
Recent Advances in Passive Digital Image Security Forensics: A Brief Review
Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, Xiao-Sa Huang
Engineering ›› 2018, Vol. 4 ›› Issue (1) : 29-39.
Recent Advances in Passive Digital Image Security Forensics: A Brief Review
With the development of sophisticated image editing and manipulation tools, the originality and authenticity of a digital image is usually hard to determine visually. In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. Compared with active forensics approaches that require embedding additional information, passive forensics approaches are more popular due to their wider application scenario, and have attracted increasing academic and industrial research interests. Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or specific patterns in image forgeries left during the image storage or editing. By analyzing the above patterns, the originality of an image can be authenticated. In this paper, a brief review on passive digital image forensic methods is presented in order to provide a comprehensive introduction on recent advances in this rapidly developing research area. These forensics approaches are divided into three categories based on the various kinds of traces they can be used to track—that is, traces left in image acquisition, traces left in image storage, and traces left in image editing. For each category, the forensics scenario, the underlying rationale, and state-of-the-art methodologies are elaborated. Moreover, the major limitations of the current image forensics approaches are discussed in order to point out some possible research directions or focuses in these areas.
Digital image forensics / Image-tampering detection / Multimedia security
[1] |
|
[2] |
|
[3] |
G. Zhou, D. Lv. An overview of digital watermarking in image forensics. Proceedings of 2011 Fourth International Joint Conference on Computational Sciences and Optimization; 2011 Apr 15-19; Yunnan, China, IEEE Computer Society, Washington, DC (2011), pp. 332-335
|
[4] |
|
[5] |
|
[6] |
K.S. Choi, E.Y. Lam, K.K.Y. Wong. Source camera identification using footprints from lens aberration. N. Sampat, J.M. DiCarlo, R.A. Martin (Eds.), Proceedings of SPIE—Electronic Imaging 2006: Digital Photography II; 2006 Jan 16-19; San Jose, CA, USA, International Society for Optics and Photonics, Bellingham (2006), pp. 172-179
|
[7] |
|
[8] |
|
[9] |
|
[10] |
|
[11] |
|
[12] |
S. Gao, G. Xu, RM. Hu. Camera model identification based on the characteristic of CFA and interpolation. IWDW'11 Proceedings of the 10th International Conference on Digital-Forensics and Watermarking; 2011 Oct 23-26; Atlantic City, NJ, USA, Springer-Verlag, Berlin (2012), pp. 268-280. DOI: 10.1007/978-3-642-32205-1_22
|
[13] |
|
[14] |
|
[15] |
|
[16] |
D. Fu, Y.Q. Shi, W. Su. A generalized Benford’s law for JPEG coefficients and its applications in image forensics. E.J. Delp, P.W. Wong (Eds.), Proceedings of SPIE—Electronic Imaging 2007: Security, Steganography, and Watermarking of Multimedia Contents IX; 2007 Jan 28-Feb 1; San Jose, CA, USA, International Society for Optics and Photonics, Bellingham (2007). 65051L1-11
|
[17] |
|
[18] |
|
[19] |
|
[20] |
|
[21] |
|
[22] |
|
[23] |
|
[24] |
Z. Qu, W. Luo, J. Huang. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication. Proceedings of IEEE International Conference on Acoustic, Speech and Signal Processing; 2008 Mar 30-Apr 4; Las Vegas, NV, USA, IEEE, Piscataway (2008), pp. 1661-1664. DOI: 10.1109/ICASSP.2008.4517946
|
[25] |
|
[26] |
|
[27] |
|
[28] |
|
[29] |
