A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection

Graphics editing programs of the last generation provide ever more powerful tools, which allow for the retouching of digital images leaving little or no traces of tampering. The reliable detection of image forgeries requires, therefore, a battery of complementary tools that exploit different image properties. Techniques based on the photo-response non-uniformity (PRNU) noise are among the most valuable such tools, since they do not detect the inserted object but rather the absence of the camera PRNU, a sort of camera fingerprint, dealing successfully with forgeries that elude most other detection strategies. In this paper, we propose a new approach to detect image forgeries using sensor pattern noise. Casting the problem in terms of Bayesian estimation, we use a suitable Markov random field prior to model the strong spatial dependences of the source, and take decisions jointly on the whole image rather than individually for each pixel. Modern convex optimization techniques are then adopted to achieve a globally optimal solution and the PRNU estimation is improved by resorting to nonlocal denoising. Large-scale experiments on simulated and real forgeries show that the proposed technique largely improves upon the current state of the art, and that it can be applied with success to a wide range of practical situations.

[1]  Antonin Chambolle,et al.  A First-Order Primal-Dual Algorithm for Convex Problems with Applications to Imaging , 2011, Journal of Mathematical Imaging and Vision.

[2]  Y.-L. Chen,et al.  Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.

[3]  Dianji Lv,et al.  An Overview of Digital Watermarking in Image Forensics , 2011, 2011 Fourth International Joint Conference on Computational Sciences and Optimization.

[4]  Nelly Pustelnik,et al.  Epigraphical Projection and Proximal Tools for Solving Constrained Convex Optimization Problems: Part I , 2012, ArXiv.

[5]  Chuheng Tang,et al.  Overview of digital watermarking , 2014 .

[6]  Davide Cozzolino,et al.  Guided filtering for PRNU-based localization of small-size image forgeries , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[7]  Heung-Kyu Lee,et al.  Source camera identification from significant noise residual regions , 2010, 2010 IEEE International Conference on Image Processing.

[8]  C. D. Gelatt,et al.  Optimization by Simulated Annealing , 1983, Science.

[9]  L. Verdoliva,et al.  PRNU-based detection of small-size image forgeries , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).

[10]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Chang-Tsun Li,et al.  Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Luisa Verdoliva,et al.  PRNU-based forgery detection with regularity constraints and global optimization , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[13]  Olga Veksler,et al.  Fast approximate energy minimization via graph cuts , 2001, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[14]  Micah K. Johnson,et al.  Metric Measurements on a Plane from a Single Image , 2006 .

[15]  Miroslav Goljan,et al.  Digital Camera Identification from Images - Estimating False Acceptance Probability , 2008, IWDW.

[16]  Mila Nikolova,et al.  Algorithms for Finding Global Minimizers of Image Segmentation and Denoising Models , 2006, SIAM J. Appl. Math..

[17]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[18]  Hagit Hel-Or,et al.  Digital Image Forgery Detection Based on Lens and Sensor Aberration , 2011, International Journal of Computer Vision.

[19]  Chang-Tsun Li,et al.  Fast camera fingerprint search algorithm for source camera identification , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.

[20]  Giuseppe Scarpa,et al.  A tree-structured Markov random field model for Bayesian image segmentation , 2003, IEEE Trans. Image Process..

[21]  Koduvayur P. Subbalakshmi,et al.  An Overview of Digital Watermarking , 2006 .

[22]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[23]  Daniel Cremers,et al.  Global Solutions of Variational Models with Convex Regularization , 2010, SIAM J. Imaging Sci..

[24]  Jessica J. Fridrich,et al.  Managing a large database of camera fingerprints , 2010, Electronic Imaging.

[25]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[26]  Alessandro Foi,et al.  Image Denoising by Sparse 3-D Transform-Domain Collaborative Filtering , 2007, IEEE Transactions on Image Processing.

[27]  Chi-Keung Tang,et al.  Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..

