Improved anti-forensics of JPEG compression

The comblike histogram of DCT coefficients on each subband and the blocking artifacts among adjacent blocks are the two main fingerprints of the image that was once compressed by JPEG. Stamm and Liu proposed an anti-forensics method for removing these fingerprints by dithering the DCT coefficients and adding noise into the pixels. However, some defects emerge inside the anti-forensically processed images. First, the noise distributions are abnormal in the resulting images; and second, the quality of the processed image is poor compared with the original image. To fill these gaps, this paper proposes an improved anti-forensics method for JPEG compression. After analyzing the noise distribution, we propose a denoising algorithm to remove the grainy noise caused by image dithering, and a deblocking algorithm to combat Fan and Queiroz's forensics method against blocking artifacts. With the proposed anti-forensics method, fingerprints of the comblike histograms and the blocking artifacts are removed, noise distribution abnormality is avoided, and the quality of the processed image is improved.

[1]  J. Fridrich,et al.  Digital image forensics , 2009, IEEE Signal Processing Magazine.

[2]  Yao Zhao,et al.  Anti-forensics of contrast enhancement in digital images , 2010, MM&Sec '10.

[3]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[4]  K. J. Ray Liu,et al.  Wavelet-based image compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.

[5]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[6]  Chin-Chen Chang,et al.  Adaptive watermark mechanism for rightful ownership protection , 2008, J. Syst. Softw..

[7]  Shang-Juh Kao,et al.  A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..

[8]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[9]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[10]  K. J. Ray Liu,et al.  Blind forensics of contrast enhancement in digital images , 2008, 2008 15th IEEE International Conference on Image Processing.

[11]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[12]  Stefano Tubaro,et al.  Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.

[13]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[14]  Rainer Böhme,et al.  Synthesis of color filter array pattern in digital images , 2009, Electronic Imaging.

[15]  Hany Farid,et al.  Exposing Digital Forgeries Through Specular Highlights on the Eye , 2007, Information Hiding.

[16]  Rainer Böhme,et al.  Tamper Hiding: Defeating Image Forensics , 2007, Information Hiding.

[17]  Rainer Böhme,et al.  Can we trust digital image forensics? , 2007, ACM Multimedia.

[18]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[19]  Claudio Soriente,et al.  Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..

[20]  K. J. Ray Liu,et al.  Forensics vs. anti-forensics: A decision and game theoretic framework , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[21]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[22]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[23]  K. J. Ray Liu,et al.  Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.

[24]  Mauro Barni,et al.  A universal technique to hide traces of histogram-based image manipulations , 2012, MM&Sec '12.