Understanding digital image anti-forensics: an analytical review

被引:0
|
作者
Neeti Taneja
Vijendra Singh Bramhe
Dinesh Bhardwaj
Ashu Taneja
机构
[1] Sharda University,Department of Computer Science & Engineering, Sharda School of Engineering & Technology
[2] Thapar Institute of Engineering and Technology,Department of Electronics & Communication Engineering
[3] Chitkara University,Chitkara University Institute of Engineering and Technology
来源
关键词
Blocking artifacts; Anti-forensics; JPEG compression; MFR; CNN;
D O I
暂无
中图分类号
学科分类号
摘要
Image forensics is essential for detecting image manipulation, authenticating images, and identifying sources of images. A forensic analyst can make use of various artifacts to develop a powerful forensic technique. These artifacts include JPEG blocking and quantization artifacts, streaking artifacts and contrast enhancement artifacts, etc. With the introduction of anti-forensics, it has become difficult for forensic experts to identify forged images. There are various anti-forensic methods available that try to eradicate these detection footprints/artifacts to fool the existing forensic detectors. Thus the detection of anti-forensic attacks is very crucial and plays a vital role in forensic analysis. This paper presents a review of various types of anti-forensic attacks, such as JPEG anti-forensics, Contrast enhancement anti-forensics, and Median filtering anti-forensics. Firstly a brief introduction is given about image forgery, JPEG compression, contrast enhancement, and median filtering. Then, anti-forensics is described in detail, and finally, the recent state-of-the-art anti-forensic techniques are summarized in tabular form for better understanding. This may be helpful for the forensic analyst to develop robust methods for forgery detection that can be applied in various applications such as the identification of cybercrimes, identity thefts, etc.
引用
收藏
页码:10445 / 10466
页数:21
相关论文
共 50 条
  • [21] Hiding data, forensics, and anti-forensics - Delving into the digital warrens for concealing data.
    Berghel, Hal
    [J]. COMMUNICATIONS OF THE ACM, 2007, 50 (04) : 15 - 20
  • [22] ANTI-FORENSICS OF JPEG COMPRESSION
    Stamm, Matthew C.
    Tjoa, Steven K.
    Lin, W. Sabrina
    Liu, K. J. Ray
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, : 1694 - 1697
  • [23] A Survey On Anti-Forensics Techniques
    Gul, Murat
    Kugu, Emin
    [J]. 2017 INTERNATIONAL ARTIFICIAL INTELLIGENCE AND DATA PROCESSING SYMPOSIUM (IDAP), 2017,
  • [24] ANTI-Forensics - distorting the evidence
    Sartin, Bryan
    [J]. Computer Fraud and Security, 2006, 2006 (05): : 4 - 6
  • [25] Anti-Forensics of Chromatic Aberration
    Mayer, Owen
    Stamm, Matthew C.
    [J]. MEDIA WATERMARKING, SECURITY, AND FORENSICS 2015, 2015, 9409
  • [26] ANTI-FORENSICS OF MEDIAN FILTERING
    Wu, Zhung-Han
    Stamm, Matthew C.
    Liu, K. J. Ray
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 3043 - 3047
  • [27] Temporal Forensics and Anti-Forensics for Motion Compensated Video
    Stamm, Matthew C.
    Lin, W. Sabrina
    Liu, K. J. Ray
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1315 - 1329
  • [28] CONCEALABILITY-RATE-DISTORTION TRADEOFF IN IMAGE COMPRESSION ANTI-FORENSICS
    Chu, Xiaoyu
    Stamm, Matthew C.
    Chen, Yan
    Liu, K. J. Ray
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 3063 - 3067
  • [29] Swap files Anti-Forensics on Linux
    Jadied, Erwid
    [J]. 2016 ASIA PACIFIC CONFERENCE ON MULTIMEDIA AND BROADCASTING (APMEDIACAST), 2016, : 73 - 79
  • [30] Wiping techniques and anti-forensics methods
    Olvecky, Miroslav
    Gabriska, Darja
    [J]. 2018 IEEE 16TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS (SISY 2018), 2018, : 127 - 131