Anti-forensics of median filtering and contrast enhancement

被引:6
|
作者
Sharma, Shishir [1 ]
Ravi, Hareesh [2 ]
Subramanyam, A., V [3 ]
Emmanuel, Sabu [4 ]
机构
[1] McGill Univ, Sch Comp Sci, Montreal, PQ, Canada
[2] Rutgers State Univ, Dept Comp Sci, New Brunswick, NJ USA
[3] Indraprastha Inst Informat Technol, New Delhi, India
[4] Indian Inst Technol, Palakkad, Kerala, India
关键词
Anti-forensics; Median filtering; Contrast enhancement; Huber Markov random field; IMAGE; TRACES;
D O I
10.1016/j.jvcir.2019.102682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital images can be convincingly edited using image editing tools. In order to identify such image processing operations, various forensic techniques have been proposed. In response, anti-forensic operations designed as counter-measures have been devised. In this paper, we propose an anti-forensic technique to counter spatial domain forensic detectors and demonstrate its accuracy on popular image manipulation operations such as median filtering and contrast enhancement. The integrated anti-forensic attack is formulated as an optimization problem. The proposed optimization modifies the image so as to incorporate the median filtering or contrast enhancement operation while ensuring that its spatial characteristics do not change significantly. Through a series of experiments, we prove that the proposed algorithm can severely degrade the performance of median filtering and contrast enhancement detectors. The proposed algorithm also outperforms popular anti-forensic algorithms. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] General Countermeasures of Anti-Forensics Categories
    Al-Mousa, Mohammad Rasmi
    Sweerky, Nael A.
    Samara, Ghassan
    Alghanim, Mohammed
    Hussein, Abla Suleiman Ismail
    Qadoumi, Braa
    PROCEEDINGS OF 2021 GLOBAL CONGRESS ON ELECTRICAL ENGINEERING (GC-ELECENG 2021), 2021, : 5 - 10
  • [32] Anti-forensics: Techniques, detection and countermeasures
    Garfinkel, Sirnson
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 77 - 84
  • [33] A tour through the realm of anti-forensics
    Forte, Dario
    Power, Richard
    Computer Fraud and Security, 2007, 2007 (06): : 18 - 20
  • [34] Android Anti-forensics: Modifying CyanogenMod
    Karlsson, Karl-Johan
    Glisson, William Bradley
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4828 - 4837
  • [35] Analysis of VMware Virtual Machine in Forensics and Anti-Forensics Paradigm
    Riaz, Hammad
    Tahir, Mohammad Ashraf
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 330 - 335
  • [36] Anti-Forensics: The Next Step in Digital Forensics Tool Testing
    Wundram, Martin
    Freiling, Felix C.
    Moch, Christian
    2013 SEVENTH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSICS (IMF 2013), 2013, : 83 - 97
  • [37] Analysis and Implementation of Anti-Forensics Techniques on ZFS
    Cifuentes, J.
    Cano, J. J.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (03) : 1757 - 1766
  • [38] Android anti-forensics through a local paradigm
    Distefano, Alessandro
    Me, Gianluigi
    Pace, Francesco
    DIGITAL INVESTIGATION, 2010, 7 : S83 - S94
  • [39] Countering Anti-Forensics of Lateral Chromatic Aberration
    Mayer, Owen
    Stamm, Matthew C.
    IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, : 15 - 20
  • [40] Anti-Forensics of Lossy Predictive Image Compression
    Li, Yuanman
    Zhou, Jiantao
    IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (12) : 2219 - 2223