Skip to main content

A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10082))

Abstract

During the past decade, image forensics has made rapid progress due to the growing concern of image content authenticity. In order to remove or conceal the traces that forensics based on, some farsighted forgers take advantage of so-called anti-forensics to make their forgery more convincing. To rebuild the credibility of forensics, many countermeasures against anti-forensics have been proposed. This paper presents a multi-purpose approach to detect various anti-forensics based on the architecture of Convolutional Neural Networks (CNN), which can automatically extract features and identify the forged types. Our model can detect various image anti-forensics both in binary and multi-class decision effectively. Experimental results show that the proposed method performs well for multiple well-known image anti-forensic methods.

X. Kang—This work was supported by NSFC (Grant nos. 61379155, U1536204, 61502547, 61332012, 61272453 and NSF of Guangdong province (Grant no. s2013020012788).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Stamm, M.M.C., Wu, M., Liu, K.J.R.: Information forensics: an overview of the first decade. In: IEEE Access, vol. 1, pp. 167–200, May 2013

    Google Scholar 

  2. Stamm, M.M.C., Tjoa, S.K., Lin, W.S., et al.: Anti-forensics of JPEG compression. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 1694–1697, March 2010

    Google Scholar 

  3. Valenzise, M.G., Tagliasacchi, M., Tubaro, S.: Revealing the traces of JPEG compression anti-forensics. IEEE Trans. Inf. Forensics Secur. 8(2), 335–349 (2013)

    Article  Google Scholar 

  4. Stamm, M.M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)

    Article  Google Scholar 

  5. Popescu, A.A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Signal Process. 53(2), 758–767 (2005)

    Article  MathSciNet  Google Scholar 

  6. Kirchner, M.M., Böhme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Secur. 3(4), 582–592 (2008)

    Article  Google Scholar 

  7. Stamm, M.M.C., Liu, K.J.R.: Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 5(3), 492–506 (2010)

    Article  Google Scholar 

  8. Stamm, M.M.C., Liu, K.J.R.: Blind forensics of contrast enhancement in digital images. In: Proceedings of IEEE International Conference on Image Processing, San Diego, CA, pp. 3112–3115, October 2008

    Google Scholar 

  9. Cao, G.G., Zhao, Y., Ni, R., Tian, H.: Anti-forensics of contrast enhancement in digital images. In: Proceedings of ACM Workshop Multimedia and Security, pp. 25–34 (2010)

    Google Scholar 

  10. Kwok, C.-W., Au, O.C., Chui, S.-H.: Alternative anti-forensics method for contrast enhancement. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 398–410. Springer, Heidelberg (2012). doi:10.1007/978-3-642-32205-1_32

    Chapter  Google Scholar 

  11. Valenzise, G.G., Tagliasacchi, M., Tubaro, S.: Revealing the traces of JPEG compression anti-forensics. IEEE Trans. Inf. Forensics Secur. 8(2), 335–349 (2013)

    Article  Google Scholar 

  12. Yuan, H.H.: Blind forensics of median filtering in digital images. IEEE Trans. Inf. Forensics Secur. 6(4), 1335–1345 (2011)

    Article  Google Scholar 

  13. Kirchner, M.M., Fridrich, J.: On detection of median filtering in digital images. In: Memon, N.D., Dittmann, J., Alattar, A.M., Delp, E.J. (Eds.) Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, Proceedings, vol. 7541 of SPIE Proceedings, San Jose, CA, USA, 18–20 January 2010, p. 754110, SPIE (2010)

    Google Scholar 

  14. Dang-Nguyen, D.D.T., Gebru, I.D., Conotter, V., et al.: Counter-forensics of median filtering. In: 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp. 260–265, September 2013

    Google Scholar 

  15. Wu, Z.Z.H., Stamm, M.C., Liu, K.J.R.: Anti-forensics of median filtering. In: Proceedings of IEEE International Conference on Acoustic, Speech, and Signal Processing, pp. 3043–3047, Vancouver, Canada, May 2013

    Google Scholar 

  16. Simonyan, K.K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Proceedings of ICLR (2015)

    Google Scholar 

  17. Krizhevsky, A.A., Sutskever, I., Hinton, G.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097–1105 (2012)

    Google Scholar 

  18. Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-24178-9_5

    Chapter  Google Scholar 

  19. Lecun, Y.Y., BoUou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)

    Article  Google Scholar 

  20. Srivastava, N., et al.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929–1958 (2014)

    MathSciNet  MATH  Google Scholar 

  21. Nair, V., Hinton, G.E.: Rectified linear units improve restricted boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML 2010) (2010)

    Google Scholar 

  22. Jiang, Y.Y., Zeng, H., Kang, X., et al.: The game of countering JPEG anti-forensics based on the noise level estimation. In: Proceedings of the Asian-Pacific Signal and Information Processing Association Annual Submit Conference (APSIPA ASC) (2013)

    Google Scholar 

  23. Zeng, H.H., Qin, T., Kang, X., et al.: Countering anti-forensics of median filtering. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 2723–2727 (2014)

    Google Scholar 

  24. Peng, A.A., Zeng, H., Kang, X., et al.: Countering anti-forensics of image resampling. In: Proceedings of the 2015 IEEE International Conference on Image Processing (ICIP), pp. 3595–3599, September 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangui Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Yu, J., Zhan, Y., Yang, J., Kang, X. (2017). A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks. In: Shi, Y., Kim, H., Perez-Gonzalez, F., Liu, F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science(), vol 10082. Springer, Cham. https://doi.org/10.1007/978-3-319-53465-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53465-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53464-0

  • Online ISBN: 978-3-319-53465-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics