Skip to main content

Counter-Forensics: Attacking Image Forensics

  • Chapter
  • First Online:
Digital Image Forensics

Abstract

This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images. Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of forensic analyses. Counter-forensics is first defined in a formal decision-theoretic framework. This framework is then interpreted and extended to encompass the requirements to forensic analyses in practice, including a discussion of the notion of authenticity in the presence of legitimate processing, and the role of image models with regard to the epistemic underpinning of the forensic decision problem. A terminology is developed that distinguishes security from robustness properties, integrated from post-processing attacks, and targeted from universal attacks. This terminology is directly applied in a self-contained technical survey of counter-forensics against image forensics, notably techniques that suppress traces of image processing and techniques that synthesize traces of authenticity, including examples and brief evaluations. A discussion of relations to other domains of multimedia security and an overview of open research questions concludes the chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The Canon Hack Development Kit, for instance, allows to run virtually arbitrary image processing routines inside most modern Canon digital cameras, http://chdk.wikia.com/wiki/CHDK.

References

  1. Barni M, Cancelli G, Esposito A (2010) Forensics aided steganalysis of heterogeneous images. In: IEEE international conference on acoustics, speech and signal processing, ICASSP 2010, 1690–1693 2010

    Google Scholar 

  2. Bishop CM (2006) Pattern recognition and machine learning. Springer, Berlin

    MATH  Google Scholar 

  3. Böhme R (2010) Advanced statistical steganalysis. Springer, Berlin

    Book  MATH  Google Scholar 

  4. Böhme R, Freiling F, Gloe T, Kirchner M (2009) Multimedia forensics is not computer forensics. In: Geradts ZJ, Franke KY, Veenman CJ (eds) Computational forensics, 3rd international workshop, IWCF 2009. Lecture notes in computer science, vol 5718. Springer, Berlin, pp 90–103

    Google Scholar 

  5. Cachin C (1998) An information-theoretic model for steganography. In: Aucsmith D (ed) Information hiding, second international workshop, IH 98. Springer, Berlin, pp 306–318

    Google Scholar 

  6. Cao G, Zhao Y, Ni R, Tian H (2010) Anti-forensics of contrast enhancement in digital images. In: Proceedings of the 12th ACM workshop on multimedia and security MM&Sec ’10, pp 25–34. ACM Press, New York 2010

    Google Scholar 

  7. Cao G, Zhao Y, Ni R, Yu L, Tian H (2010) Forensic detection of median filtering in digital images. In: IEEE international conference on multimedia and EXPO, ICME 2010, pp 89–94. IEEE 2010

    Google Scholar 

  8. Chinese Academy of Sciences, Institute of Automation: Casia tampered image detection evaluation database (2009/2010). http://forensics.idealtest.org

  9. Christlein V, Riess C, Angelopoulou E (2010) A study on features for the detection of copy-move forgeries. In: Freiling FC (ed) Sicherheit 2010, pp. 105–116. Gesellschaft für Informatik e.V., Bonn

    Google Scholar 

  10. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography. Morgan Kaufmann, Burlington

    Google Scholar 

  11. Cromey DW (2010) Avoiding twisted pixels: ethical guidelines for the appropriate use and manipulation of scientific digital images. Sci Eng Ethics 16(4):639–667

    Article  Google Scholar 

  12. Fan Z, Queiroz RL (2003) Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process 12(2):230–235

    Article  Google Scholar 

  13. Fridrich J (2009) Digital image forensics. IEEE Signal Process Mag 26(2):26–37

    Article  Google Scholar 

  14. Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, New York

    Google Scholar 

  15. Friedman G (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron 39(4):905–910

    Article  Google Scholar 

  16. Gloe T, Borowka K, Winkler A (2009) Feature-based camera model identification works in practice: results of a comprehensive evaluation study. In: Katzenbeisser S, Sadeghi AR (eds) Information hiding, 11th international workshop, IH 2009. Lecture notes in computer science, vol 5806. Springer, Berlin, pp 262–276

    Google Scholar 

  17. Gloe T, Kirchner M, Winkler A, Böhme R (2007) Can we trust digital image forensics? In: Proceedings of the 15th international conference on multimedia, MULTIMEDIA ’07, pp 78–86. ACM Press, New York, NY, 2007

