Intrinsic fingerprints for image authentication and steganalysis

نویسندگان

  • Ashwin Swaminathan
  • Min Wu
  • K. J. Ray Liu
چکیده

With growing popularity of digital imaging devices and low-cost image editing software, the integrity of image content can no longer be taken for granted. This paper introduces a methodology for forensic analysis of digital camera images, based on the observation that many in-camera and post-camera processing operations leave distinct traces on digital images. We present methods to identify these intrinsic fingerprint traces of the various processing operations and employ them to verify the authenticity of digital data. We develop an explicit imaging model to characterize the properties that should be satisfied by a direct camera output, and model any further processing applied to the camera captured image by a manipulation filter. Utilizing the manipulation filter coefficients and reference patterns estimated from direct camera outputs using blind deconvolution techniques, the proposed methods are capable of detecting manipulations made by previously unseen operations and steganographic embedding.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multimedia Forensic Analysis via Intrinsic and Extrinsic Fingerprints

Title of Dissertation: MULTIMEDIA FORENSIC ANALYSIS VIA INTRINSIC AND EXTRINSIC FINGERPRINTS Ashwin Swaminathan, Doctor of Philosophy, 2008 Dissertation directed by: Professor Min Wu Department of Electrical and Computer Engineering Digital imaging has experienced tremendous growth in recent decades, and digital images have been used in a growing number of applications. With such increasing pop...

متن کامل

An extended feature set for blind image steganalysis in contourlet domain

The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of Contourlet coefficients. The suspicious image is transformed into Contourlet space, and then the statistics of Contourlet subbands coefficients are extracted as features. We us...

متن کامل

Steganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram

In this paper we present a new accurate steganalysis method for the LSBreplacement steganography. The suggested method is based on the changes that occur in thehistogram of an image after the embedding of data. Every pair of neighboring bins of ahistogram are either inter-related or unrelated depending on whether embedding of a bit ofdata in the image could affect both bins or not. We show that...

متن کامل

A Comprehensive Study of Passive Digital Image Forensics Techniques based on Intrinsic Fingerprints

Over the past decade digital images has become a very popular way to communicate, store and process information. With the rapid advancement and easy availability of technology, there is a flood of devices that are able to capture, store and create digital images. Over the past years image processing techniques have been developed that makes it really easy to tamper images. From journalism to so...

متن کامل

Classifiers and machine learning techniques for image processing and computer vision

We propose the use of classifiers and machine learning techniques to extract useful information from data sets (e.g., images) to solve important problems in Image Processing and Computer Vision. We are interested in: two and multiclass image categorization, hidden messages detection, discrimination among natural and forged images, authentication, and multi-classification. Keywords-Machine Learn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007