DETECTABLE TAMPERING OF JPEG ANTI-FORENSICS Gamal Fahmy Electrical Engineering

Many forensic techniques recently tried to detect the tampering and manipulation of JPEG compressed images that became a critical problem in image authentication and origin tracking. Some techniques indicated that a knowledgeable attacker can make it very hard to trace the image origin, while others indicated that portions of the compressed image that has been compressed at different quality factor quantization matrices are distinguishable if they are recompressed at a higher quality factor quantization matrix (with less quantization steps). In this paper, we pursue the idea of recompressing forensically suspect-able images with different compression parameters. We use different quantization matrix sizes that would indicate a DCT projection at different frequencies (horizontally, vertically, and diagonally), and would make it easier to track any tampering or hacking footprints. We show that a JPEG compressed image can make these footprints distinguishable if recompressed with a smaller size quantization matrix. Illustrative examples are presented.

[1]  C.-C. Jay Kuo,et al.  Texture analysis and classification with tree-structured wavelet transform , 1993, IEEE Trans. Image Process..

[2]  Sanjit K. Mitra,et al.  Subband DCT: definition, analysis, and applications , 1996, IEEE Trans. Circuits Syst. Video Technol..

[3]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[4]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[5]  Thierry Blu,et al.  The SURE-LET Approach to Image Denoising , 2007, IEEE Transactions on Image Processing.

[6]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[7]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[8]  K. J. Ray Liu,et al.  Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.

[9]  Stefano Tubaro,et al.  Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.

[10]  Stefano Tubaro,et al.  The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).