Vision of the Unseen: Current Trends and Challenges in Digital Image and Video Forensics

被引:155
作者
Rocha, Anderson [1 ]
Scheirer, Walter [2 ]
Boult, Terrance [2 ]
Goldenstein, Siome [1 ]
机构
[1] Univ Estadual Campinas, Reasoning Complex Data Lab RECOD, Inst Comp, BR-13083970 Campinas, SP, Brazil
[2] Univ Colorado, Vis & Scur Technol Lab VAST, Colorado Springs, CO 80933 USA
基金
巴西圣保罗研究基金会;
关键词
Security; Legal Aspects; Image and video forensics; forgery and fraud detection; legal aspects; hidden messages detection; image and video source identification; CAMERA IDENTIFICATION; FORGERIES; STEGANALYSIS; TRACES;
D O I
10.1145/1978802.1978805
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Digital images are everywhere-from our cell phones to the pages of our online news sites. How we choose to use digital image processing raises a surprising host of legal and ethical questions that we must address. What are the ramifications of hiding data within an innocent image? Is this an intentional security practice when used legitimately, or intentional deception? Is tampering with an image appropriate in cases where the image might affect public behavior? Does an image represent a crime, or is it simply a representation of a scene that has never existed? Before action can even be taken on the basis of a questionable image, we must detect something about the image itself. Investigators from a diverse set of fields require the best possible tools to tackle the challenges presented by the malicious use of today's digital image processing techniques. In this survey, we introduce the emerging field of digital image forensics, including the main topic areas of source camera identification, forgery detection, and steganalysis. In source camera identification, we seek to identify the particular model of a camera, or the exact camera, that produced an image. Forgery detection's goal is to establish the authenticity of an image, or to expose any potential tampering the image might have undergone. With steganalysis, the detection of hidden data within an image is performed, with a possible attempt to recover any detected data. Each of these components of digital image forensics is described in detail, along with a critical analysis of the state of the art, and recommendations for the direction of future research.
引用
收藏
页数:42
相关论文
共 110 条
[1]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[2]  
[Anonymous], 1990, BIRTH PHOTOGRAPHY ST, P1800
[3]  
[Anonymous], 2001, PROC INFORM HIDING
[4]  
[Anonymous], 2011, DIGITAL IMAGE PROCES
[5]   Image steganalysis with binary similarity measures [J].
Avcibas, I ;
Kharrazi, M ;
Memon, N ;
Sankur, B .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2005, 2005 (17) :2749-2757
[6]   Steganalysis using image quality metrics [J].
Avcibas, I ;
Memon, N ;
Sankur, B .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) :221-229
[7]  
BAYRAM S., 2005, P INT C IM PROC
[8]  
BAYRAM S., 2006, P INT C DIG FOR
[9]   Image manipulation detection [J].
Bayram, Sevinc ;
Avcibas, Ismail ;
Sankur, Bulent ;
Memon, Nasir .
JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
[10]  
BOHME R., 2008, P INT WORKSH INF HID