UNIVERSAL COUNTER FORENSICS METHODS FOR FIRST ORDER STATISTICS M. Barni, M. Fontani, B. Tondi, G. Di Domenico Dept. of Information Engineering, University.

Slides:



Advertisements
Similar presentations
Object Specific Compressed Sensing by minimizing a weighted L2-norm A. Mahalanobis.
Advertisements

Feature-Based Steganalysis for JPEG images and its applications for future design of steganographic schemes. - Jessica Fridrich Submitted by: Praveena.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Hongliang Li, Senior Member, IEEE, Linfeng Xu, Member, IEEE, and Guanghui Liu Face Hallucination via Similarity Constraints.
Chapter 4: Image Enhancement
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Artefact-based methods for video quality prediction – Literature survey and state-of- the-art Towards hybrid video quality models.
Assessment. Schedule graph may be of help for selecting the best solution Best solution corresponds to a plateau before a high jump Solutions with very.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
A New Scheme for Progressive Image Transmission and Flexible Reconstruction with DCT Minqing Xing and Xue Dong Yang Department of Computer Science University.
Introduction to Image Quality Assessment
Watermarking For Image Authentication Presented by San-Hao Wang.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Image Enhancement.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
T.Sharon-A.Frank 1 Multimedia Image Compression 2 T.Sharon-A.Frank Coding Techniques – Hybrid.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
1 Motivation Video Communication over Heterogeneous Networks –Diverse client devices –Various network connection bandwidths Limitations of Scalable Video.
A Review on: Spread Spectrum Watermarking Techniques
Normalization of the Speech Modulation Spectra for Robust Speech Recognition Xiong Xiao, Eng Siong Chng, and Haizhou Li Wen-Yi Chu Department of Computer.
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
Retaliating Anti-forensics of JPEG Image Compression Based On the Noise Level Estimation PROPOSAL SPRING 2015 ADVISOR: Dr. K.R.Rao Presented by, Komandla.
Presented by Tienwei Tsai July, 2005
1 Jayanta Mukhopadhyay Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur, , India
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Multiple Image Watermarking Applied to Health Information Management
MDDSP Literature Survey Presentation Eric Heinen
CIS 601 Image ENHANCEMENT in the SPATIAL DOMAIN Dr. Rolf Lakaemper.
Image Compression – Fundamentals and Lossless Compression Techniques
Eyes detection in compressed domain using classification Eng. Alexandru POPA Technical University of Cluj-Napoca Faculty.
Retaliating Anti-forensics of JPEG Image Compression Based On the Noise Level Estimation FINAL PRESENTATION SPRING 2015 ADVISOR: Dr. K.R.Rao Presented.
Non-Photorealistic Rendering and Content- Based Image Retrieval Yuan-Hao Lai Pacific Graphics (2003)
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
2005/12/021 Content-Based Image Retrieval Using Grey Relational Analysis Dept. of Computer Engineering Tatung University Presenter: Tienwei Tsai ( 蔡殿偉.
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
CVPR2013 Poster Detecting and Naming Actors in Movies using Generative Appearance Models.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Spatial Smoothing and Multiple Comparisons Correction for Dummies Alexa Morcom, Matthew Brett Acknowledgements.
October 1, 2013Computer Vision Lecture 9: From Edges to Contours 1 Canny Edge Detector However, usually there will still be noise in the array E[i, j],
1 Transform Domain Fragile Image Watermark Prof. Ja-Ling Wu Graduate Institute of Networking and Multimedia Dept. of Computer Science and Information Engineering.
 Forensics of image re-sampling (such as image resizing) is an important issue,which can be used for tampering detection, steganography, etc.  Most of.
Discriminative Training and Machine Learning Approaches Machine Learning Lab, Dept. of CSIE, NCKU Chih-Pin Liao.
1 Marco Carli VPQM /01/2007 ON BETWEEN-COEFFICIENT CONTRAST MASKING OF DCT BASIS FUNCTIONS Nikolay Ponomarenko (*), Flavia Silvestri(**), Karen.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
YASS Yet Another Steganographic Scheme that Resists Blind Steganalysis K. Solanki*, A. Sarkar +, and B. Manjunath Vision Research Laboratory Department.
Image Contrast Enhancement Based on a Histogram Transformation of Local Standard Deviation Dah-Chung Chang* and Wen-Rong Wu, Member, IEEE IEEE TRANSACTIONS.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Image Enhancement Band Ratio Linear Contrast Enhancement
Image Processing Architecture, © Oleh TretiakPage 1Lecture 5 ECEC 453 Image Processing Architecture Lecture 5, 1/22/2004 Rate-Distortion Theory,
An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining Presented by C.C. Chang Dept. of Computer Science and Information.
PERFORMANCE ANALYSIS OF VISUALLY LOSSLESS IMAGE COMPRESSION
Watermarking for Image Authentication ( Fragile Watermarking )
Pei Qi ECE at UW-Madison
Increasing Watermarking Robustness using Turbo Codes
Image Segmentation Techniques
Historic Document Image De-Noising using Principal Component Analysis (PCA) and Local Pixel Grouping (LPG) Han-Yang Tang1, Azah Kamilah Muda1, Yun-Huoy.
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
Handwritten Characters Recognition Based on an HMM Model
Spread Spectrum Watermarking
Reduction of blocking artifacts in DCT-coded images
CIS 4350 Image ENHANCEMENT SPATIAL DOMAIN
Author: Minoru Kuribayashi, Hatsukazu Tanaka
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Presentation transcript:

