Abstract
This paper summarizes several iterations in the cat-and-mouse game between digital image forensics and counter-forensics related to an image’s JPEG compression history. Building on the counter-forensics algorithm by Stamm et al. [1], we point out a vulnerability in this scheme when a maximum likelihood estimator has no solution. We construct a targeted detector against it, and present an improved scheme which uses imputation to deal with cases that lack an estimate. While this scheme is secure against our targeted detector, it is detectable by a further improved detector, which borrows from steganalysis and uses a calibrated feature. All claims are backed with experimental results from 2 × 800 never-compressed never-resampled grayscale images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stamm, M., Tjoa, S., Lin, W., Ray Liu, K.J.R.: Anti-forensics of JPEG compression. In: IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP 2010), pp. 1694–1697. IEEE Press, Los Alamitos (2010)
Kirchner, M., Böhme, R.: Tamper hiding: Defeating image forensics. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 326–341. Springer, Heidelberg (2008)
Goljan, M., Fridrich, J., Chen, M.: Sensor noise camera identification: Countering counter-forensics. In: Memon, N.D., Dittmann, J., Alattar, A.M., Delp, E.J. (eds.) Proceedings of SPIE Media Forensics and Security II, vol. 7541, p. 75410S. SPIE, Bellingham (2010)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Kodovsky, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 63–73. ACM Press, New York (2009)
Fan, Z., Queiroz, R.: Identication of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transactions on Image Processing 12(2), 230–235 (2003)
Farid, H.: Digital image ballistics from JPEG quantization. Tech.Rep. TR2006-583 (2006)
He, J., Lin, Z., Wang, L., Tang, X.: Detecting doctored JPEG images via DCT coefficient analysis. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, vol. 3953, pp. 423–435. Springer, Heidelberg (2006)
Pevny, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Transactions on Information Forensics and Security 3, 247–258 (2008)
Stamm, M., Tjoa, S., Lin, W., Ray Liu, K.J.R.: Undetectable image tampering through JPEG compression anti-forensics. In: IEEE Int. Conf. on Image Processing, ICIP (2010)
Valenzise, G., Nobile, V., Tagliasacchi, M., Tubaro, S.: Countering JPEG anti-forensics. In: IEEE Int. Conf. on Image Processing, ICIP (to appear, 2011)
Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Delp, E.J., Wong, P.W., Dittmann, J., Memon, N.D. (eds.) Proc. of SPIE Security, Forensics, Steganography and Watermarking of Multimedia Contents X, San Jose, CA, vol. 6819 (2008)
Lam, E.Y., Goodman, J.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Transactions on Image Processing 9, 1661–1665 (2000)
Kirchner, M., Böhme, R.: Hiding traces of resampling in digital images. IEEE Transactions on Information Forensics and Security 3, 582–592 (2008)
Barni, M., Cancelli, G., Esposito, A.: Forensics aided steganalysis of heterogeneous images. In: IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP 2010), pp. 1690–1693. IEEE Press, Los Alamitos (2010)
Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceeding SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents (IX), pp. 313–314 (January 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lai, S., Böhme, R. (2011). Countering Counter-Forensics: The Case of JPEG Compression. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds) Information Hiding. IH 2011. Lecture Notes in Computer Science, vol 6958. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24178-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-24178-9_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24177-2
Online ISBN: 978-3-642-24178-9
eBook Packages: Computer ScienceComputer Science (R0)