A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hiding Traces Of Median Filtering In Digital Images
2012
Zenodo
Publication in the conference proceedings of EUSIPCO, Bucharest, Romania, 2012 ...
COUNTER-FORENSIC FOR MEDIAN FILTERING In this section we present the proposed counter-forensic technique, that aims at removing traces left by median filtering while preserving a high fidelity of the image ...
An example of median filtered image and its counter-filtered version. ...
doi:10.5281/zenodo.52431
fatcat:hy465syqebenpleg2qiads3j7i
Bibliography of digital image anti-forensics and anti-anti-forensics techniques
2019
IET Image Processing
This leads security professionals and digital investigators to develop more robust forensics tools and counter solutions to defeat adversarial anti-forensics and win the race. ...
With the massive increase of online content, widespread of social media, the popularity of smartphones, and rise of security breaches, image forensics has attracted a lot of attention in the past two decades ...
[42] proposed a robust method for detecting median filtering based on an autoregressive (AR) model. To counter median filtering detectors, Nguyen et al. ...
doi:10.1049/iet-ipr.2018.6587
fatcat:mdgb7i7uxvgz3pqvoggldutufu
The game of countering JPEG anti-forensics based on the noise level estimation
2013
2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference
In this paper, we propose a new countering anti-forensic method based on estimating the noise added in the process of erasing blocking artifacts. ...
There are plenty of forensic techniques making use of image's compression fingerprints to verify digital images. However, when a forger exists, these methods are not reliable any more. ...
Both the window size of the median filter and the variance of the noise can affect the deblocking effect. ...
doi:10.1109/apsipa.2013.6694156
dblp:conf/apsipa/JiangZKL13
fatcat:j4uwqf5utndd3fm64afoyerxbi
Digital Image Forensic: A Brief Review
2017
Foresic Research & Criminology International Journal
To counter anti-forensics, various techniques [17] [18] [19] are also available in which the median filtering detection is difficult due to its nonlinear nature. ...
There is lot of challenges in forensic analysis of digital images. As we can see, there is continuous battle between forensic, anti-forensic and counter anti-forensic techniques. ...
doi:10.15406/frcij.2017.05.00161
fatcat:xhtgpr4oorfgrpgpokgfitb2sm
A Survey of Machine Learning Techniques in Adversarial Image Forensics
[article]
2020
arXiv
pre-print
Image forensic plays a crucial role in both criminal investigations (e.g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation ( ...
Therefore, with a focus on image forensics, this paper surveys techniques that can be used to enhance the robustness of machine learning-based binary manipulation detectors in various adversarial scenarios ...
Acknowledgements The first author thanks members of the Visual Information Processing and Protection (VIPP) group at the University of Siena, Italy for their suggestions. ...
arXiv:2010.09680v1
fatcat:qzvolq6kvrggfbyg23wrcnykza
Identification of Image Operations Based on Steganalytic Features
[article]
2015
arXiv
pre-print
On the other hand, a wise attacker can perform anti-forensics to fool the existing forensic methods, making countering anti-forensics become an urgent need. ...
In our experiments, we have tested several steganalytic features on 11 different kinds of typical image processing operations and 4 kinds of anti-forensic operations. ...
(t)(u)(v) Anti-forensics of rotation with "median", "edge", "dual", respectively. (w) Anti-forensics of median filtering. ...
arXiv:1503.04718v2
fatcat:uin2crpkbjhkrbyuhrgoqg4ykm
A survey of machine learning techniques in adversarial image forensics
2020
Zenodo
Image forensic plays a crucial role in both criminal investigations (e.g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups or political campaigns) ...
Therefore, with a focus on image forensics, this paper surveys techniques that can be used to enhance the robustness of machine learning-based binary manipulation detectors in various adversarial scenarios ...
Acknowledgements The first author thanks members of the Visual Information Processing and Protection (VIPP) group at the University of Siena, Italy for their suggestions. ...
doi:10.5281/zenodo.4560205
fatcat:zuplnvtwhzhbnajteyunddphkq
Counter-Forensics: Attacking Image Forensics
[chapter]
2012
Digital Image Forensics
This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images. ...
Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of ...