UNIVERSAL COUNTER FORENSICS METHODS FOR FIRST ORDER STATISTICS M. Barni, M. Fontani, B. Tondi, G. Di Domenico Dept. of Information Engineering, University of Siena (IT)

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Outline 1. MultiMedia Forensics & Counter-Forensics 2. Universal counter-forensics 3. Proposed approach 1. Application to pixel domain 2. Application to DCT domain 4. Results and discussion

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics MM Forensics & Counter-Forensics MM Forensics: Goal: investigate the history of a MM content Rapidly evolving field, but… Countermeasures are evolving too! Counter-Forensics: Goal: edit a content without leaving traces (fingerprints) project

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Forensics & Counter-Forensics MM Forensics is evolving rapidly… Countermeasures are evolving too! Counter-Forensics goal: allow to alter a content without leaving traces (fingerprints) Counter Forensics Taxonomy [K07] ScopeUniversalTargetedApproachIntegrated Post- processing [K07] M. Kirchner and R. Böhme, “Tamper hiding: Defeating image forensics,” in Information Hiding, ser. Lecture Notes in Computer Science, vol Springer,2007,pp. 326–341.

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics General idea: A. If you know what statistic is used by the analyst B. just adapt the statistic of your forgery to be very close to the statistic of “good” sequences C. Any detector based on that statistic will be fooled! Game Theory: This scenario can be seen as a game [B12] Forensic Analyst vs. Attacker Different games are possible: ① The adversary directly know the statistic of the “untouched sequences” ② The adversary only has a training set of “untouched sequences” [B12] M. Barni. A game theoretic approach to source identification with known statistics. In Proc. of ICASSP 2012, IEEE Int. Conference on Acoustics, Speech, and Signal Processing, 2012.

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Fool a detector = force it to misclassify Approach: make the processed image statistic close to that of (an) untouched image If it’s close enough… the detector must do a false-positive or a false-negative error Assumptions: Analyst’s detector relies only on first order statistics Adversary has a database (DB) of histograms of untouched images So the adversary: Processes the image Searches the DB for the nearest untouched histogram Computes a transformation map from one histogram to the another Applies the transformation, minimizing perceptual distortion Outline of the scheme

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Practical applications We show how the proposed method can be used for two different CF tasks: Hiding traces left by processing operations in the histogram of pixel values Hiding traces left by double JPEG compression in the histogram of quantized DCT coefficients You will notice that switching between different domains do not change the scheme, but just the implementation of each “block”

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Application #1 Conceal traces in the image histogram We propose a method to conceal traces left by any processing operation in the image histogram Many detectors exist based on histogram analysis: Detection of Contrast Enhancement (pixel histogram) [S08] Detection of double JPEG compression (histograms of DCT coefficients) [B12] We make no assumptions on the previous processing [S08] M. C. Stamm and K. J. R. Liu. Blind forensics of contrast enhancement in digital images. In Proc. of ICIP 2008, pages 3112– 3115, [B12] T.Bianchi, A.Piva, "Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts", IEEE Transactions on Information Forensics & Security, Volume: 7, Issue: 3, Page(s):

