Skip to main content

Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools

  • Conference paper
Book cover The International Workshop on Digital Forensics and Watermarking 2012 (IWDW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Included in the following conference series:

Abstract

The extensive use of multimedia editing tools suitable for non-skilled users has significantly reduced the trust on audiovisual contents. Simultaneously, a new branch of multimedia security, named multimedia forensics, has been developed to cope with this problem. Nevertheless, most of the schemes proposed so far are heuristic and ad-hoc solutions that try to deal with a particular signal processing operator (or a simple combination of them). In a previous work by the authors, fundamental limits to forensics applications are provided, based on the use of two well-known measures, originated at the detection and information theory fields. In the current work the suitability of those measures for establishing the topology and ordering of the operator chain a multimedia content has gone through is illustrated. The provided results show that in general different operator chains can be distinguished, although in some particular cases (e.g., comparison between double and triple quantization) the considered operator chains can be completely indistinguishable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bianchi, T., Piva, A.: Analysis of non-aligned double JPEG artifacts for the localization of image forgeries. In: Proc. of the IEEE WIFS. Iguaçu Falls, Brazil, pp.1–6 (December 2011)

    Google Scholar 

  2. Böhme, R., Kirchner, M.: Counter-Forensics: Attacking Image Forensics. In: Digital Image Forensics. Springer (2012)

    Google Scholar 

  3. Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Comesaña, P.: Detection and information theoretic measures for quantifying the distingsuishability between multimedia operator chains. In: IEEE WIFS 2012, Tenerife, Spain, pp. 211–216 (December 2012)

    Google Scholar 

  5. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley (2006)

    Google Scholar 

  6. Fan, Z., de Queiroz, R.L.: Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transactions on Image Processing 12(2), 230–235 (2003)

    Article  Google Scholar 

  7. Fu, D., Shi, Y.Q., Su, W.: A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In: Proc. SPIE 6505, San Jose, CA, vol. 6505, p. 65051L (January 2007)

    Google Scholar 

  8. Lin, W.S., Tjoa, S.K., Zhao, H.V., Liu, K.J.R.: Digital image source coder forensics via intrinsic fingerprints. IEEE Transactions on Informations Forensics and Security 4(3), 460–475 (2009)

    Article  Google Scholar 

  9. Lukas, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Proc. of DFRWS (2003)

    Google Scholar 

  10. Luo, W., Qu, Z., Huang, J., Qiu, G.: A novel method for detecting cropped and recompressed image block. In: Proc. of the IEEE ICASSP, Honolulu, HI, pp. 217–220 (April 2007)

    Google Scholar 

  11. Luo, W., Wang, Y., Huang, J.: Detection of quantization artifacts and its applications to transform encoder identification. IEEE Transactions on Information Forensics and Security 5(4), 810–815 (2010)

    Article  Google Scholar 

  12. Milani, S., Tagliasacchi, M., Tubaro, S.: Discriminating multiple JPEG compression using first digit features. In: Proc. of the IEEE ICASSP, Kyoto, Japan, pp. 2235-2256 (March 2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Comesaña, P., Pérez-González, F. (2013). Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics