skip to main content
10.1145/3376067.3376088acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicvipConference Proceedingsconference-collections
research-article

Analysis of Forensic Fingerprints in Facebook Images, the Universal Antiforensic Attack

Published: 25 February 2020 Publication History

Abstract

Now days Facebook is used as one of the most effective communication media. Cheaper digital devices have made it easy, to capture, edit and share images on Facebook. Consequently, image integrity is often an issue for these images. Most of the internet images do not use any embedded active security mechanism, such as watermarking and steganography. Hence, passive digital image forensic techniques are often used to investigate these images. These techniques analyze various fingerprints introduced during tampering attacks, e.g. Noise, JPEG fingerprints, resampling artefacts, etc. Anitforensic attacks searches techniques to hide these forensic fingerprints. Most of the antiforensic techniques target a single forensic fingerprint. In this paper, we have investigated some of the very common forensic techniques on Facebook images. We found that JPEG fingerprints fail on Facebook images. In addition, the common resampling detector and noise inconsistency also fail on these images. Hence, Facebook can be considered as the universal antiforensic attack without degrading visual quality of an image.

References

[1]
Alessandro Piva, "An Overview on Image Forensics," ISRN Signal Processing, vol. 2013, Article ID 496701, 22 pages, 2013.
[2]
A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758--767, 2005.
[3]
M. Kirchner and R. Böhme, "Hiding traces of resampling in digital images," IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, pp. 582--592, 2008.
[4]
M. Kirchner and R. Böhme, "Synthesis of color filter array pattern in digital images," in Media Forensics and Security, E. J. Delp, J. Dittmann, N. Memon, and P. W. Wong, Eds., vol. 7254 of Proceedings of SPIE, 2009.
[5]
M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, "Antiforensics of JPEG compression," in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1694--1697, March 2010.
[6]
M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, Undetectable image tampering through JPEG compression anti-forensics," in Proceedings of the 17th IEEE International Conference on Image Processing (ICIP '10), pp. 2109--2112, September 2010.
[7]
Z. Fan and R. L. de Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 230--235, 2003.
[8]
M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations," in Proceedings of the 14th ACM Workshop on Multimedia and Security (MM&SEC '12), September 2012.
[9]
A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758--767, 2005.
[10]
Z. Lin, J. He, X. Tang, C.-K. Tang, "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognition, 2009, Vol(42), 2492--2501
[11]
Shelke P.M., Prasad R.S., "DBFS: Dragonfly Bayes Fusion System to detect the tampered JPEG image for forensic analysis", Evol. Intel. (2019), https://doi.org/10.1007/s12065-019-0243-4, ISSN: 1864-5909 (Print) 1864--5917 (Online).
[12]
Kumar A., Kansal A., Singh K.," An improved anti-forensic technique for JPEG compression", Multimed Tools Appl (2019). https://doi.org/10.1007/s11042-019-7734-x
[13]
Xiuli Bi, Yang Wei, Bin Xiao, "RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection", IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, 2019
[14]
Ghazal Mazaheri1, Niluthpol Chowdhury Mithun, Jawadul H. Bappy, and Amit K. Roy-Chowdhury, "A Skip Connection Architecture for Localization of Image Manipulations", IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, 2019
[15]
Gerald, S., Michal, S, "UCID - An Uncompressed Colour Image Database," Proceedings SPIE 5307, Storage and Retrieval Methods and Applications for Multimedia 472 (2003)
[16]
D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Proceedings of the 9th Security, Forensics, Steganography, and Watermarking of Multimedia Contents, vol. 6505 of Proceedings SPIE, pp. 1--11, San Jose, Calif, USA, January 2007.
[17]
Xiang, H., Yu, Q. Z., Miao L., Frank, Y. S., Yun, Q. S, "Detection of the tampered region for JPEG images by using mode-based first digit features," EURASIP Journal on Advances in Signal Processing, 2012:190, (2012)
[18]
Jianquan Yang, Guopu Zhu, "Detecting Doubly Compressed JPEG Images by Factor Histogram," APSIPA ASC 2011.
[19]
Archana V Mire, Sanjay B Dhok, Narendra J Mistry, Prakash D Porey, "Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting," International Journal of Digital Crime and Forensics (IJDCF), 7(4),33--54
[20]
Bo Liu, Chi-Man Pun, and Xiao-Chen Yuan, " Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies," Scientific World Journal Volume 2014, Article- ID 230425, 12 pages
[21]
B. Mahdian and S. Saic, "Blind authentication using periodic properties of interpolation," IEEE Transactions on Information Forensics and Security, 3(3):529--538, September 2008
[22]
M. Kirchner and T. Gloe, "On resampling detection in recompressed images," in Proceedings of the 1st IEEE International Workshop on Information Forensics and Security (WIFS '09), pp. 21--25, December 2009.

Index Terms

  1. Analysis of Forensic Fingerprints in Facebook Images, the Universal Antiforensic Attack

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICVIP '19: Proceedings of the 3rd International Conference on Video and Image Processing
    December 2019
    270 pages
    ISBN:9781450376822
    DOI:10.1145/3376067
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Shanghai Jiao Tong University: Shanghai Jiao Tong University
    • Xidian University
    • TU: Tianjin University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 February 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. FDPD
    2. Forensic fingerprint
    3. JPEG fingerprint
    4. antiforensic attacks
    5. factor histogram
    6. resampling artefact

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICVIP 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 89
      Total Downloads
    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media