skip to main content
10.1145/2482513.2482536acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics

Published: 17 June 2013 Publication History

Abstract

This paper proposes an anti-forensic method that disguises the footprints left by JPEG compression, whose objective is to fool existing JPEG forensic detectors while keeping a high visual quality of the processed image. First we examine the reliability of existing detectors and point out the potential vulnerability of the quantization table estimation based detector. Then we construct a new, non-parametric method to DCT histogram smoothing without any histogram statistical model. Finally JPEG forensic detectors are fooled by optimizing an objective function considering both the anti-forensic terms and a natural image statistical model. We show that compared to the state-of-the-art methods the proposed JPEG anti-forensic method is able to achieve a higher image visual quality while being undetectable under existing detectors.

References

[1]
P. Bas, T. Filler, and T. Pevný. Break our steganographic system -- the ins and outs of organizing BOSS. In Proc Int. Conf. on Information Hiding, pages 59--70, 2011.
[2]
R. Böhme and M. Kirchner. Counter-forensics: Attacking image forensics. In H. T. Sencar and N. Memon, editors, Digital Image Forensics, pages 327--366. Springer, New York, NY, USA, 2013.
[3]
W. Fan, K. Wang, F. Cayre, and Z. Xiong. A variational approach to JPEG anti-forensics. In Proc. IEEE Int. Conf. Acoust., Speech, and Signal Process., 2013.
[4]
Z. Fan and R. L. de Queiroz. Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history. In Proc. IEEE Int. Conf. Image Process., pages 948--951, 2000.
[5]
Z. Fan and R. L. de Queiroz. Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans. Image Process., 12(2):230--235, 2003.
[6]
J. Fridrich, M. Goljan, and D. Hogea. Steganalysis of JPEG images: Breaking the F5 algorithm. In Proc. Int. Workshop on Information Hiding, pages 310--323, 2003.
[7]
S. Lai and R. Böhme. Countering counter-forensics: the case of JPEG compression. In Proc Int. Conf. on Information Hiding, pages 285--298, 2011.
[8]
J. R. Price and M. Rabbani. Biased reconstruction for JPEG decoding. IEEE Signal Process. Lett., 6(12):297--299, 1999.
[9]
M. A. Robertson and R. L. Stevenson. DCT quantization noise in compressed images. IEEE Trans. Circuits Syst. Video Technol., 15(1):27--38, 2005.
[10]
G. Schaefer and M. Stich. UCID - An uncompressed colour image database. In Proc. SPIE: Storage and Retrieval Methods and Applications for Multimedia, pages 472--480, 2004.
[11]
M. Stamm, S. Tjoa, W. S. Lin, and K. J. R. Liu. Anti-forensics of JPEG compression. In Proc. IEEE Int. Conf. Acoust., Speech, and Signal Process., pages 1694--1697, 2010.
[12]
M. Stamm, S. Tjoa, W. S. Lin, and K. J. R. Liu. Undetectable image tampering through JPEG compression anti-forensics. In Proc. IEEE Int. Conf. Image Process., pages 2109--2112, 2010.
[13]
D. Sun and W.-K. Cham. Postprocessing of low bit-rate block DCT coded images based on a fields of experts prior. IEEE Trans. Image Process., 16(11):2743--2751, 2007.
[14]
C. Ullerich and A. Westfeld. Weaknesses of MB2. In Proc. of Int. Workshop on Digital Watermarking, pages 127--142, 2008.
[15]
G. Valenzise, V. Nobile, M. Tagliasacchi, and S. Tubaro. Countering JPEG anti-forensics. In Proc. IEEE Int. Conf. Image Process., pages 1949--1952, 2011.
[16]
G. Valenzise, M. Tagliasacchi, and S. Tubaro. The cost of JPEG compression anti-forensics. In Proc. IEEE Int. Conf. Acoust., Speech, and Signal Process., pages 1884--1887, 2011.
[17]
D. Zoran and Y. Weiss. From learning models of natural image patches to whole image restoration. In Proc. IEEE Int. Conf. Computer Vision, pages 479--486, 2011.

Cited By

View all
  • (2024)Systematic Review: Anti-Forensic Computer TechniquesApplied Sciences10.3390/app1412530214:12(5302)Online publication date: 19-Jun-2024
  • (2024)Diffusion models meet image counter-forensics2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)10.1109/WACV57701.2024.00388(3913-3923)Online publication date: 3-Jan-2024
  • (2024)Attacking Forgery Detection Models Using a Stack of Multiple Strategies2024 International Conference on Multimedia Analysis and Pattern Recognition (MAPR)10.1109/MAPR63514.2024.10660784(1-6)Online publication date: 15-Aug-2024
  • Show More Cited By

Index Terms

  1. JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
    June 2013
    242 pages
    ISBN:9781450320818
    DOI:10.1145/2482513
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 June 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anti-forensics
    2. calibration
    3. digital image forensics
    4. jpeg compression
    5. natural image statistics

    Qualifiers

    • Research-article

    Conference

    IH&MMSec '13
    Sponsor:

    Acceptance Rates

    IH&MMSec '13 Paper Acceptance Rate 27 of 74 submissions, 36%;
    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Systematic Review: Anti-Forensic Computer TechniquesApplied Sciences10.3390/app1412530214:12(5302)Online publication date: 19-Jun-2024
    • (2024)Diffusion models meet image counter-forensics2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)10.1109/WACV57701.2024.00388(3913-3923)Online publication date: 3-Jan-2024
    • (2024)Attacking Forgery Detection Models Using a Stack of Multiple Strategies2024 International Conference on Multimedia Analysis and Pattern Recognition (MAPR)10.1109/MAPR63514.2024.10660784(1-6)Online publication date: 15-Aug-2024
    • (2019)Bibliography of digital image anti‐forensics and anti‐anti‐forensics techniquesIET Image Processing10.1049/iet-ipr.2018.658713:11(1811-1823)Online publication date: Aug-2019
    • (2019)An improved median filtering anti-forensics with better image quality and forensic undetectabilityMultidimensional Systems and Signal Processing10.1007/s11045-019-00637-8Online publication date: 27-Feb-2019
    • (2019)Detecting double JPEG compression and its related anti-forensic operations with CNNMultimedia Tools and Applications10.1007/s11042-018-7073-378:7(8577-8601)Online publication date: 1-Apr-2019
    • (2017)Countering JPEG anti-forensics based on noise level estimationScience China Information Sciences10.1007/s11432-016-0426-161:3Online publication date: 14-Aug-2017
    • (2016)Forensic Analysis of Linear and Nonlinear Image Filtering Using Quantization NoiseACM Transactions on Multimedia Computing, Communications, and Applications10.1145/285706912:3(1-23)Online publication date: 8-Mar-2016
    • (2016)Forensic detection of inverse tone mapping in HDR images2016 IEEE International Conference on Image Processing (ICIP)10.1109/ICIP.2016.7532340(166-170)Online publication date: Sep-2016
    • (2015)General-purpose image forensics using patch likelihood under image statistical models2015 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS.2015.7368606(1-6)Online publication date: Nov-2015
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media