A survey of passive technology for digital image forensics

Over the past years, digital images have been widely used in the Internet and other applications. Whilst image processing techniques are developing at a rapid speed, tampering with digital images without leaving any obvious traces becomes easier and easier. This may give rise to some problems such as image authentication. A new passive technology for image forensics has evolved quickly during the last few years. Unlike the signature-based or watermark-based methods, the new technology does not need any signature generated or watermark embedded in advance. It assumes that different imaging devices or processing would introduce different inherent patterns into the output images. These underlying patterns are consistent in the original untampered images and would be altered after some kind of manipulations. Thus, they can be used as evidence for image source identification and alteration detection. In this paper, we will discuss this new forensics technology and give an overview of the prior literatures. Some concluding remarks are made about the state of the art and the challenges in this novel technology.

[1]  Stephen Lin,et al.  Determining the radiometric response function from a single grayscale image , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[2]  Kevin E. Spaulding,et al.  Color processing in digital cameras , 1998, IEEE Micro.

[3]  Shih-Fu Chang,et al.  An online system for classifying computer graphics images from natural photographs , 2006, Electronic Imaging.

[4]  Shree K. Nayar,et al.  What is the space of camera response functions? , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..

[5]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[6]  Guillermo Sapiro,et al.  Image inpainting , 2000, SIGGRAPH.

[7]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[8]  Steven A. Shafer,et al.  What is the center of the image? , 1993, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.

[9]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[10]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .

[11]  Siwei Lyu,et al.  Natural image statistics in digital image forensics , 2008 .

[12]  Nasir D. Memon,et al.  Digital Image Forensics for Identifying Computer Generated and Digital Camera Images , 2006, 2006 International Conference on Image Processing.

[13]  Sanjeeb Dash,et al.  JPEG compression history estimation for color images , 2003, IEEE Transactions on Image Processing.

[14]  Shih-Fu Chang,et al.  A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[15]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[16]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[17]  M. Levoy,et al.  Texture synthesis by fixed neighborhood searching , 2001 .

[18]  Min Wu,et al.  Image Tampering Identification using Blind Deconvolution , 2006, 2006 International Conference on Image Processing.

[19]  Shih-Fu Chang,et al.  Blind Detection of Digital Photomontage using Higher Order Statistics , 2004 .

[20]  Hany Farid,et al.  Exposing digital forgeries in scientific images , 2006, MM&Sec '06.

[21]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[22]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[23]  Nasir D. Memon,et al.  Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[24]  Gerald C. Holst,et al.  CCD arrays, cameras, and displays , 1996 .

[25]  Hany Farid,et al.  Digital Image Ballistics from JPEG Quantization , 2006 .

[26]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[27]  Luo Wei,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .

[28]  Hany Farid,et al.  Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.

[29]  Hany Farid,et al.  Detecting Digital Forgeries Using Bispectral Analysis , 1999 .

[30]  Hany Farid,et al.  Blind inverse gamma correction , 2001, IEEE Trans. Image Process..

[31]  Shih-Fu Chang,et al.  Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.

[32]  Shih-Fu Chang,et al.  Columbia Photographic Images and Photorealistic Computer Graphics Dataset , 2005 .

[33]  Hany Farid,et al.  Digital doctoring: how to tell the real from the fake , 2006 .

[34]  Mahalingam Ramkumar,et al.  A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[35]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.

[36]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[37]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[38]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[39]  Shih-Fu Chang,et al.  Camera Response Function Estimation from a Single-channel Image Using Differential Invariants , 2006 .

[40]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[41]  Shih-Fu Chang,et al.  A Data Set of Authentic and Spliced Image Blocks , 2004 .

[42]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[43]  K.J.R. Liu,et al.  Component Forensics of Digital Cameras: A Non-Intrusive Approach , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[44]  Jr. James E. Adams,et al.  Interactions between color plane interpolation and other image processing functions in electronic photography , 1995, Electronic Imaging.

[45]  Ricardo L. de Queiroz,et al.  Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[46]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[47]  Wei Su,et al.  Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.

[48]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[49]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[50]  Min Wu,et al.  Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[51]  Jan Lukás,et al.  Digital "bullet scratches" for images , 2005, IEEE International Conference on Image Processing 2005.

[52]  H. Farid A picture tells a thousand lies , 2003 .

[53]  Nasir D. Memon,et al.  Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.

[54]  Richard G. Baraniuk,et al.  Compression color space estimation of JPEG images using lattice basis reduction , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[55]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[56]  Patrick Pérez,et al.  Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.

[57]  H. Farid Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act , 2004 .

[58]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[59]  Siwei Lyu,et al.  A digital technique for art authentication , 2004, Proc. Natl. Acad. Sci. USA.

[60]  Siwei Lyu,et al.  Wavelet Analysis for Authentication 1 , .

[61]  Zeno Geradts,et al.  Methods for identification of images acquired with digital cameras , 2001, SPIE Optics East.

[62]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[63]  Shih-Fu Chang,et al.  Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[64]  Kenji Kurosawa,et al.  CCD fingerprint method-identification of a video camera from videotaped images , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[65]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[66]  Micah K. Johnson,et al.  Metric Measurements on a Plane from a Single Image , 2006 .

[67]  Jan Lukás,et al.  Determining digital image origin using sensor imperfections , 2005, IS&T/SPIE Electronic Imaging.

[68]  Jiwu Huang,et al.  A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.