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Basic notation Y and h Y denote the processed image and its histogram X and h X denote the untouched image and its histogram Z and h Z denote the attacked image and its histogram Γ denotes the set of histograms (in the database) respecting possible constraints imposed by the attacker (e.g: retaining a minimum contrast) With ν * we always denote the normalized version of the h * histogram

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Goal: search a database of untouched image histograms to find h* such that: It has the most similar shape w.r.t. h Y It belongs to Γ We propose to use the Chi-square distance, defined as Therefore, the retrieved histogram is Phase 1: histogram retrieval

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Phase 2: histogram mapping Goal: find the best mapping matrix that turns to number of pixels to be moved from value to A maximum distortion constraint is given, that avoid changes bigger than of the value of a pixel We choose the Kullback-Leibler divergence to measure the statistical dissimilarity between the histograms, and yield the following optimization problem: Convex! Mixed Integer Non Linear Problem 

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Phase 3: pixel remapping We have the mapping matrix, but which specific pixels should be changed? Intuition: editing pixels in textured/high-variance regions causes smaller perceptual impact We propose an iterative approach: for each couple (i,j) 1. Evaluate the SSIM map between Z and Y 2. Find pixels having value i, and: a. scan these pixels by decreasing SSIM, change the first n(i  j) to j b. mark edited pixels as “unchangeable”, repeat 2. for (i, j+1) 3. If no more pixel of value i have to be remapped, repeat from 1., with (i+1,j) Remarks SSIM map evaluated iteratively, to take into account on-going modifications Obtained image will have, by construction, the desired histogram Pixel Remapping DB

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Advantage of iterative remapping If SSIM map is not iteratively computed, visible artifact are likely to appear… Without iterative update With iterative update

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Experimental validation We use the proposed technique to hide traces left by: Gamma-correction Histogram Stretching Both these operators leave strong traces in image histogram: 14\ Original Gamma Corrected Equalized Original Gamma Corrected Original Equalized

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Experimental validation We use the proposed technique to hide traces left by: Gamma-correction Histogram Stretching (equalization) Both these operators leave strong traces in image histogram Original Gamma Corrected Equalized

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Case study Original Image Processed image (gamma-correction) Resulting histogram Remapped histogram Remapped image Histogram from DB Histogram Database Search Best match

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics DB histogram Before Counter-Forensics After Counter-Forensics D max = 4

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Histogram enhancement detection Stamm’s detector [S08] It detects the peak-and-gap behavior of the histogram This is done by considering the contribution of high-frequencies in the Fourier transform of the histogram OriginalGamma CorrectedEqualized [S08] M. C. Stamm and K. J. R. Liu. Blind forensics of contrast enhancement in digital images. In Proc. of ICIP 2008, pages 3112– 3115, 2008.

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Dataset & Experiment setup Database of untouched histograms from JPEG images (MIRFLICKR dataset). Total weigth: ~10MB Apply gamma-correction and histogram equalization to 1300 images from the UCID dataset Each processed image is “attacked” with the proposed technique, using {2,4,6} as values for the D max constraint We constrain the database search to histograms whose contrast is not smaller than that of the enhanced image (this is our Γ ) We evaluate performance of Stamm detector in distinguishing: Processed vs. untouched images Processed&Attacked vs. untouched images We evaluate the similarity between attacked and processed images using: PSNR (“mathematical” metric) Structural Similarity Index (“perceptual” metric) [W04]

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Experimental results Results in countering detection of gamma-correction Attacked – Processed distance

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Experimental results Results in countering detection of histogram equalization Attacked – Processed distance

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Application #2 Conceal traces in the image histogram Method to conceal traces left by double compression in the histograms of quantized DCT coefficients Huge number of detectors exploit double quantization, e.g.: Estimation of previous compression [P08] Forgery detection [H06] [P08] T. Pevny and J. Fridrich, “Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images,” Proceedings of SPIE, vol. 6819, pp –681911–13, 2008 [H06] J. He, Z. Lin, L. Wang, and X. Tang, “Detecting doctored JPEG images via DCT coefficient analysis,” in Lecture Notes in Computer Science. Springer, 2006, pp. 423–435.

