Abstract
A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longer hold the unique stature as a definitive recording of events. We describe several statistical techniques for detecting traces of digital tampering in the absence of any digital watermark or signature. In particular, we quantify statistical correlations that result from specific forms of digital tampering, and devise detection schemes to reveal these correlations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Digital compression and coding of continuous-tone still images, Part 1: Requirements and guidelines. ISO/IEC JTC1 Draft International Standard 10918-1 (1991)
Bhattacharjee, S., Kutter, M.: Compression-tolerant image authentication. In: IEEE International Conference on Image Processing (1998)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2002)
Craver, S.A., Wu, M., Liu, B., Stubblefield, A., Swartzlander, B., Wallach, D.S.: Reading between the lines: Lessons from the SDMI challenge. In: 10th USENIX Security Symposium (2001)
Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum lilelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society 99(1), 1–38 (1977)
Farid, H.: Blind inverse gamma correction. IEEE Transactions on Image Processing 10(10), 1428–1433 (2001)
Farid, H., Popescu, A.C.: Blind removal of lens distortions. Journal of the Optical Society of America 18(9), 2072–2078 (2001)
Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: IEEE International Conference on Image Processing (1999)
Fridrich, J., Goljan, M., Du., M.: Invertible authentication. In: SPIE, Security and Watermarking of Multimedia Contents (2001)
Friedman, G.L.: The trustworthy camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics 39(4), 905–910 (1993)
Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. U.S. Patent Application, Docket No. 77102/E-D (1999)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Techniques for Steganography and Digital Watermarking. Artec House, Norwood (2000)
Kim, Y.C., Powers, E.J.: Digital bispectral analysis and its applications to nonlinear wave interactions. IEEE Transactions of Plasma Science PS7(2) (1979)
Kundur, D., Hatzinakos, D.: Digital watermarking for tell-tale tamper proofing and authentication. Proceedings of the IEEE 87(7), 1167–1180 (1999)
Lin, C.-Y., Chang, S.-F.: A robust image authentication algorithm surviving JPEG lossy compression. In: SPIE Storage and Retrieval of Image/Video Databases (1998)
Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of image alterations using semi-fragile watermarks. In: SPIE International Conference on Security and Watermarking of Multimedia Contents II (2000)
Lukas, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Digital Forensic Research Workshop, Cleveland, Ohio (August 2003)
Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)
Matzner, R.: An SNR estimation algorithm for complex baseband signals using higher order statistics. Facta Universitatis (Nis) 6(1), 41–52 (1993)
Mendel, J.M.: Tutorial on higher-order statistics (spectra) in signal processing and system theory: Theoretical results and some applications. Proceedings of the IEEE 79(3), 278–305 (1991)
Oppenheim, V., Schafer, R.W.: Discrete-Time Signal Processing. Prentice Hall, Englewood Cliffs (1989)
Pauluzzi, D.R., Beaulieu, N.C.: A comparison of SNR estimation techniques for the AWGN channel. IEEE Transactions on Communications 48(10), 1681–1691 (2000)
Rey, C., Dugelay, J.-L.: Blind detection of malicious alterations on still images using robust watermarks. In: IEE Seminar: Secure Images and Image Authentication (2000)
Schneider, M., Chang, S.-F.: A robust content-based digital signature for image authentication. In: IEEE International Conference on Image Processing (1996)
Storck, D.: A new approach to integrity of digital images. In: IFIP Conference on Mobile Communication, pp. 309–316 (1996)
Wallace, G.K.: The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics 34(4), 30–44 (1991)
Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: IEEE International Conference on Image Processing (1997)
Yu, G.-J., Lu, C.-S., Liao, H.-Y.M., Sheu, J.-P.: Mean quantization blind watermarking for image authentication. In: IEEE International Conference on Image Processing (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Popescu, A.C., Farid, H. (2004). Statistical Tools for Digital Forensics. In: Fridrich, J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30114-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-30114-1_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24207-9
Online ISBN: 978-3-540-30114-1
eBook Packages: Computer ScienceComputer Science (R0)