Understanding digital image anti-forensics: an analytical review

被引:3
作者
Taneja, Neeti [1 ]
Bramhe, Vijendra Singh [1 ]
Bhardwaj, Dinesh [2 ]
Taneja, Ashu [3 ]
机构
[1] Sharda Univ, Sharda Sch Engn & Technol, Dept Comp Sci & Engn, Greater Noida 201310, Uttar Pradesh, India
[2] Thapar Inst Engn & Technol, Dept Elect & Commun Engn, Patiala 147004, Punjab, India
[3] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Rajpura 140401, Punjab, India
基金
英国科研创新办公室;
关键词
Blocking artifacts; Anti-forensics; JPEG compression; MFR; CNN; JPEG; ENHANCEMENT; COUNTER; IDENTIFICATION; QUALITY; FORGERY; MODELS; TRACES;
D O I
10.1007/s11042-023-15866-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image forensics is essential for detecting image manipulation, authenticating images, and identifying sources of images. A forensic analyst can make use of various artifacts to develop a powerful forensic technique. These artifacts include JPEG blocking and quantization artifacts, streaking artifacts and contrast enhancement artifacts, etc. With the introduction of anti-forensics, it has become difficult for forensic experts to identify forged images. There are various anti-forensic methods available that try to eradicate these detection footprints/artifacts to fool the existing forensic detectors. Thus the detection of anti-forensic attacks is very crucial and plays a vital role in forensic analysis. This paper presents a review of various types of anti-forensic attacks, such as JPEG anti-forensics, Contrast enhancement anti-forensics, and Median filtering anti-forensics. Firstly a brief introduction is given about image forgery, JPEG compression, contrast enhancement, and median filtering. Then, anti-forensics is described in detail, and finally, the recent state-of-the-art anti-forensic techniques are summarized in tabular form for better understanding. This may be helpful for the forensic analyst to develop robust methods for forgery detection that can be applied in various applications such as the identification of cybercrimes, identity thefts, etc.
引用
收藏
页码:10445 / 10466
页数:22
相关论文
共 73 条
  • [61] Revealing the Traces of JPEG Compression Anti-Forensics
    Valenzise, Giuseppe
    Tagliasacchi, Marco
    Tubaro, Stefano
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (02) : 335 - 349
  • [62] Fusion of Handcrafted and Deep Features for Forgery Detection in Digital Images
    Walia, Savita
    Kumar, Krishan
    Kumar, Munish
    Gao, Xiao-Zhi
    [J]. IEEE ACCESS, 2021, 9 : 99742 - 99755
  • [63] Contrast Enhancement Estimation for Digital Image Forensics
    Wen, Longyin
    Qi, Honggang
    Lyu, Siwei
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2018, 14 (02)
  • [64] Wu ZH, 2013, INT CONF ACOUST SPEE, P3043, DOI 10.1109/ICASSP.2013.6638217
  • [65] Dual-Domain Generative Adversarial Network for Digital Image Operation Anti-Forensics
    Xie, Hao
    Ni, Jiangqun
    Shi, Yun-Qing
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (03) : 1701 - 1706
  • [66] Detecting median filtering via two-dimensional AR models of multiple filtered residuals
    Yang, Jianquan
    Ren, Honglei
    Zhu, Guopu
    Huang, Jiwu
    Shi, Yun-Qing
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (07) : 7931 - 7953
  • [67] Yang P, 2018, ROBUST CONTRAST ENHA
  • [68] Dual-Domain Fusion Convolutional Neural Network for Contrast Enhancement Forensics
    Yang, Pengpeng
    [J]. ENTROPY, 2021, 23 (10)
  • [69] Blind Forensics of Median Filtering in Digital Images
    Yuan, Hai-Dong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (04) : 1335 - 1345
  • [70] No One Can Escape: A General Approach to Detect Tampered and Generated Image
    Zhang, Kejun
    Liang, Yu
    Zhang, Jianyi
    Wang, Zhiqiang
    Li, Xinxin
    [J]. IEEE ACCESS, 2019, 7 : 129494 - 129503