Tamper Hiding: Defeating Image Forensics
نویسندگان
چکیده
This paper introduces novel hiding techniques to counter the detection of image manipulations through forensic analyses. The presented techniques allow to resize and rotate (parts of) bitmap images without leaving a periodic pattern in the local linear predictor coefficients, which has been exploited by prior art to detect traces of manipulation. A quantitative evaluation on a batch of test images proves the proposed method’s efficacy, while controlling for key parameters and for the retained image quality compared to conventional linear interpolation.
منابع مشابه
Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection
In this paper, we propose a novel framework to statistically measure the correlation inconsistency in mobile images for tamper detection. By first sampling a number of blocks at different image locations, we extract a set of derivative weights as features from each block using partial derivative correlation models. Through regularizing the within-image covariance eigenspectrum and performing ei...
متن کاملNovel Image Data-Hiding Methodologies for Robust and Secure Steganography with Extensions to Image Forensics
Novel Image Data-Hiding Methodologies for Robust and Secure Steganography with Extensions to Image Forensics
متن کاملDigital Village Hal Berghel Hiding Data , Forensics , and Anti - Forensics Delving
Data hiding has been with us as long as there have been digital computers and networks. Some readers of this column might be old enough to remember data hiding on tracks above 80 of the ubiquitous 5-1/4inch double-sided, double-density floppy disks in the late 1970s. It was not uncommon to store a program key on the upper regions of the disk for copy protection of PC software. The simplicity of...
متن کاملOn the Security of Image Manipulation Forensics
In this paper, we present a unified understanding on the formal performance evaluation for image manipulation forensics techniques. With hypothesis testing model, security is qualified as the difficulty for defeating an existing forensics system and making it generate two types of forensic errors, i.e., missing and false alarm detection. We point out that the security on false alarm risk, which...
متن کاملVideo Data Mining based on Information Fusion for Tamper Detection
In this paper, we propose novel algorithmic models based on information fusion and feature transformation in crossmodal subspace for different types of residue features extracted from several intra-frame and inter-frame pixel sub-blocks in video sequences for detecting digital video tampering or forgery. An evaluation of proposed residue features – the noise residue features and the quantizatio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007