    Google Scholar 

  18. Goljan M, Fridrich J, Chen M (2010) Sensor noise camera identification: Countering counter-forensics. In: Memon ND, Dittmann J, Alattar AM, Delp EJ (eds) Media forensics and security II, Proceedings of SPIE, vol 7541, p 75410S. SPIE, Bellingham, WA, 2010

    Google Scholar 

  19. Hsu YF, Chang SF (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In: IEEE international conference on multimedia and EXPO, ICME 2006, pp. 549–552. IEEE 2006

    Google Scholar 

  20. Huang Y (2005) Can digital image forgery detection be unevadable? A case study: color filter array interpolation statistical feature recovery. In: Li S, Pereira F, Shum HY, Tescher AG (eds) Proceedings of SPIE: visual communications and image processing, vol SPIE 5960, p 59602W 2005

    Google Scholar 

  21. Johnson MK, Farid H (2007) Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensics Secur 2(3):450–461

    Article  Google Scholar 

  22. Kalker T (2001) Considerations on watermarking security. In: IEEE fourth workshop on multimedia signal processing, pp 201–206

    Google Scholar 

  23. Kerckhoffs A (1883) La cryptographie militaire. J des Sci Militaires IX 5–38:161–191

    Google Scholar 

  24. Kirchner M, Böhme R (2007) Tamper hiding: defeating image forensics. In: Furon T, Cayre F, Doërr G, Bas P (eds) Information hiding, 9th international workshop, IH 2007, Lecture notes in computer science, vol 4567. Springer, Berlin, pp 326–341

    Google Scholar 

  25. Kirchner M, Böhme R (2008) Hiding traces of resampling in digital images. IEEE Trans Inf Forensics Secur 3(4):582–592

    Article  Google Scholar 

  26. Kirchner M, Böhme R (2009) Synthesis of color filter array pattern in digital images. In: Delp EJ, Dittmann J, Memon ND, Wong PW (eds) Media forensics and security, Proceedings of SPIE, vol 7254, p 72540K. SPIE, Bellingham, WA 2009

    Google Scholar 

  27. Kirchner M, Fridrich J (2010) On detection of median filtering in digital images. In: Memon ND, Dittmann J, Alattar AM, Delp EJ (eds) Media forensics and security II, Proceedings of SPIE-IS&T electronic imaging, vol SPIE 7541, p 754110. San Jose, CA, USA 2010

    Google Scholar 

  28. Lai S, Böhme R (2011) Countering counter-forensics: the case of JPEG compression. In: Filler T, Pevný T, Craver S, Ker A (eds) Information Hiding, 13th International Conference, IH 2011, vol 6958. Springer, Berlin, pp 285–298

    Google Scholar 

  29. Lam EY, Goodman JW (2000) A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans Image Process 9(10):1661–1666

    Article  MATH  Google Scholar 

  30. Li CT, Chang CY, Li Y (2010) On the repudiability of device identification and image integrity verification using sensor pattern noise. In: Weerasinghe D (ed) Information security and digital forensics, first international conference, ISDF 2009, Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, vol 41. Springer, Berlin, pp 19–25

    Google Scholar 

  31. Liew AWC, Yan H (2004) Blocking artifacts suppression in block-coded images using overcomplete wavelet representation. IEEE Trans Circ Syst Video Technology 14(4):450–461

    Article  Google Scholar 

  32. Lukáš J, Fridrich J, Goljan M (2005) Detecting digital image forgeries using sensor pattern noise. In: Said A, Apostolopoulos JG, (eds) Proceedings of SPIE: image and video communications and processing 2005, vol 5685, pp 249–260

    Google Scholar 

  33. Lukáš J, Fridrich J, Goljan M (2006) Digital camera identification from sensor noise. IEEE Trans Inf Forensics Secur 1(2):205–214

    Google Scholar 

  34. Meerwald P, Uhl A (2009) Additive spread-spectrum watermark detection in demosaicked images. In: MM&Sec ’09, Proceedings of the multimedia and security workshop 2009, pp 25–32

    Google Scholar 

  35. Ng TT, Chang SF (2004) A data set of authentic and spliced image blocks. Tech Rep ADVENT 203-2004-3, Department of Electrical Engineering, Columbia University, USA

