Filters








1,230 Hits in 5.1 sec

Hiding Traces Of Median Filtering In Digital Images

M. Barni, Marco Fontani
2012 Zenodo  
Publication in the conference proceedings of EUSIPCO, Bucharest, Romania, 2012  ...  COUNTER-FORENSIC FOR MEDIAN FILTERING In this section we present the proposed counter-forensic technique, that aims at removing traces left by median filtering while preserving a high fidelity of the image  ...  An example of median filtered image and its counter-filtered version.  ... 
doi:10.5281/zenodo.52431 fatcat:hy465syqebenpleg2qiads3j7i

Bibliography of digital image anti-forensics and anti-anti-forensics techniques

MUHAMMAD ALI QURESHI, El-Sayed El-Alfy
2019 IET Image Processing  
This leads security professionals and digital investigators to develop more robust forensics tools and counter solutions to defeat adversarial anti-forensics and win the race.  ...  With the massive increase of online content, widespread of social media, the popularity of smartphones, and rise of security breaches, image forensics has attracted a lot of attention in the past two decades  ...  [42] proposed a robust method for detecting median filtering based on an autoregressive (AR) model. To counter median filtering detectors, Nguyen et al.  ... 
doi:10.1049/iet-ipr.2018.6587 fatcat:mdgb7i7uxvgz3pqvoggldutufu

The game of countering JPEG anti-forensics based on the noise level estimation

Yunwen Jiang, Hui Zeng, Xiangui Kang, Li Liu
2013 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference  
In this paper, we propose a new countering anti-forensic method based on estimating the noise added in the process of erasing blocking artifacts.  ...  There are plenty of forensic techniques making use of image's compression fingerprints to verify digital images. However, when a forger exists, these methods are not reliable any more.  ...  Both the window size of the median filter and the variance of the noise can affect the deblocking effect.  ... 
doi:10.1109/apsipa.2013.6694156 dblp:conf/apsipa/JiangZKL13 fatcat:j4uwqf5utndd3fm64afoyerxbi

Digital Image Forensic: A Brief Review

Satish Chand
2017 Foresic Research & Criminology International Journal  
To counter anti-forensics, various techniques [17] [18] [19] are also available in which the median filtering detection is difficult due to its nonlinear nature.  ...  There is lot of challenges in forensic analysis of digital images. As we can see, there is continuous battle between forensic, anti-forensic and counter anti-forensic techniques.  ... 
doi:10.15406/frcij.2017.05.00161 fatcat:xhtgpr4oorfgrpgpokgfitb2sm

A Survey of Machine Learning Techniques in Adversarial Image Forensics [article]

Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo
2020 arXiv   pre-print
Image forensic plays a crucial role in both criminal investigations (e.g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (  ...  Therefore, with a focus on image forensics, this paper surveys techniques that can be used to enhance the robustness of machine learning-based binary manipulation detectors in various adversarial scenarios  ...  Acknowledgements The first author thanks members of the Visual Information Processing and Protection (VIPP) group at the University of Siena, Italy for their suggestions.  ... 
arXiv:2010.09680v1 fatcat:qzvolq6kvrggfbyg23wrcnykza

Identification of Image Operations Based on Steganalytic Features [article]

Haodong Li and Weiqi Luo and Xiaoqing Qiu and Jiwu Huang
2015 arXiv   pre-print
On the other hand, a wise attacker can perform anti-forensics to fool the existing forensic methods, making countering anti-forensics become an urgent need.  ...  In our experiments, we have tested several steganalytic features on 11 different kinds of typical image processing operations and 4 kinds of anti-forensic operations.  ...  (t)(u)(v) Anti-forensics of rotation with "median", "edge", "dual", respectively. (w) Anti-forensics of median filtering.  ... 
arXiv:1503.04718v2 fatcat:uin2crpkbjhkrbyuhrgoqg4ykm

A survey of machine learning techniques in adversarial image forensics

Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo
2020 Zenodo  
Image forensic plays a crucial role in both criminal investigations (e.g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups or political campaigns)  ...  Therefore, with a focus on image forensics, this paper surveys techniques that can be used to enhance the robustness of machine learning-based binary manipulation detectors in various adversarial scenarios  ...  Acknowledgements The first author thanks members of the Visual Information Processing and Protection (VIPP) group at the University of Siena, Italy for their suggestions.  ... 
doi:10.5281/zenodo.4560205 fatcat:zuplnvtwhzhbnajteyunddphkq

Counter-Forensics: Attacking Image Forensics [chapter]

Rainer Böhme, Matthias Kirchner
2012 Digital Image Forensics  
This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images.  ...  Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of  ...  Acknowledgements Thanks are due to Gang Cao, Thomas Gloe, and Miroslav Goljan for sharing the data of their original research papers.  ... 
doi:10.1007/978-1-4614-0757-7_12 fatcat:amg3sagivbd7ho4fgmg5yehwha

