Skip to main content
Top

2022 | OriginalPaper | Chapter

Comparative Compression Robustness Evaluation of Digital Image Forensics

Authors : Oliver Remy, Sebastian Strumegger, Jutta Hämmerle-Uhl, Andreas Uhl

Published in: Computational Science and Its Applications – ICCSA 2022

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The robustness of two important digital image forensic tasks (i.e. SIFT-based copy-move forgery detection and PRNU-based camera sensor identification) against four different lossy compression techniques is investigated (while typically, only JPEG compression is considered) to identify the best suited technique for this application scenario. Overall, we find that the accuracy of forensic tasks is reduced for increasing compression strength as expected, however, the relative performance of the compression schemes is different for the two tasks. While JPEG is superior for realistic application settings (where accuracy is in an acceptable range) in SIFT-based copy-move forgery detection, JPEG XR and BPG provide the best option for PRNU-based camera sensor identification, whereas JPEG is clearly impacting this forensic application most severely.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Ardizzone, E., Bruno, A., Mazzola, G.: Detecting multiple copies in tampered images. In: 2010 IEEE International Conference on Image Processing, pp. 2117–2120. IEEE (2010) Ardizzone, E., Bruno, A., Mazzola, G.: Detecting multiple copies in tampered images. In: 2010 IEEE International Conference on Image Processing, pp. 2117–2120. IEEE (2010)
3.
go back to reference Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRef Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRef
4.
go back to reference Zandi, M., Mahmoudi-Aznaveh, A., Mansouri, A.: Adaptive matching for copy-move forgery detection. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 119–124. IEEE (2014) Zandi, M., Mahmoudi-Aznaveh, A., Mansouri, A.: Adaptive matching for copy-move forgery detection. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 119–124. IEEE (2014)
5.
go back to reference Mushtaq, S., Mir, A.H.: Image copy move forgery detection: a review. Int. J. Future Gener. Commun. Netw. 11(2), 11–22 (2018)CrossRef Mushtaq, S., Mir, A.H.: Image copy move forgery detection: a review. Int. J. Future Gener. Commun. Netw. 11(2), 11–22 (2018)CrossRef
6.
go back to reference Abdalla, Y., Iqbal, M.T., Shehata, M.: Copy-move forgery detection and localization using a generative adversarial network and convolutional neural-network. Information 10, 286 (2019)CrossRef Abdalla, Y., Iqbal, M.T., Shehata, M.: Copy-move forgery detection and localization using a generative adversarial network and convolutional neural-network. Information 10, 286 (2019)CrossRef
10.
go back to reference Bilal, M., Habib, H.A., Mehmood, Z., Yousaf, R.M., Saba, T., Rehman, A.: A robust technique for copy-move forgery detection from small and extremely smooth tampered regions based on the DHE-SURF features and mDBSCAN clustering. Australian J. Forensic Sci. 53, 1–24 (2020) Bilal, M., Habib, H.A., Mehmood, Z., Yousaf, R.M., Saba, T., Rehman, A.: A robust technique for copy-move forgery detection from small and extremely smooth tampered regions based on the DHE-SURF features and mDBSCAN clustering. Australian J. Forensic Sci. 53, 1–24 (2020)
11.
go back to reference Saleem, M.: A key-point based robust algorithm for detecting cloning forgery. In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE), vol. 4, pp. 2775–2779 (2014) Saleem, M.: A key-point based robust algorithm for detecting cloning forgery. In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE), vol. 4, pp. 2775–2779 (2014)
12.
go back to reference Do, T.T., Kijak, E., Furon, T., Amsaleg, L.: Deluding image recognition in SIFT-based CBIR systems. In: Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, pp. 7–12. ACM (2010) Do, T.T., Kijak, E., Furon, T., Amsaleg, L.: Deluding image recognition in SIFT-based CBIR systems. In: Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, pp. 7–12. ACM (2010)
13.
go back to reference Chierchia, G., Poggi, G., Sansone, C., Verdoliva, L.: PRNU-based forgery detection with regularity constraints and global optimization. In: 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp.236–241 (2013) Chierchia, G., Poggi, G., Sansone, C., Verdoliva, L.: PRNU-based forgery detection with regularity constraints and global optimization. In: 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp.236–241 (2013)
14.