    Google Scholar 

  36. Parrish D, Noonan B (2008) Image manipulation as research misconduct. Sci Eng Ethics 15(2):161–167

    Article  Google Scholar 

  37. Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http://dud.inf.tu-dresden.de/AnonTerminology.shtml 2010. (Version 0.34)

  38. Popescu AC, Farid H (2004) Statistical tools for digital forensics. In: Fridrich J (ed) Information hiding, 6th international workshop, IH 2004. Lecture notes in computer science, vol 3200. Springer, Berlin, pp 128–147

    Google Scholar 

  39. Popescu AC, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948–3959

    Article  MathSciNet  Google Scholar 

  40. Sallee P (2005) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167–189

    Article  Google Scholar 

  41. Stamm MC, Liu KJR (2008) Blind forensics of contrast enhancement in digital images. In: IEEE international conference on image processing, ICIP 2008, pp 3112–3115

    Google Scholar 

  42. Stamm MC, Liu KJR (2010) Wavelet-based image compression anti-forensics. In: IEEE international conference on image processing, ICIP 2010

    Google Scholar 

  43. Stamm MC, Tjoa SK, Lin WS, Liu KJR (2010) Anti-forensics of JPEG compression. In: IEEE international conference on acoustics, speech and signal processing, ICASSP 2010, pp 1694–1697

    Google Scholar 

  44. Stamm MC, Tjoa SK, Lin WS, Liu KJR (2010) Undetectable image tampering through JPEG compression anti-forensics. In: IEEE international conference on image processing, ICIP 2010

    Google Scholar 

  45. Steinebach M, Liu H, Fan P, Katzenbeisser S Cell phone camera ballistics: attacks and countermeasures. In: Creutzburg R, Akopian D (eds) Multimedia on mobile devices 2010, Proceedings of SPIE, vol 7542, p 75420B. SPIE, Bellingham, WA (2010)

    Google Scholar 

  46. Steinebach M, Ouariachi ME, Liu H, Katzenbeisser S (2009) On the reliability of cell phone camera fingerprint recognition. In: Goel S (ed) Digital forensics and cyber crime, first international ICST conference, ICDF2C 2009. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, vol 31. Springer, Berlin, pp 69–76

    Google Scholar 

  47. Thèvenaz P, Blu T, Unser M (2000) Image interpolation and resampling. In: Handbook of medical imaging, pp 393–420. Academic Press, Orlando, FL 2000

    Google Scholar 

  48. Ullerich C, Westfeld A (2008) Weaknesses of MB2. In: Shi YQ, Kim HJ, Katzenbeisser S (eds) Digital watermarking (Proceedings of IWDW 2007). Lecture notes in computer science, vol 5041. Springer-Verlag, Berlin, Heidelberg, pp 127–142

    Google Scholar 

  49. Valenzise G, Tagliasacchi M, Tubaro S (2011) The cost of JPEG compression anti-forensics. In: IEEE international conference on acoustics, speech and signal processing, ICASSP 2011, pp. 1884–1887. IEEE

    Google Scholar 

  50. Valenzise G, Nobile V, Tagliasacchi M, Tubaro S Countering JPEG anti-forensics. In: IEEE international conference on image processing, ICIP 2011. IEEE (in press)

    Google Scholar 

  51. Yuan HD (2011) Blind forensics of median filtering in digital images. IEEE Trans Inf Forensics Secur 6(4):1335–1345

    Article  Google Scholar 

  52. Zhai G, Zhang W, Yang X, Lin W, Xu Y (2008) Efficient image deblocking based on postfiltering in shifted windows. IEEE Trans Circ Syst Video Tech 18(1):122–126

    Article  Google Scholar 

Download references

Acknowledgments

Thanks are due to Gang Cao, Thomas Gloe, and Miroslav Goljan for sharing the data of their original research papers.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rainer Böhme .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Böhme, R., Kirchner, M. (2013). Counter-Forensics: Attacking Image Forensics. In: Sencar, H., Memon, N. (eds) Digital Image Forensics. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0757-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-0757-7_12

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-0756-0

  • Online ISBN: 978-1-4614-0757-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics