CFP last date
20 December 2024
Reseach Article

A Tailored Anti-forensic Technique for Digital Image Applications

by S. Manimurugan, Athira B. Kaimal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 9
Year of Publication: 2012
Authors: S. Manimurugan, Athira B. Kaimal
10.5120/8448-2241

S. Manimurugan, Athira B. Kaimal . A Tailored Anti-forensic Technique for Digital Image Applications. International Journal of Computer Applications. 53, 9 ( September 2012), 14-20. DOI=10.5120/8448-2241

@article{ 10.5120/8448-2241,
author = { S. Manimurugan, Athira B. Kaimal },
title = { A Tailored Anti-forensic Technique for Digital Image Applications },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 9 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 14-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number9/8448-2241/ },
doi = { 10.5120/8448-2241 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:53:40.490035+05:30
%A S. Manimurugan
%A Athira B. Kaimal
%T A Tailored Anti-forensic Technique for Digital Image Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 9
%P 14-20
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The influence of digital images on modern society is incredible, image processing has now become a significant component in almost all the areas. But storing images in a safe and sound way has become very complicated. Sometimes, for processing we can only use raster bitmap format. Therefore processing of such images should be carried out without knowledge of past processing on that image. Even though many image tampering detection techniques are available, the number of image forgeries is increasing. Therefore it is important to find the weaknesses of offered detection methods to prevent further forgeries. In this paper, a new approach is designed to prevent the bitmap compression history. Then it also explains how this can be used to perform unnoticeable forgeries on the bitmap images. It can be done by the estimation, examination and alteration in the transform coefficients of image. The existing methods for identification of bitmap compression history are JPEG detection and Quantizer estimation. The JPEG detection is used to find whether the image has been previously compressed. But the proposed method indicates that proper addition of noise to an image's transform coefficients can adequately eliminate quantization artifacts which act as indicators of JPEG compression. Using the proposed technique the modified image will appear to have never been compressed. Therefore this technique can be used to cover the history of operations performed on the image in the past and there by rendering several forms of image tampering.

References
  1. Z. Fan and R. de Queiroz, "Identification of bitmap compression history:JPEG detection and quantizer estimation,"IEEE Trans. Image Process,vol. 12, no. 2,pp. 230–235,Feb. 2003.
  2. M. Chen, J. Fridrich, M. Goljan, and J. Luká?s, "Determining image origin and integrity using sensor noise," IEEE Trans. Inf. ForensicsSecurity, vol. 3, no. 1, pp. 74–90, Mar. 2008.
  3. Mathew C. Stamm and K. J. Ray Liu," Anti-Forensic of Digital Image Compression", IEEE Transaction on Information forensics And security, Vol. 6,No. 3,September2011.
  4. S. Ye, Q. N. Sun, and E. -C. Chang, "Detecting digital image forgeries by measuring nconsistencies of blocking artifact," in Proc. IEEE Int. Conf. Multimedia Expo, 2007, pp. 12–15.
  5. J. He, Z. Lin, L. Wang, and X. Tang, "Detecting doctored JPEG images via DCT coefficient analysis," in Proc. Eur. Conf. Computer Vision,May 2006, vol. 3593, pp. 423–435.
  6. W. S. Lin, S. K. Tjoa, H. V. Zhao, and K. J. R. Liu, "Digital image source coder forensics via intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 460–475, Sep. 2009.
  7. W. Pennebaker and J. Mitchell, JPEG: Still Image Data Compression Standard. New York: Van Nostrand Reinhold, 1993.
  8. M. Chen, J. Fridrich, M. Goljan, and J. Luká?s, "Determining image origin and integrity using sensor noise," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74–90, Mar. 2008.
  9. J. Luká?s and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," in Proc. Digital Forensic Research Workshop, Aug. 2003, pp. 5–8.
  10. Avcibas, S. Bayram, N. Memon, M. Ramkumar, and B. Sankur, "A classifier design for detecting image manipulations," in Proc. IEEE Int. Conf. Image Process. , Oct. 2004, vol. 4, pp. 2645–2648.
  11. M. C. Stamm and K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492–506, Sep. 2010.
  12. W. Pennebaker and J. Mitchell, JPEG: Still Image Data Compression Standard. New York: Van Nostrand Reinhold, 1993.
  13. R. Rosenholtz and A. Zakhor, "Iterative procedures for reduction of blocking effects in transform image coding," IEEE Trans. Circuits Syst. Video Technol. , vol. 2, pp. 91–94, Mar. 1992.
  14. Z. Fan and R. Eschbach, "JPEG decompression with reduced artifacts," in Proc. IS&T/SPIE Symp. Electronic Imaging: Image and Video Compression, San Jose, CA, Feb. 1994.
  15. Z. Fan and F. Li, "Reducing artifacts in JPEG decompression by segmentation and smoothing," in Proc. IEEE Int. Conf. Image Processing,vol. II, 1996, pp. 17–20.
  16. Luo, C. W. Chen, K. J. Parker, and T. S. Huang, "Artifact reduction in low bit rate DCT-based image compression," IEEE Trans. Image Processing, vol. 5, pp. 1363–1368, 1996.
  17. Chou, M. Crouse, and K. Ramchandran, "A simple algorithm for removing blocking artifacts in block-transform coded images," IEEE Signal Processing Lett. , vol. 5, pp. 33–35, Feb. 1998.
  18. Sir M. Kendall and A. Stuart, The Advanced Theory of Statistics. New York: Macmillan, 1977, vol. 2. Independent JPEG Group Library. . [Online]. Available:http://www. ijg. org.
  19. Swaminathan,M. Wu, and K. J. R. Liu, "Digital image forensics via intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101–117, Mar. 2008.
  20. Weiqi Luo, Jiwu Huang and Guoping Qiu," JPEG Error Analysis and Its Applications to Digital Image Forensics", IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, Sep. 2010. [
  21. http://sig. umd. edu/events/ [
  22. http://www. scribd. com [
  23. http://www. docstoc. com/docs/108996696/Advances-in-Digital-Image-Processing-and-Information- Technology
Index Terms

Computer Science
Information Sciences

Keywords

JPEG compression Image history Image coefficients Digital forensics Anti-forensics