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Double Quantization DQ is a sequence of three steps: 1. quantization with step b 2. de-quantization with step b 3. quantization with step a Characteristic gaps

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics More on DQ… Why is it interesting? Allows forgery detection Tells something about the history of the content (e.g. fake quality problem) NOTICE: Effect is visible when first quantization is stronger than the second The behavior is observed in the histogram of quantized DCT coefficients If JPEG compression has been carried, holes are always present in the histogram of de-quantized coefficients

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics More on DCT histograms… Double JPEG compression leaves the trace in the histogram of each DCT coefficient How is this histogram calculated? Intuition: 8x8 DCT Single blocks Image Block-wise DCT Coeff. Analysis

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Perception in the DCT domain Understand relationship between changes in the DCT domain and effects in the spatial domain Just Noticeable Difference (JND) => minimum amount of change in a coefficient leading to a visible artifact Watson defined JND for the DCT case, taking into account Human Visual System (HVS) properties: More sensitive to low frequencies Luminance masking: brighter blocks can be changed more Contrast masking: more contrast allows more editing

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics What we want to do In this case, traces are left in DCT histograms of quantized coefficients… We must change these histograms, to make them similar to those of an singly-compressed image! We need to revisit the previous application to adapt to the DCT domain More histograms (64 instead of 1) More variables (coefficients vary from to 1016) Less intuitive remapping rules…

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Histogram retrieval… revisited! Need all DCT histograms of singly compressed images Just take some JPEG images and extract them? NO! DCT histograms depends on the undergone quantization Search would be practically dominated by this fact We need to simulate JPEG compressed images: Take DCT histograms of never-compressed images During search, quantize each of them with the same factor of the query histogram Distances may be weighted, to give more importance to low frequency coeffs

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Histogram mapping… revisited! The problem is the very same, repeated 64 times Problem: how to set the perceptual constraint (D max )? Idea: make it depend on JNDs => allow at most the amount of change leading to a JND Here we cannot exploit local information (luminance/contrast) Notice: we’re working on quantized coefficients! Changes will be expanded after de-quantization! => Watson’s matrix must be divided by the quantization step

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Pixel mapping… revisited! We have to move some DCT coefficients from a value to another… how do we choose them? We exploit Watson model again This time, we can exploit local information too Algorithm: 1. Evaluate the JND for all blocks; 2. For each element n(i  j ) a. Find coefficients having value i, and: b. scan these coeffs by decreasing JND, change the first n(i  j) to j c. mark edited coeffs as “unchangeable”, repeat 2. for (i, j+1) 3. If no more pixel of value i have to be remapped, repeat from 2., with (i+1,j)

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Does it work so smoothly? No, it doesn’t Artifacts show up, probably due to the high number of changed coefficients in high frequencies Possible solutions Consider the joint impact of changes in more than one frequency Anything else? [open question!] However, most detectors usually rely on low-frequency coefficients We made some experiments remapping only the first 16 (in zig-zag ordering) coefficients

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Experimental setup: detector We implement a detector for double compression based on calibration Calibration allows to estimate the original distribution of a quantized signal Basic idea with JPEG: Cut small number of rows/ columns Compute 8x8 DCT and histograms Read from file Estimated

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Experimental setup: method 200 TIFF (never compressed) images Experiment consists in evaluating detector performance before and after counter – attack Compress Run detector Re- Compress Run detector Remove traces Run detector Detector evaluated in these tasks: Discriminate single- vs. double- compressed images Discriminate single- vs. attacked images We do not want to cheat i.e., we do not use threshold values from the first experiment to do classification in the second

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Experimental results Mean SSIM: Mean PSNR: 42.9 dB

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Conclusions Our universal CF methods allow to conceal traces left by any processing in the first-order statistic Evaluation of the effectiveness should probably rely on statistic measures rather than on detectors Future works: Explore connections with Optimal Transportation theory Explore the use on un-quantized DCT coefficients (conceal traces of single compression) Develop an integrated method to re-compress an image without leaving traces Explore the use of different objective function for the histogram mapping problem

MM&SEC 2012 – Coventry, UK Universal Counter-Forensics Thank you Questions? Acknowledgments This work has been supported by the REWIND project