Identification of Various Image Operations Using Residual-Based Features

被引:120
作者
Li, Haodong [1 ]
Luo, Weiqi [2 ]
Qiu, Xiaoqing [2 ]
Huang, Jiwu [3 ]
机构
[1] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangdong Key Lab Informat Secur Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangdong Key Lab Informat Secur Technol, Guangzhou 510006, Guangdong, Peoples R China
[3] Shenzhen Univ, Coll Informat Engn, Shenzhen Key Lab Media Secur, Shenzhen 518052, Peoples R China
基金
中国国家自然科学基金;
关键词
Countering anti-forensics; image forensics; image operation detection; image residuals; EXPOSING DIGITAL FORGERIES; CONTRAST ENHANCEMENT; SPLICING DETECTION; ANTI-FORENSICS; STEGANALYSIS; TRACES;
D O I
10.1109/TCSVT.2016.2599849
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Image forensics has attracted wide attention during the past decade. However, most existing works aim at detecting a certain operation, which means that their proposed features usually depend on the investigated image operation and they consider only binary classification. This usually leads to misleading results if irrelevant features and/or classifiers are used. For instance, a JPEG decompressed image would be classified as an original or median filtered image if it was fed into a median filtering detector. Hence, it is important to develop forensic methods and universal features that can simultaneously identify multiple image operations. Based on extensive experiments and analysis, we find that any image operation, including existing anti-forensics operations, will inevitably modify a large number of pixel values in the original images. Thus, some common inherent statistics such as the correlations among adjacent pixels cannot be preserved well. To detect such modifications, we try to analyze the properties of local pixels within the image in the residual domain rather than the spatial domain considering the complexity of the image contents. Inspired by image steganalytic methods, we propose a very compact universal feature set and then design a multiclass classification scheme for identifying many common image operations. In our experiments, we tested the proposed features as well as several existing features on 11 typical image processing operations and four kinds of anti-forensic methods. The experimental results show that the proposed strategy significantly outperforms the existing forensic methods in terms of both effectiveness and universality.
引用
收藏
页码:31 / 45
页数:15
相关论文
共 58 条
[11]   JPEG image steganalysis utilizing both intrablock and interblock correlations [J].
Chen, Chunhua ;
Shi, Yun Q. .
PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, :3029-3032
[12]   TAMPERING IDENTIFICATION USING EMPIRICAL FREQUENCY RESPONSE [J].
Chuang, Wei-Hong ;
Swaminathan, Ashwin ;
Wu, Min .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1517-1520
[13]  
Chun-Wing Kwok, 2012, Digital-Forensics and Watermarking 10th International Workshop, IWDW 2011. Revised Selected Papers, P398, DOI 10.1007/978-3-642-32205-1_32
[14]  
Cozzolino D, 2014, IEEE IMAGE PROC, P5297, DOI 10.1109/ICIP.2014.7026072
[15]   A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern [J].
Ding, Feng ;
Zhu, Guopu ;
Shi, Yun Qing .
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 :180-191
[16]   JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality [J].
Fan, Wei ;
Wang, Kai ;
Cayre, Francois ;
Xiong, Zhang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (08) :1211-1226
[17]   Adaptive and Flexible Virtual Honeynet [J].
Fan, Wenjun ;
Fernandez, David ;
Du, Zhihui .
MOBILE, SECURE, AND PROGRAMMABLE NETWORKING, MSPN 2015, 2015, 9395 :1-17
[18]   Identification of bitmap compression history: JPEG detection and quantizer estimation [J].
Fan, ZG ;
de Queiroz, RL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) :230-235
[19]   Exposing Digital Forgeries From JPEG Ghosts [J].
Farid, Hany .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) :154-160
[20]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882