Analysis of adversarial attacks against CNN-based image forgery detectors [article]

Diego Gragnaniello, Francesco Marra, Giovanni Poggi, Luisa Verdoliva
2018 arXiv   pre-print
In this paper we analyze the vulnerability of CNN-based image forensics methods to adversarial attacks, considering several detectors and several types of attack, and testing performance on a wide range  ...  of common manipulations, both easily and hardly detectable.  ...  In addition, deep learning can be used itself for counter-forensics. In [17] , a GAN-based architecture was proposed to conceal the traces of 3×3 median filtering.  ... 
arXiv:1808.08426v1 fatcat:fo7nn4j5ereknh46po2tfre7gu

Forensic Analysis of Linear and Nonlinear Image Filtering Using Quantization Noise

Hareesh Ravi, A. V. Subramanyam, Sabu Emmanuel
2016 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)  
Also, experiments against popular anti-forensic algorithms show the counter anti-forensic robustness of the proposed technique.  ...  Experiments are performed to compare the performance of the proposed technique with state-of-the-art forensic filtering detection algorithms.  ...  In order to counter this problem of reduced performance of forensic algorithms because of median filtering, techniques like [Zhang et al. 2014] , [Chen et al. 2013] , [Kirchner and Fridrich 2010] and  ... 
doi:10.1145/2857069 fatcat:p7v2akwlhjhi5efpmepvvqteci

Tamper Hiding: Defeating Image Forensics [chapter]

Matthias Kirchner, Rainer Böhme
2007 Lecture Notes in Computer Science  
This paper introduces novel hiding techniques to counter the detection of image manipulations through forensic analyses.  ...  traces of manipulation.  ...  Acknowledgements The first author gratefully acknowledges receipt of a student travel grant awarded by Fondation Michel Métivier, France.  ... 
doi:10.1007/978-3-540-77370-2_22 fatcat:ogap6kpzkvcopmnomaars35gzy

Hiding Traces of Resampling in Digital Images

Matthias Kirchner, Rainer Bohme
2008 IEEE Transactions on Information Forensics and Security  
These early findings on "counter-forensic" techniques put into question the reliability of known forensic tools against smart counterfeiters in general, and might serve as benchmarks and motivation for  ...  the development of much improved forensic techniques.  ...  The database of test images was provided by T. Gloe.  ... 
doi:10.1109/tifs.2008.2008214 fatcat:6wn367hvargudbkqgo6xvzsto4

Countering JPEG anti-forensics based on noise level estimation

Hui Zeng, Jingjing Yu, Xiangui Kang, Siwei Lyu
2017 Science China Information Sciences  
To deal with this challenge in JPEG forensics, in this paper, we propose a novel countering method based on the noise level estimation to identify the uncompressed images from those forged ones.  ...  Quantization artifact and blocking artifact are the two types of well-known fingerprints of JPEG compression. Most JPEG forensic techniques are focused on these fingerprints.  ...  Conflict of interest The authors declare that they have no conflict of interest.  ... 
doi:10.1007/s11432-016-0426-1 fatcat:4dt6wdkf5jfrtdspvpdqn7rmyy

Countering anti-forensics by means of data fusion

Marco Fontani, Alessandro Bonchi, Alessandro Piva, Mauro Barni, Adnan M. Alattar, Nasir D. Memon, Chad D. Heitzenrater
2014 Media Watermarking, Security, and Forensics 2014  
framework in a Counter-Anti-Forensic (CAF) scenario.  ...  In the last years many image forensic (IF) algorithms have been proposed to reveal traces of processing or tampering.  ...  ACKNOWLEDGMENTS This work was partially supported by the European Office of Aerospace Research and Development under Grant FA8655-12-1-2138: AMULET -A multi-clue approach to image forensics, and by the  ... 
doi:10.1117/12.2039569 dblp:conf/mediaforensics/FontaniBPB14 fatcat:jkbkvxjuu5ai5e3jdfrgmloaye

Higher-Order, Adversary-Aware, Double Jpeg-Detection Via Selected Training On Attacked Samples

Mauro Barni, Ehsan Nowroozi, Benedetta Tondi
2018 Zenodo  
Publication in the conference proceedings of EUSIPCO, Kos island, Greece, 2017  ...  Not surprisingly, the unaware SVM is also able to counter the double JPEG anti-forensic technique in [10] .  ...  A well known problem with forensic tools Attack D-JPEG 1st order MPA Attack in [17] wavelet denoise median filtering copyMove 256x256 AUC 0.99 0.98 0.92 0.79 0.94 0.96 Attack CLAHE  ... 
doi:10.5281/zenodo.1159987 fatcat:ezwcu7q53jfq7ded5vkzp67guq
« Previous Showing results 1 — 15 out of 1,230 results