böhme,et al.  Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.

[2]  Zhang Xiong,et al.  A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[3]  Zhang Xiong,et al.  JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics , 2013, IH&MMSec '13.

[4]  K. J. Ray Liu,et al.  Concealability-rate-distortion tradeoff in image compression anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[5]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Mauro Barni,et al.  Counter-forensics of SIFT-based copy-move detection by means of keypoint classification , 2013, EURASIP J. Image Video Process..

[7]  Stefano Tubaro,et al.  Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.

[8]  Pier Luigi Dragotti,et al.  An investigation into aliasing in images recaptured from an LCD monitor using a digital camera , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[9]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[10]  Stefano Tubaro,et al.  The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[11]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[12]  L. Rudin,et al.  Nonlinear total variation based noise removal algorithms , 1992 .

[13]  Stefan Winkler,et al.  A no-reference perceptual blur metric , 2002, Proceedings. International Conference on Image Processing.

[14]  Aria Nosratinia,et al.  Enhancement of JPEG-Compressed Images by Re-application of JPEG , 2001, J. VLSI Signal Process..

[15]  Stefano Tubaro,et al.  Antiforensics attacks to Benford's law for the detection of double compressed images , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[16]  Giulia Boato,et al.  JPEG compression anti-forensics based on first significant digit distribution , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[17]  Rainer Böhme,et al.  Can we trust digital image forensics? , 2007, ACM Multimedia.

[18]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[19]  Patricia Ladret,et al.  The blur effect: perception and estimation with a new no-reference perceptual blur metric , 2007, Electronic Imaging.

[20]  Mauro Barni,et al.  A universal technique to hide traces of histogram-based image manipulations , 2012, MM&Sec '12.

[21]  Rainer Böhme,et al.  Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.

[22]  Jiwu Huang,et al.  Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.

[23]  Mauro Barni,et al.  The Source Identification Game: An Information-Theoretic Perspective , 2013, IEEE Transactions on Information Forensics and Security.

[24]  Stefano Tubaro,et al.  Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.

[25]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[26]  Hany Farid,et al.  Digital Image Ballistics from JPEG Quantization , 2006 .

[27]  K. J. Ray Liu,et al.  Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.

[28]  Brendt Wohlberg,et al.  Efficient Minimization Method for a Generalized Total Variation Functional , 2009, IEEE Transactions on Image Processing.

[29]  Mauro Barni,et al.  Hiding traces of median filtering in digital images , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[30]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[31]  Paolo Bestagini,et al.  Attacking image classification based on bag-of-visual-words , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[32]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[33]  Fernando Pérez-González,et al.  Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.