Abstract
The extensive use of multimedia editing tools suitable for non-skilled users has significantly reduced the trust on audiovisual contents. Simultaneously, a new branch of multimedia security, named multimedia forensics, has been developed to cope with this problem. Nevertheless, most of the schemes proposed so far are heuristic and ad-hoc solutions that try to deal with a particular signal processing operator (or a simple combination of them). In a previous work by the authors, fundamental limits to forensics applications are provided, based on the use of two well-known measures, originated at the detection and information theory fields. In the current work the suitability of those measures for establishing the topology and ordering of the operator chain a multimedia content has gone through is illustrated. The provided results show that in general different operator chains can be distinguished, although in some particular cases (e.g., comparison between double and triple quantization) the considered operator chains can be completely indistinguishable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bianchi, T., Piva, A.: Analysis of non-aligned double JPEG artifacts for the localization of image forgeries. In: Proc. of the IEEE WIFS. Iguaçu Falls, Brazil, pp.1–6 (December 2011)
Böhme, R., Kirchner, M.: Counter-Forensics: Attacking Image Forensics. In: Digital Image Forensics. Springer (2012)
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Comesaña, P.: Detection and information theoretic measures for quantifying the distingsuishability between multimedia operator chains. In: IEEE WIFS 2012, Tenerife, Spain, pp. 211–216 (December 2012)
Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley (2006)
Fan, Z., de Queiroz, R.L.: Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transactions on Image Processing 12(2), 230–235 (2003)
Fu, D., Shi, Y.Q., Su, W.: A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In: Proc. SPIE 6505, San Jose, CA, vol. 6505, p. 65051L (January 2007)
Lin, W.S., Tjoa, S.K., Zhao, H.V., Liu, K.J.R.: Digital image source coder forensics via intrinsic fingerprints. IEEE Transactions on Informations Forensics and Security 4(3), 460–475 (2009)
Lukas, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Proc. of DFRWS (2003)
Luo, W., Qu, Z., Huang, J., Qiu, G.: A novel method for detecting cropped and recompressed image block. In: Proc. of the IEEE ICASSP, Honolulu, HI, pp. 217–220 (April 2007)
Luo, W., Wang, Y., Huang, J.: Detection of quantization artifacts and its applications to transform encoder identification. IEEE Transactions on Information Forensics and Security 5(4), 810–815 (2010)
Milani, S., Tagliasacchi, M., Tubaro, S.: Discriminating multiple JPEG compression using first digit features. In: Proc. of the IEEE ICASSP, Kyoto, Japan, pp. 2235-2256 (March 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Comesaña, P., Pérez-González, F. (2013). Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)