Skip to main content

Statistical Tools for Digital Forensics

  • Conference paper
Book cover Information Hiding (IH 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3200))

Included in the following conference series:

Abstract

A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longer hold the unique stature as a definitive recording of events. We describe several statistical techniques for detecting traces of digital tampering in the absence of any digital watermark or signature. In particular, we quantify statistical correlations that result from specific forms of digital tampering, and devise detection schemes to reveal these correlations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Digital compression and coding of continuous-tone still images, Part 1: Requirements and guidelines. ISO/IEC JTC1 Draft International Standard 10918-1 (1991)

    Google Scholar 

  2. Bhattacharjee, S., Kutter, M.: Compression-tolerant image authentication. In: IEEE International Conference on Image Processing (1998)

    Google Scholar 

  3. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2002)

    Google Scholar 

  4. Craver, S.A., Wu, M., Liu, B., Stubblefield, A., Swartzlander, B., Wallach, D.S.: Reading between the lines: Lessons from the SDMI challenge. In: 10th USENIX Security Symposium (2001)

    Google Scholar 

  5. Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum lilelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society 99(1), 1–38 (1977)

    MathSciNet  Google Scholar 

  6. Farid, H.: Blind inverse gamma correction. IEEE Transactions on Image Processing 10(10), 1428–1433 (2001)

    Article  MATH  Google Scholar 

  7. Farid, H., Popescu, A.C.: Blind removal of lens distortions. Journal of the Optical Society of America 18(9), 2072–2078 (2001)

    Article  Google Scholar 

  8. Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: IEEE International Conference on Image Processing (1999)

    Google Scholar 

  9. Fridrich, J., Goljan, M., Du., M.: Invertible authentication. In: SPIE, Security and Watermarking of Multimedia Contents (2001)

    Google Scholar 

  10. Friedman, G.L.: The trustworthy camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics 39(4), 905–910 (1993)

    Article  Google Scholar 

  11. Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. U.S. Patent Application, Docket No. 77102/E-D (1999)

    Google Scholar 

  12. Katzenbeisser, S., Petitcolas, F.A.P.: Information Techniques for Steganography and Digital Watermarking. Artec House, Norwood (2000)

    Google Scholar 

  13. Kim, Y.C., Powers, E.J.: Digital bispectral analysis and its applications to nonlinear wave interactions. IEEE Transactions of Plasma Science PS7(2) (1979)

    Google Scholar 

  14. Kundur, D., Hatzinakos, D.: Digital watermarking for tell-tale tamper proofing and authentication. Proceedings of the IEEE 87(7), 1167–1180 (1999)

    Article  Google Scholar 

  15. Lin, C.-Y., Chang, S.-F.: A robust image authentication algorithm surviving JPEG lossy compression. In: SPIE Storage and Retrieval of Image/Video Databases (1998)

    Google Scholar 

  16. Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of image alterations using semi-fragile watermarks. In: SPIE International Conference on Security and Watermarking of Multimedia Contents II (2000)

    Google Scholar 

  17. Lukas, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Digital Forensic Research Workshop, Cleveland, Ohio (August 2003)

    Google Scholar 

  18. Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)

    Article  Google Scholar 

  19. Matzner, R.: An SNR estimation algorithm for complex baseband signals using higher order statistics. Facta Universitatis (Nis) 6(1), 41–52 (1993)

    Google Scholar 

  20. Mendel, J.M.: Tutorial on higher-order statistics (spectra) in signal processing and system theory: Theoretical results and some applications. Proceedings of the IEEE 79(3), 278–305 (1991)

    Article  Google Scholar 

  21. Oppenheim, V., Schafer, R.W.: Discrete-Time Signal Processing. Prentice Hall, Englewood Cliffs (1989)

    MATH  Google Scholar 

  22. Pauluzzi, D.R., Beaulieu, N.C.: A comparison of SNR estimation techniques for the AWGN channel. IEEE Transactions on Communications 48(10), 1681–1691 (2000)

    Article  Google Scholar 

  23. Rey, C., Dugelay, J.-L.: Blind detection of malicious alterations on still images using robust watermarks. In: IEE Seminar: Secure Images and Image Authentication (2000)

    Google Scholar 

  24. Schneider, M., Chang, S.-F.: A robust content-based digital signature for image authentication. In: IEEE International Conference on Image Processing (1996)

    Google Scholar 

  25. Storck, D.: A new approach to integrity of digital images. In: IFIP Conference on Mobile Communication, pp. 309–316 (1996)

    Google Scholar 

  26. Wallace, G.K.: The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics 34(4), 30–44 (1991)

    Google Scholar 

  27. Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: IEEE International Conference on Image Processing (1997)

    Google Scholar 

  28. Yu, G.-J., Lu, C.-S., Liao, H.-Y.M., Sheu, J.-P.: Mean quantization blind watermarking for image authentication. In: IEEE International Conference on Image Processing (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Popescu, A.C., Farid, H. (2004). Statistical Tools for Digital Forensics. In: Fridrich, J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30114-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30114-1_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24207-9

  • Online ISBN: 978-3-540-30114-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics