Skip to main content

Exploring the Role of Adversarial Attacks in Image Anti-forensics

  • Conference paper
  • First Online:
Computer Vision and Image Processing (CVIP 2021)

Abstract

Deep learning (DL) has grown significantly in the field of image forensics. A lot of research has been going on to develop deep learning based image manipulation detection techniques. On the contrary, researchers are also challenging the robustness of these DL-based image forensic techniques by developing efficient anti-forensic schemes. This paper reveals the role of adversarial attacks in image anti-forensics with better human imperceptibility against recent general-purpose image forensic techniques. We propose an image anti-forensic framework by using recent adversarial attacks, i.e., Fast Gradient Sign Method (FGSM), Carlini and Wagner (C &W), and Projected Gradient Descent (PGD). Firstly, we have trained recent image forensic models on the BOSSBase dataset. Then, we generate adversarial noise by using the gradient of these image forensic models corresponding to each adversarial attack. Afterward, the obtained noise is added to the input image, resulting in the adversarial image corresponding to the particular attack. These adversarial images are generated by using the BOSSBase dataset and tested on the recent image forensic models. The experimental results show that the performance of the recent forensic models has decreased rapidly in the range from 50–75% against the different adversarial attacks, i.e., FGSM, C &W, and PGD. Furthermore, the high human imperceptibility of generated adversarial images is confirmed from the PSNR values.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bas, P., Filler, T., Pevný, T.: “Break Our Steganographic System’’: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5

    Chapter  Google Scholar 

  2. Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13(11), 2691–2706 (2018)

    Article  Google Scholar 

  3. Cao, G., Zhao, Y., Ni, R., Tian, H.: Anti-forensics of contrast enhancement in digital images. In: Proceedings of the 12th ACM Workshop on Multimedia and Security. pp. 25–34 (2010)

    Google Scholar 

  4. Cao, G., Zhao, Y., Ni, R.R., Tian, H.W., Yu, L.F.: Attacking contrast enhancement forensics in digital images. Science China Inf. Sci. 57(5), 1–13 (2014). https://doi.org/10.1007/s11432-013-4928-0

    Article  Google Scholar 

  5. Cao, Y., Gao, T., Sheng, G., Fan, L., Gao, L.: A new anti-forensic scheme-hiding the single JPEG compression trace for digital image. J. Forensic Sci. 60(1), 197–205 (2015)

    Article  Google Scholar 

  6. Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39–57. IEEE (2017)

    Google Scholar 

  7. Chen, Y., Kang, X., Wang, Z.J., Zhang, Q.: Densely connected convolutional neural network for multi-purpose image forensics under anti-forensic attacks. In: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 91–96 (2018)

    Google Scholar 

  8. Dang-Nguyen, D.T., Gebru, I.D., Conotter, V., Boato, G., De Natale, F.G.: Counter-forensics of median filtering. In: 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp. 260–265. IEEE (2013)

    Google Scholar 

  9. Fan, W., Wang, K., Cayre, F., Xiong, Z.: A variational approach to JPEG anti-forensics. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3058–3062. IEEE (2013)

    Google Scholar 

  10. Fan, W., Wang, K., Cayre, F., Xiong, Z.: JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality. IEEE Trans. Inf. Forensics Secur. 9(8), 1211–1226 (2014)

    Article  Google Scholar 

  11. Fan, W., Wang, K., Cayre, F., Xiong, Z.: Median filtered image quality enhancement and anti-forensics via variational deconvolution. IEEE Trans. Inf. Forensics Secur. 10(5), 1076–1091 (2015)

    Article  Google Scholar 

  12. Gloe, T., Kirchner, M., Winkler, A., Böhme, R.: Can we trust digital image forensics? In: Proceedings of the 15th ACM international conference on Multimedia, pp. 78–86 (2007)

    Google Scholar 

  13. Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)

  14. Kim, D., Jang, H.U., Mun, S.M., Choi, S., Lee, H.K.: Median filtered image restoration and anti-forensics using adversarial networks. IEEE Signal Process. Lett. 25(2), 278–282 (2017)

    Article  Google Scholar 

  15. Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Secur. 3(4), 582–592 (2008)

    Article  Google Scholar 

  16. Luo, Y., Zi, H., Zhang, Q., Kang, X.: Anti-forensics of JPEG compression using generative adversarial networks. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 952–956. IEEE (2018)

    Google Scholar 

  17. Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)

  18. Ravi, H., Subramanyam, A.V., Emmanuel, S.: ACE-an effective anti-forensic contrast enhancement technique. IEEE Signal Process. Lett. 23(2), 212–216 (2015)

    Article  Google Scholar 

  19. Singh, G., Goyal, P.: GIMD-Net: an effective general-purpose image manipulation detection network, even under anti-forensic attacks. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1–8. IEEE (2021)

    Google Scholar 

  20. Singh, G., Singh, K.: Improved JPEG anti-forensics with better image visual quality and forensic undetectability. Forensic Sci. Int. 277, 133–147 (2017)

    Article  Google Scholar 

  21. Singh, G., Singh, K.: Counter JPEG anti-forensic approach based on the second-order statistical analysis. IEEE Trans. Inf. Forensics Secur. 14(5), 1194–1209 (2018)

    Article  Google Scholar 

  22. Wu, J., Sun, W.: Towards multi-operation image anti-forensics with generative adversarial networks. Comput. Secur. 100, 102083 (2021)

    Google Scholar 

  23. Wu, Z.H., Stamm, M.C., Liu, K.R.: Anti-forensics of median filtering. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3043–3047. IEEE (2013)

    Google Scholar 

  24. Yang, L., Yang, P., Ni, R., Zhao, Y.: Xception-based general forensic method on small-size images. In: Pan, J.-S., Li, J., Tsai, P.-W., Jain, L.C. (eds.) Advances in Intelligent Information Hiding and Multimedia Signal Processing. SIST, vol. 157, pp. 361–369. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-9710-3_38

    Chapter  Google Scholar 

Download references

Acknowledgment

This work is supported by Indian Institute of Technology Ropar under ISIRD grant 9-231/2016/IIT-RPR/1395.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gurinder Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, K.G., Singh, G., Goyal, P. (2022). Exploring the Role of Adversarial Attacks in Image Anti-forensics. In: Raman, B., Murala, S., Chowdhury, A., Dhall, A., Goyal, P. (eds) Computer Vision and Image Processing. CVIP 2021. Communications in Computer and Information Science, vol 1568. Springer, Cham. https://doi.org/10.1007/978-3-031-11349-9_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-11349-9_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-11348-2

  • Online ISBN: 978-3-031-11349-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics