Statistical and deterministic approaches for multimedia forensics

نویسنده

  • Cecilia Pasquini
چکیده

The increasing availability and pervasiveness of multimedia data in our society is before our very eyes. As a result of globalization and worldwide connectivity, people from all over the planet are exchanging constantly increasing amounts of images, videos, audio recordings on a daily basis. Coupled with the easy access to user-friendly editing software, this poses a number of problems related to the reliability and trustworthiness of such content, as well as its potential malevolent use. For this reason, the research field of multimedia forensics focuses on the development of forensic tools for verifying the authenticity of multimedia data. The hypothesis of pristine status of images, videos or audio tracks is called into question and can be rejected if traces of manipulation are detected with a certain degree of confidence. In this framework, studying traces left by any operation that could have been employed to process the data, either for malicious purposes or simply to improve their content or presentation, turns out to be of interest for a comprehensive forensic analysis. The goal of this doctoral study is to propose contributions to the forensic task of detecting certain processing operations in multimedia data, with particular attention to digital images. The general rationale behind our work is to leverage statistical and deterministic properties that are common to the kind of data under investigation. As it is shown in our results, this helps the forensic analysis in several directions, like assessing the confidence of a certain decision or avoiding preliminary training phases by exploiting closed-form theoretical derivations. With this respect, much work has been devoted to the study of JPEG compression traces in digital images, resulting in the development of several innovative approaches. Moreover, we have explored the possibility of defining and exploiting deterministic properties related to a certain processing operation in the forensic analysis, presenting a first approach targeted to the detection in one-dimensional data of a common data smoothing operation, the median filter. The main contributions of our work are detailed as follows: I Detection of JPEG compression traces in uncompressed format images. Intrinsic statistical properties of natural uncompressed images are used in image forensics for detecting traces of previous processing operations. The distribution of Benford-Fourier coefficients is derived theoretically both under the hypotheses of no compression and previous compression with a certain quality factor, allowing also for Correspondence to: [email protected] Recommended for acceptance by David Vázquez Bérmudez DOI http://dx.doi.org/10.5565/rev/elcvia.984 ELCVIA ISSN:1577-5097 Published by Computer Vision Center / Universitat Autònoma de Barcelona, Barcelona, Spain C. Pasquini et al. / Electronic Letters on Computer Vision and Image Analysis 15(2):16-18, 2016 17 the computation of the respective likelihood functions. Then, three novel classification tests based on different statistics are proposed [6, 4], relying on discriminative thresholds that can be determined automatically (without the need of any training phase) and proving to be suitable for images of different size and source camera. Experiments on real images and comparisons with state-of-art techniques show that the proposed approach outperforms existing ones and overcomes issues due to dataset-dependency. A pictorial example of the capability of the method is reported in Fig. 1 (blue case). II Detection of multiple JPEG compression traces in JPEG images. The analysis of Benford–Fourier coefficients is extended to the case of JPEG images, resulting in a forensic method for the identification of multiple aligned JPEG compressions and the estimation of the corresponding quality factors based on an hypothesis testing scheme [3]. In principle, the technique allows for the detection of an arbitrary number of compressions, depending on the pool of the tested alternative hypotheses. Experimental results show that the performance of the proposed technique is good also in the case of last compression heavier than the previous ones, where existing methods usually lead to high false negative rates. Moreover, the entire chain of JPEG compression is reconstructed also in case of triple compressed images (while existing methods generally estimate only one previous quality factor applied) and the effectiveness of the method is also explored in the challenging case of double high quality JPEG compression [7], for which specific improvements are adopted. A pictorial example of the capability of the method is reported in Fig. 1 (red case). III Counterforensics of JPEG images. Two counterforensic techniques are proposed for the reconstruction of statistical properties of natural and JPEG images. They both target the modification of the First Significant Digit (FSD) histogram of the DCT coefficients, in order to conceal traces of single and, in some cases, multiple compression. The first one operates in the FSD modular logarithmic domain, from which FSD and DCT coefficients distribution typical of uncompressed images are consequently reconstructed [1]. On the other hand, the second one directly targets the reconstruction of a given FSD histogram and can be seen as universal to detectors based on FSD first-order histogram [5]. Based on heuristic criteria, the technique provides a close-to-optimal solution for the problem of FSD histogram modification with minimal distortion in terms of Mean Square Error (MSE) distortion. Both methods are compared with a well-established existing anti-forensic attacks in terms of quality of the resulting image, showing generally superior performances. IV Deterministic detection of median filtering in data sequences. This work represents our first attempt to define and leverage properties that are deterministically related to a certain processing, in contrast with typical forensic methodologies based on statistical properties. We propose a forensic technique able to detect the application of a median filter to 1D data [2]. Relying on deterministic mathematical properties of the median filter, we identify specific order relationships among the sample values that cannot be found in filtered sequences. Hence, their presence in the analyzed 1D sequence allows excluding the application of the median filter. Due to its deterministic nature, the method ensures a null false negative rate and, although false positives (not filtered sequences classified as filtered) are theoretically possible, experimental results show that the false alarm rate is null for sufficiently long sequences. Besides, the proposed technique has the capability to locate with good precision a median filtered part of 1D data and provides a good estimate of the window size used. For each of the innovative contribution, experimental validation on benchmarking datasets has been carried out, thus identifying the pros and cons with respect to existing tools, as well as aspects leaving space of improvement. With this respect, we can observe that the proposed solutions have the positive features to be largely independent from the semantic content of the objects under investigation and to require none or very limited training phases on preliminary datasets. Thus, they can be considered as off-the-shelf tools to analyze data with diverse content and coming from diverse sources. 18 C. Pasquini et al. / Electronic Letters on Computer Vision and Image Analysis 15(2):16-18, 2016

