Abstract
This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images. Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of forensic analyses. Counter-forensics is first defined in a formal decision-theoretic framework. This framework is then interpreted and extended to encompass the requirements to forensic analyses in practice, including a discussion of the notion of authenticity in the presence of legitimate processing, and the role of image models with regard to the epistemic underpinning of the forensic decision problem. A terminology is developed that distinguishes security from robustness properties, integrated from post-processing attacks, and targeted from universal attacks. This terminology is directly applied in a self-contained technical survey of counter-forensics against image forensics, notably techniques that suppress traces of image processing and techniques that synthesize traces of authenticity, including examples and brief evaluations. A discussion of relations to other domains of multimedia security and an overview of open research questions concludes the chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The Canon Hack Development Kit, for instance, allows to run virtually arbitrary image processing routines inside most modern Canon digital cameras, http://chdk.wikia.com/wiki/CHDK.
References
Barni M, Cancelli G, Esposito A (2010) Forensics aided steganalysis of heterogeneous images. In: IEEE international conference on acoustics, speech and signal processing, ICASSP 2010, 1690–1693 2010
Bishop CM (2006) Pattern recognition and machine learning. Springer, Berlin
Böhme R (2010) Advanced statistical steganalysis. Springer, Berlin
Böhme R, Freiling F, Gloe T, Kirchner M (2009) Multimedia forensics is not computer forensics. In: Geradts ZJ, Franke KY, Veenman CJ (eds) Computational forensics, 3rd international workshop, IWCF 2009. Lecture notes in computer science, vol 5718. Springer, Berlin, pp 90–103
Cachin C (1998) An information-theoretic model for steganography. In: Aucsmith D (ed) Information hiding, second international workshop, IH 98. Springer, Berlin, pp 306–318
Cao G, Zhao Y, Ni R, Tian H (2010) Anti-forensics of contrast enhancement in digital images. In: Proceedings of the 12th ACM workshop on multimedia and security MM&Sec ’10, pp 25–34. ACM Press, New York 2010
Cao G, Zhao Y, Ni R, Yu L, Tian H (2010) Forensic detection of median filtering in digital images. In: IEEE international conference on multimedia and EXPO, ICME 2010, pp 89–94. IEEE 2010
Chinese Academy of Sciences, Institute of Automation: Casia tampered image detection evaluation database (2009/2010). http://forensics.idealtest.org
Christlein V, Riess C, Angelopoulou E (2010) A study on features for the detection of copy-move forgeries. In: Freiling FC (ed) Sicherheit 2010, pp. 105–116. Gesellschaft für Informatik e.V., Bonn
Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography. Morgan Kaufmann, Burlington
Cromey DW (2010) Avoiding twisted pixels: ethical guidelines for the appropriate use and manipulation of scientific digital images. Sci Eng Ethics 16(4):639–667
Fan Z, Queiroz RL (2003) Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process 12(2):230–235
Fridrich J (2009) Digital image forensics. IEEE Signal Process Mag 26(2):26–37
Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, New York
Friedman G (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron 39(4):905–910
Gloe T, Borowka K, Winkler A (2009) Feature-based camera model identification works in practice: results of a comprehensive evaluation study. In: Katzenbeisser S, Sadeghi AR (eds) Information hiding, 11th international workshop, IH 2009. Lecture notes in computer science, vol 5806. Springer, Berlin, pp 262–276
Gloe T, Kirchner M, Winkler A, Böhme R (2007) Can we trust digital image forensics? In: Proceedings of the 15th international conference on multimedia, MULTIMEDIA ’07, pp 78–86. ACM Press, New York, NY, 2007
Goljan M, Fridrich J, Chen M (2010) Sensor noise camera identification: Countering counter-forensics. In: Memon ND, Dittmann J, Alattar AM, Delp EJ (eds) Media forensics and security II, Proceedings of SPIE, vol 7541, p 75410S. SPIE, Bellingham, WA, 2010
Hsu YF, Chang SF (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In: IEEE international conference on multimedia and EXPO, ICME 2006, pp. 549–552. IEEE 2006
Huang Y (2005) Can digital image forgery detection be unevadable? A case study: color filter array interpolation statistical feature recovery. In: Li S, Pereira F, Shum HY, Tescher AG (eds) Proceedings of SPIE: visual communications and image processing, vol SPIE 5960, p 59602W 2005
Johnson MK, Farid H (2007) Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensics Secur 2(3):450–461
Kalker T (2001) Considerations on watermarking security. In: IEEE fourth workshop on multimedia signal processing, pp 201–206
Kerckhoffs A (1883) La cryptographie militaire. J des Sci Militaires IX 5–38:161–191
Kirchner M, Böhme R (2007) Tamper hiding: defeating image forensics. In: Furon T, Cayre F, Doërr G, Bas P (eds) Information hiding, 9th international workshop, IH 2007, Lecture notes in computer science, vol 4567. Springer, Berlin, pp 326–341
Kirchner M, Böhme R (2008) Hiding traces of resampling in digital images. IEEE Trans Inf Forensics Secur 3(4):582–592