go back to reference Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)CrossRef Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)CrossRef
15.
go back to reference Fridrich, J.: Digital image forensics. IEEE Signal Process. Mag. 26(2), 26–37 (2009)CrossRef Fridrich, J.: Digital image forensics. IEEE Signal Process. Mag. 26(2), 26–37 (2009)CrossRef
16.
go back to reference Huang, D.Y., Huang, C.N., Hu, W.C., Chou, C.H.: Robustness of copy-move forgery detection under high jpeg compression artifacts. Multimed. Tools Appl. 76, 1509–1530 (2015)CrossRef Huang, D.Y., Huang, C.N., Hu, W.C., Chou, C.H.: Robustness of copy-move forgery detection under high jpeg compression artifacts. Multimed. Tools Appl. 76, 1509–1530 (2015)CrossRef
17.
go back to reference Huang, D.Y., Huang, C.N., Hu, W.C., Chou, C.H.: Robustness of copy-move forgery detection under high jpeg compression artifacts. Multimedia Tools Appl. 76(1), 1509–1530 (2017)CrossRef Huang, D.Y., Huang, C.N., Hu, W.C., Chou, C.H.: Robustness of copy-move forgery detection under high jpeg compression artifacts. Multimedia Tools Appl. 76(1), 1509–1530 (2017)CrossRef
18.
go back to reference Joechl, R., Uhl, A.: Effects of image compression on image age approximation. In: 20th International Workshop on Digital-forensics and Watermarking (IWDW2021), Beijing, China (2021) Joechl, R., Uhl, A.: Effects of image compression on image age approximation. In: 20th International Workshop on Digital-forensics and Watermarking (IWDW2021), Beijing, China (2021)
19.
go back to reference Goljan, M., Chen, M., Comesara, P., Fridrich, J.: Effect of compression on sensor-fingerprint based camera identification. Electron. Imaging. Media Watermark. Secur. Forensics 2016, 1–10 (2016) Goljan, M., Chen, M., Comesara, P., Fridrich, J.: Effect of compression on sensor-fingerprint based camera identification. Electron. Imaging. Media Watermark. Secur. Forensics 2016, 1–10 (2016)
20.
go back to reference Kumawat, C., Pankajakshan, V.: A robust jpeg compression detector for image forensics. Signal Process. Image Commun. 89, 116008 (2020)CrossRef Kumawat, C., Pankajakshan, V.: A robust jpeg compression detector for image forensics. Signal Process. Image Commun. 89, 116008 (2020)CrossRef
21.
go back to reference Stamm, M.C., Liu, K.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)CrossRef Stamm, M.C., Liu, K.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)CrossRef
22.
go back to reference Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.R.: Undetectable image tampering through jpeg compression anti-forensics. In: 2010 IEEE International Conference on Image Processing, pp. 2109–2112 (2010) Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.R.: Undetectable image tampering through jpeg compression anti-forensics. In: 2010 IEEE International Conference on Image Processing, pp. 2109–2112 (2010)
23.
go back to reference Lu, W., Zhang, Q., Luo, S., Zhou, Y., Huang, J., Shi, Y.Q.: Robust estimation of upscaling factor on double jpeg compressed images. IEEE Trans. Cybern. 1–13 (2021) Lu, W., Zhang, Q., Luo, S., Zhou, Y., Huang, J., Shi, Y.Q.: Robust estimation of upscaling factor on double jpeg compressed images. IEEE Trans. Cybern. 1–13 (2021)
24.
go back to reference Diallo, B., Urruty, T., Bourdon, P., Fernandez-Maloigne, C.: Robust forgery detection for compressed images using CNN supervision. Forensic Sci. Int. Rep. 2, 100112 (2020)CrossRef Diallo, B., Urruty, T., Bourdon, P., Fernandez-Maloigne, C.: Robust forgery detection for compressed images using CNN supervision. Forensic Sci. Int. Rep. 2, 100112 (2020)CrossRef
25.
go back to reference Diallo, B., Urruty, T., Bourdon, P., Fernandez-Maloigne, C.: Improving robustness of image tampering detection for compression. In: MMM 2019: MultiMedia Modeling, Thessaloniki, Greece, January 2019 Diallo, B., Urruty, T., Bourdon, P., Fernandez-Maloigne, C.: Improving robustness of image tampering detection for compression. In: MMM 2019: MultiMedia Modeling, Thessaloniki, Greece, January 2019
26.
go back to reference Mandelli, S., Bonettini, N., Bestagini, P., Tubaro, S.: Training CNNs in presence of jpeg compression: Multimedia forensics vs computer vision. In: 2020 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6 (2020) Mandelli, S., Bonettini, N., Bestagini, P., Tubaro, S.: Training CNNs in presence of jpeg compression: Multimedia forensics vs computer vision. In: 2020 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6 (2020)
27.
go back to reference Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRef Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRef
28.