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The effect of communication skills training through multimedia on the self-esteem of female students with hearing loss

The current study aims to peruse the effectiveness of teaching communicative skills through multimedia on the self-esteem of girl students with hearing problem. The research methodology is of semi empirical type and statistical population encompassed the whole girl students with hearing problem at sixth grade in Tehran city. With sampling method, thirty students were selected and randomly were ...

متن کامل

Title of dissertation : FUNDAMENTAL LIMITS IN MULTIMEDIA FORENSICS AND ANTI - FORENSICS

Title of dissertation: FUNDAMENTAL LIMITS IN MULTIMEDIA FORENSICS AND ANTI-FORENSICS Xiaoyu Chu, Doctor of Philosophy, 2015 Dissertation directed by: Professor K. J. Ray Liu Department of Electrical and Computer Engineering As the use of multimedia editing tools increases, people become questioning the authenticity of multimedia content. This is specially a big concern for authorities, such as ...

متن کامل

Comparison of the deterministic and fuzzy approaches in HR planning

Supplying required human resource is one of the strategic goals of an organization. Therefore, organizations plan and predict the required human resources in order to prevent this problem. Present study using practical approach seeks to assist organizations to achieve their various goals in human resources planning. The designed model in this study clarifies vague, inaccurate, and fuzzy exp...

متن کامل

Bridging biometrics and forensics

This paper is a survey on biometrics and forensics, especially on the techniques and applications of face recognition in forensics. This paper describes the differences and connections between biometrics and forensics, and bridges each other by formulating the conditions when biometrics can be applied in forensics. Under these conditions, face recognition, as a non-intrusive and non-contact bio...

متن کامل

Comparison of the deterministic and fuzzy approaches in HR planning

Supplying required human resource is one of the strategic goals of an organization. Therefore, organizations plan and predict the required human resources in order to prevent this problem. Present study using practical approach seeks to assist organizations to achieve their various goals in human resources planning. The designed model in this study clarifies vague, inaccurate, and fuzzy exp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016