M.K. Johnson, H. Farid. Exposing digital forgeries through specular highlights on the eye. Proceedings of the 9th International Conference on Information Hiding; 2007 Jun 11-13; Saint Malo, France, Springer-Verlag, Berlin (2007), pp. 311-325. DOI: 10.1007/978-3-540-77370-2_21
|
[30] |
|
[31] |
E. Kee, H. Farid. Exposing digital forgeries from 3-D lighting environments. Proceedings of 2010 IEEE International Workshop on Information Forensics and Security; 2010 Dec 12-15; Seattle, WA, USA, IEEE, Piscataway (2010), pp. 1-6
|
[32] |
|
[33] |
|
[34] |
W. Zhang, X. Cao, J. Zhang, J. Zhu, P. Wang. Detecting photographic composites using shadows. Proceedings of 2009 IEEE International Conference on Multimedia and Expo; 2009 Jun 28-Jul 3; New York, NY, USA, IEEE, Piscataway (2009), pp. 1042-1045. DOI: 10.1109/GSIS.2009.5408013
|
[35] |
W. Fan, K. Wang, F. Cayre, Z. Xiong. 3D lighting-based image forgery detection using shape-from-shading. Proceedings of the 20th European Signal Processing Conference; 2012 Aug 27-31; Bucharest, Romania, IEEE, Piscataway (2012), pp. 1777-1781
|
[36] |
|
[37] |
|
[38] |
M. Kirchner, J. Fridrich. On detection of median filtering in digital images. Proceedings of SPIE—Electronic Imaging 2010: Media Forensics and Security II; 2010 Jan 17-21; San Jose, CA, USA, International Society for Optics and Photonics, Bellingham (2010), pp. 7541101-7541112
|
[39] |
G. Cao, Y. Zhao, R. Ni, L. Yu, H. Tian. Forensic detection of median filtering in digital images. Proceedings of 2010 IEEE International Conference on Multimedia and Expo; 2010 Jul 19-23; Singapore, Singapore, IEEE, Piscataway (2010), pp. 89-94. DOI: 10.1109/ICME.2010.5583869
|
[40] |
|
[41] |
C. Chen, J. Ni. Median filtering detection using edge based prediction matrix. Y.Q. Shi, H.J. Kim, F. Pérez-González (Eds.), Proceeding of 10th International Workshop on Digital Forensics and Watermarking; 2011 Oct 23-26; Atlantic City, NJ, USA, Springer-Verlag, Berlin (2012), pp. 361-375. DOI: 10.1007/978-3-642-32205-1_29
|
[42] |
|
[43] |
|
[44] |
|
[45] |
|
[46] |
|
[47] |
G. Cao, Y. Zhao, R. Ni. Detection of image sharpening based on histogram aberration and ringing artifacts. Proceedings of the 2009 IEEE International Conference on Multimedia and Expo; 2009 Jun 28-Jul 3; New York, NY, USA, IEEE, Piscataway (2009), pp. 1026-1029
|
[48] |
|
[49] |
F. Ding, G. Zhu, Y.Q. Shi. A novel method for detecting image sharpening based on local binary pattern. Y. Shi, H.J. Kim, F. Pérez-González (Eds.), Proceedings of 12th International Workshop on Digital Forensics and Watermarking; 2013 Oct 1-4; Auckland, New Zealand, Springer-Verlag, Berlin (2013), pp. 180-191
|
[50] |
|
[51] |
|
[52] |
S. Bayram, H.T. Sencar, N. Memon. An efficient and robust method for detecting copy-move forgery. Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing; 2009 Apr 19-24; Taipei, Taiwan, China, IEEE Computer Society, Washington, DC (2009), pp. 1053-1056. DOI: 10.1109/ICASSP.2009.4959768
|
[53] |
W. Li, N. Yu. Rotation robust detection of copy-move forgery. Proceedings of 2010 IEEE International Conference on Image Processing; 2010 Sep 26-29; Hong Kong, China, IEEE, Piscataway (2010), pp. 2113-2116. DOI: 10.1109/ICIP.2010.5652519
|
[54] |
|
[55] |
|
[56] |
|
[57] |
|
[58] |
|
[59] |
|
[60] |
|
[61] |
|
[62] |
|
[63] |
|
[64] |
|
[65] |
|
[66] |
|
[67] |
|
[68] |
L. Bondi, D. Güera, L. Baroffio, P. Bestagini, E.J. Delp, S. Tubaro. A preliminary study on convolutional neural networks for camera model identification. Proceedings of IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics; 2017 Jan 29-Feb 2; San Francisco, CA, USA, Society for Imaging Science and Technology, Washington, DC (2017), pp. 67-76
|
[69] |
|
[70] |
|
/
〈 |
|
〉 |