[28]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[29]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[30]  Donald Geman,et al.  Stochastic Relaxation, Gibbs Distributions, and the Bayesian Restoration of Images , 1984, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[31]  Luisa Verdoliva,et al.  On the influence of denoising in PRNU based forgery detection , 2010, MiFor '10.

[32]  Glenn Healey,et al.  Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..

[33]  Xiaochun Cao,et al.  Identifying Image Composites Through Shadow Matte Consistency , 2011, IEEE Transactions on Information Forensics and Security.

[34]  Matthias Kirchner,et al.  Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study , 2012, MM&Sec '12.

[35]  Yu Chen A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS , 2012 .

[36]  Giovanni Maria Farinella,et al.  Robust Image Alignment for Tampering Detection , 2012, IEEE Transactions on Information Forensics and Security.

[37]  Nasir D. Memon,et al.  Efficient Sensor Fingerprint Matching Through Fingerprint Binarization , 2012, IEEE Transactions on Information Forensics and Security.

[38]  J. Besag On the Statistical Analysis of Dirty Pictures , 1986 .

[39]  Nelly Pustelnik,et al.  Epigraphical splitting for solving constrained convex formulations of inverse problems with proximal tools , 2012, 1210.5844.

[40]  Laurent Condat,et al.  A Primal–Dual Splitting Method for Convex Optimization Involving Lipschitzian, Proximable and Linear Composite Terms , 2012, Journal of Optimization Theory and Applications.

[41]  Patrick L. Combettes,et al.  Proximal Splitting Methods in Signal Processing , 2009, Fixed-Point Algorithms for Inverse Problems in Science and Engineering.

[42]  Alex ChiChung Kot,et al.  Accurate Detection of Demosaicing Regularity for Digital Image Forensics , 2009, IEEE Transactions on Information Forensics and Security.

[43]  Alessandro Piva,et al.  Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[44]  W. Freeman,et al.  Generalized Belief Propagation , 2000, NIPS.

[45]  Luisa Verdoliva,et al.  A Nonlocal SAR Image Denoising Algorithm Based on LLMMSE Wavelet Shrinkage , 2012, IEEE Transactions on Geoscience and Remote Sensing.

[46]  Chang-Tsun Li Source camera identification using enhanced sensor pattern noise , 2010, IEEE Trans. Inf. Forensics Secur..

[47]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[48]  Chang-Tsun Li,et al.  Empirical investigation into the correlation between vignetting effect and the quality of sensor pattern noise , 2012 .

[49]  Jean-Michel Morel,et al.  A Review of Image Denoising Algorithms, with a New One , 2005, Multiscale Model. Simul..

[50]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[51]  Jiwu Huang,et al.  Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise , 2012, IEEE Transactions on Information Forensics and Security.

[52]  Hongbin Zhang,et al.  Exposing Digital Image Forgeries by Using Canonical Correlation Analysis , 2010, 2010 20th International Conference on Pattern Recognition.

[53]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[54]  Jessica J. Fridrich,et al.  Sensor-fingerprint based identification of images corrected for lens distortion , 2012, Other Conferences.

[55]  Pravin Kakar,et al.  Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.

[56]  P. L. Combettes,et al.  Primal-Dual Splitting Algorithm for Solving Inclusions with Mixtures of Composite, Lipschitzian, and Parallel-Sum Type Monotone Operators , 2011, Set-Valued and Variational Analysis.

[57]  Christian Riess,et al.  Automated Image Forgery Detection through Classification of JPEG Ghosts , 2012, DAGM/OAGM Symposium.

[58]  Xiaochun Cao,et al.  Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map , 2012, IEEE Transactions on Information Forensics and Security.

[59]  Bang Công Vu,et al.  A splitting algorithm for dual monotone inclusions involving cocoercive operators , 2011, Advances in Computational Mathematics.

[60]  Davide Cozzolino,et al.  A novel framework for image forgery localization , 2013, ArXiv.

[61]  Stan Z. Li,et al.  Markov Random Field Modeling in Image Analysis , 2001, Computer Science Workbench.

[62]  Jessica Fridrich,et al.  Sensor Defects in Digital Image Forensic , 2013 .

[63]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.