Acknowledgements Thanks are due to Gang Cao, Thomas Gloe, and Miroslav Goljan for sharing the data of their original research papers. ...
doi:10.1007/978-1-4614-0757-7_12
fatcat:amg3sagivbd7ho4fgmg5yehwha
Analysis of adversarial attacks against CNN-based image forgery detectors
[article]
2018
arXiv
pre-print
In this paper we analyze the vulnerability of CNN-based image forensics methods to adversarial attacks, considering several detectors and several types of attack, and testing performance on a wide range ...
of common manipulations, both easily and hardly detectable. ...
In addition, deep learning can be used itself for counter-forensics. In [17] , a GAN-based architecture was proposed to conceal the traces of 3×3 median filtering. ...
arXiv:1808.08426v1
fatcat:fo7nn4j5ereknh46po2tfre7gu
Forensic Analysis of Linear and Nonlinear Image Filtering Using Quantization Noise
2016
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Also, experiments against popular anti-forensic algorithms show the counter anti-forensic robustness of the proposed technique. ...
Experiments are performed to compare the performance of the proposed technique with state-of-the-art forensic filtering detection algorithms. ...
In order to counter this problem of reduced performance of forensic algorithms because of median filtering, techniques like [Zhang et al. 2014] , [Chen et al. 2013] , [Kirchner and Fridrich 2010] and ...
doi:10.1145/2857069
fatcat:p7v2akwlhjhi5efpmepvvqteci
Tamper Hiding: Defeating Image Forensics
[chapter]
2007
Lecture Notes in Computer Science
This paper introduces novel hiding techniques to counter the detection of image manipulations through forensic analyses. ...
traces of manipulation. ...
Acknowledgements The first author gratefully acknowledges receipt of a student travel grant awarded by Fondation Michel Métivier, France. ...
doi:10.1007/978-3-540-77370-2_22
fatcat:ogap6kpzkvcopmnomaars35gzy
Hiding Traces of Resampling in Digital Images
2008
IEEE Transactions on Information Forensics and Security
These early findings on "counter-forensic" techniques put into question the reliability of known forensic tools against smart counterfeiters in general, and might serve as benchmarks and motivation for ...
the development of much improved forensic techniques. ...
The database of test images was provided by T. Gloe. ...
doi:10.1109/tifs.2008.2008214
fatcat:6wn367hvargudbkqgo6xvzsto4
Countering JPEG anti-forensics based on noise level estimation
2017
Science China Information Sciences
To deal with this challenge in JPEG forensics, in this paper, we propose a novel countering method based on the noise level estimation to identify the uncompressed images from those forged ones. ...
Quantization artifact and blocking artifact are the two types of well-known fingerprints of JPEG compression. Most JPEG forensic techniques are focused on these fingerprints. ...
Conflict of interest The authors declare that they have no conflict of interest. ...
doi:10.1007/s11432-016-0426-1
fatcat:4dt6wdkf5jfrtdspvpdqn7rmyy
Countering anti-forensics by means of data fusion
2014
Media Watermarking, Security, and Forensics 2014
framework in a Counter-Anti-Forensic (CAF) scenario. ...
In the last years many image forensic (IF) algorithms have been proposed to reveal traces of processing or tampering. ...
ACKNOWLEDGMENTS This work was partially supported by the European Office of Aerospace Research and Development under Grant FA8655-12-1-2138: AMULET -A multi-clue approach to image forensics, and by the ...
doi:10.1117/12.2039569
dblp:conf/mediaforensics/FontaniBPB14
fatcat:jkbkvxjuu5ai5e3jdfrgmloaye
Higher-Order, Adversary-Aware, Double Jpeg-Detection Via Selected Training On Attacked Samples
2018
Zenodo
Publication in the conference proceedings of EUSIPCO, Kos island, Greece, 2017 ...
Not surprisingly, the unaware SVM is also able to counter the double JPEG anti-forensic technique in [10] . ...
A well known problem with forensic tools Attack
D-JPEG
1st order
MPA
Attack
in [17]
wavelet
denoise
median
filtering
copyMove
256x256
AUC
0.99
0.98
0.92
0.79
0.94
0.96
Attack
CLAHE ...
doi:10.5281/zenodo.1159987
fatcat:ezwcu7q53jfq7ded5vkzp67guq
« Previous
Showing results 1 — 15 out of 1,230 results