Kirchner M, Böhme R (2009) Synthesis of color filter array pattern in digital images. In: Delp EJ, Dittmann J, Memon ND, Wong PW (eds) Media forensics and security, Proceedings of SPIE, vol 7254, p 72540K. SPIE, Bellingham, WA 2009
Kirchner M, Fridrich J (2010) On detection of median filtering in digital images. In: Memon ND, Dittmann J, Alattar AM, Delp EJ (eds) Media forensics and security II, Proceedings of SPIE-IS&T electronic imaging, vol SPIE 7541, p 754110. San Jose, CA, USA 2010
Lai S, Böhme R (2011) Countering counter-forensics: the case of JPEG compression. In: Filler T, Pevný T, Craver S, Ker A (eds) Information Hiding, 13th International Conference, IH 2011, vol 6958. Springer, Berlin, pp 285–298
Lam EY, Goodman JW (2000) A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans Image Process 9(10):1661–1666
Li CT, Chang CY, Li Y (2010) On the repudiability of device identification and image integrity verification using sensor pattern noise. In: Weerasinghe D (ed) Information security and digital forensics, first international conference, ISDF 2009, Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, vol 41. Springer, Berlin, pp 19–25
Liew AWC, Yan H (2004) Blocking artifacts suppression in block-coded images using overcomplete wavelet representation. IEEE Trans Circ Syst Video Technology 14(4):450–461
Lukáš J, Fridrich J, Goljan M (2005) Detecting digital image forgeries using sensor pattern noise. In: Said A, Apostolopoulos JG, (eds) Proceedings of SPIE: image and video communications and processing 2005, vol 5685, pp 249–260
Lukáš J, Fridrich J, Goljan M (2006) Digital camera identification from sensor noise. IEEE Trans Inf Forensics Secur 1(2):205–214
Meerwald P, Uhl A (2009) Additive spread-spectrum watermark detection in demosaicked images. In: MM&Sec ’09, Proceedings of the multimedia and security workshop 2009, pp 25–32
Ng TT, Chang SF (2004) A data set of authentic and spliced image blocks. Tech Rep ADVENT 203-2004-3, Department of Electrical Engineering, Columbia University, USA
Parrish D, Noonan B (2008) Image manipulation as research misconduct. Sci Eng Ethics 15(2):161–167
Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http://dud.inf.tu-dresden.de/AnonTerminology.shtml 2010. (Version 0.34)
Popescu AC, Farid H (2004) Statistical tools for digital forensics. In: Fridrich J (ed) Information hiding, 6th international workshop, IH 2004. Lecture notes in computer science, vol 3200. Springer, Berlin, pp 128–147
Popescu AC, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948–3959
Sallee P (2005) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167–189
Stamm MC, Liu KJR (2008) Blind forensics of contrast enhancement in digital images. In: IEEE international conference on image processing, ICIP 2008, pp 3112–3115
Stamm MC, Liu KJR (2010) Wavelet-based image compression anti-forensics. In: IEEE international conference on image processing, ICIP 2010
Stamm MC, Tjoa SK, Lin WS, Liu KJR (2010) Anti-forensics of JPEG compression. In: IEEE international conference on acoustics, speech and signal processing, ICASSP 2010, pp 1694–1697
Stamm MC, Tjoa SK, Lin WS, Liu KJR (2010) Undetectable image tampering through JPEG compression anti-forensics. In: IEEE international conference on image processing, ICIP 2010
Steinebach M, Liu H, Fan P, Katzenbeisser S Cell phone camera ballistics: attacks and countermeasures. In: Creutzburg R, Akopian D (eds) Multimedia on mobile devices 2010, Proceedings of SPIE, vol 7542, p 75420B. SPIE, Bellingham, WA (2010)
Steinebach M, Ouariachi ME, Liu H, Katzenbeisser S (2009) On the reliability of cell phone camera fingerprint recognition. In: Goel S (ed) Digital forensics and cyber crime, first international ICST conference, ICDF2C 2009. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, vol 31. Springer, Berlin, pp 69–76
Thèvenaz P, Blu T, Unser M (2000) Image interpolation and resampling. In: Handbook of medical imaging, pp 393–420. Academic Press, Orlando, FL 2000
Ullerich C, Westfeld A (2008) Weaknesses of MB2. In: Shi YQ, Kim HJ, Katzenbeisser S (eds) Digital watermarking (Proceedings of IWDW 2007). Lecture notes in computer science, vol 5041. Springer-Verlag, Berlin, Heidelberg, pp 127–142
Valenzise G, Tagliasacchi M, Tubaro S (2011) The cost of JPEG compression anti-forensics. In: IEEE international conference on acoustics, speech and signal processing, ICASSP 2011, pp. 1884–1887. IEEE
Valenzise G, Nobile V, Tagliasacchi M, Tubaro S Countering JPEG anti-forensics. In: IEEE international conference on image processing, ICIP 2011. IEEE (in press)
Yuan HD (2011) Blind forensics of median filtering in digital images. IEEE Trans Inf Forensics Secur 6(4):1335–1345
Zhai G, Zhang W, Yang X, Lin W, Xu Y (2008) Efficient image deblocking based on postfiltering in shifted windows. IEEE Trans Circ Syst Video Tech 18(1):122–126
Acknowledgments
Thanks are due to Gang Cao, Thomas Gloe, and Miroslav Goljan for sharing the data of their original research papers.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Böhme, R., Kirchner, M. (2013). Counter-Forensics: Attacking Image Forensics. In: Sencar, H., Memon, N. (eds) Digital Image Forensics. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0757-7_12
Download citation
DOI: https://doi.org/10.1007/978-1-4614-0757-7_12
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-0756-0
Online ISBN: 978-1-4614-0757-7
eBook Packages: EngineeringEngineering (R0)