Can we trust digital image forensics?

作者: Thomas Gloe , Matthias Kirchner , Antje Winkler , Rainer Böhme

DOI: 10.1145/1291233.1291252

关键词: Digital image forensicsComputer securityComputer scienceIdentification (information)Digital imageField (computer science)Forensic scienceImage (mathematics)Image forensicsRobustness (computer science)

摘要: Compared to the prominent role digital images play in nowadays multimedia society, research field of image authenticity is still its infancy. Only recently, on forensics has gained attention by addressing tamper detection and source identification. However, most publications this emerging lack rigorous discussions robustness against strategic counterfeiters, who anticipate existence forensic techniques. As a result, question trustworthiness arises. This work will take closer look at two state-of-the-art methods proposes counter-techniques; one perform resampling operations undetectably another forge traces origin. Implications for future systems be discussed.

参考文章(20)
Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn, Attacks on Copyright Marking Systems information hiding. pp. 218- 238 ,(1998) , 10.1007/3-540-49380-8_16
M. Kharrazi, H.T. Sencar, N. Memon, Blind source camera identification international conference on image processing. ,vol. 3, pp. 709- 712 ,(2004) , 10.1109/ICIP.2004.1418853
Tian-Tsong Ng, Shih-Fu Chang, Ching-Yung Lin, Qibin Sun, None, Passive-blind Image Forensics digital rights management. pp. 383- 412 ,(2006) , 10.1016/B978-012369476-8/50017-8
Matthias Kirchner, Rainer Böhme, Tamper hiding: defeating image forensics information hiding. ,vol. 4567, pp. 326- 341 ,(2007) , 10.1007/978-3-540-77370-2_22
Jan Lukáš, Jessica Fridrich, Miroslav Goljan, Detecting digital image forgeries using sensor pattern noise conference on security steganography and watermarking of multimedia contents. ,vol. 6072, pp. 362- 372 ,(2006) , 10.1117/12.640109
Kai San Choi, Edmund Y. Lam, Kenneth K. Y. Wong, Automatic source camera identification using the intrinsic lens radial distortion. Optics Express. ,vol. 14, pp. 11551- 11565 ,(2006) , 10.1364/OE.14.011551
Thomas Gloe, Elke Franz, Antje Winkler, Forensics for flatbed scanners conference on security steganography and watermarking of multimedia contents. ,vol. 6505, ,(2007) , 10.1117/12.704165
A. P. Dempster, N. M. Laird, D. B. Rubin, Maximum Likelihood from Incomplete Data Via theEMAlgorithm Journal of the Royal Statistical Society: Series B (Methodological). ,vol. 39, pp. 1- 22 ,(1977) , 10.1111/J.2517-6161.1977.TB01600.X
M. Kivanc Mihcak, I. Kozintsev, K. Ramchandran, P. Moulin, Low-complexity image denoising based on statistical modeling of wavelet coefficients IEEE Signal Processing Letters. ,vol. 6, pp. 300- 303 ,(1999) , 10.1109/97.803428