go back to reference Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171(2–3), 180–189 (2007)CrossRef Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171(2–3), 180–189 (2007)CrossRef
29.
go back to reference Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using SIFT algorithm. In: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008. PACIIA 2008, vol. 2, pp. 272–276. IEEE (2008) Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using SIFT algorithm. In: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008. PACIIA 2008, vol. 2, pp. 272–276. IEEE (2008)
30.
go back to reference Mihcak, M.K., Kozintsev, I., Ramchandran, K.: Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. In: Proceedings of 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1999, vol. 6, pp. 3253–3256. IEEE (1999) Mihcak, M.K., Kozintsev, I., Ramchandran, K.: Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. In: Proceedings of 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1999, vol. 6, pp. 3253–3256. IEEE (1999)
31.
go back to reference Pennebaker, W., Mitchell, J.: JPEG - Still Image Compression Standard. Van Nostrand Reinhold, New York (1993) Pennebaker, W., Mitchell, J.: JPEG - Still Image Compression Standard. Van Nostrand Reinhold, New York (1993)
32.
go back to reference Taubman, D., Marcellin, M.: JPEG2000 – Image Compression Fundamentals. Standards and Practice. Kluwer Academic Publishers, The Nethrlands (2002)CrossRef Taubman, D., Marcellin, M.: JPEG2000 – Image Compression Fundamentals. Standards and Practice. Kluwer Academic Publishers, The Nethrlands (2002)CrossRef
33.
go back to reference Dufaux, F., Sullivan, G.J., Ebrahimi, T.: The JPEG XR image coding standard. IEEE Signal Process. Mag. 26(6), 195–199 (2009)CrossRef Dufaux, F., Sullivan, G.J., Ebrahimi, T.: The JPEG XR image coding standard. IEEE Signal Process. Mag. 26(6), 195–199 (2009)CrossRef
34.
go back to reference Li, F., Krivenko, S., Lukin, V.: An approach to better portable graphics (BPG) compression with providing a desired quality. In: 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT), pp. 13–17 (2020) Li, F., Krivenko, S., Lukin, V.: An approach to better portable graphics (BPG) compression with providing a desired quality. In: 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT), pp. 13–17 (2020)
35.
go back to reference Liu, F., Hernandez-Cabronero, M., Sanchez, V., Marcellin, M.W., Bilgin, A.: The current role of image compression standards in medical imaging. Information 8(4), 131 (2017)CrossRef Liu, F., Hernandez-Cabronero, M., Sanchez, V., Marcellin, M.W., Bilgin, A.: The current role of image compression standards in medical imaging. Information 8(4), 131 (2017)CrossRef
36.
go back to reference Hofbauer, H., Rathgeb, C., Wagner, J., Uhl, A., Busch, C.: Investigation of better portable graphics compression for iris biometric recognition. In: Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG 2015), Darmstadt, Germany, p. 8 (2015) Hofbauer, H., Rathgeb, C., Wagner, J., Uhl, A., Busch, C.: Investigation of better portable graphics compression for iris biometric recognition. In: Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG 2015), Darmstadt, Germany, p. 8 (2015)
37.
go back to reference Rathgeb, C., Busch, C., Wagner, J., Pflug, A.: Effects of image compression on ear biometrics. IET Biom. 5(3), 252–261 (2016)CrossRef Rathgeb, C., Busch, C., Wagner, J., Pflug, A.: Effects of image compression on ear biometrics. IET Biom. 5(3), 252–261 (2016)CrossRef
38.
go back to reference Darwiche, M., Pham, T.A., Delalandre, M.: Comparison of jpeg’s competitors for document images. In: 2015 International Conference on Image Processing Theory, Tools and Applications (IPTA), pp. 487–493 (2015) Darwiche, M., Pham, T.A., Delalandre, M.: Comparison of jpeg’s competitors for document images. In: 2015 International Conference on Image Processing Theory, Tools and Applications (IPTA), pp. 487–493 (2015)
39.
go back to reference Wild, P., Štolc, S., Valentín, K., Daubner, F., Clabian, M.: Compression effects on security document images. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pp. 76–79 (2016) Wild, P., Štolc, S., Valentín, K., Daubner, F., Clabian, M.: Compression effects on security document images. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pp. 76–79 (2016)
40.
go back to reference Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forensics Secur. 10(10), 2084–2094 (2015)CrossRef Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forensics Secur. 10(10), 2084–2094 (2015)CrossRef
41.
go back to reference Gloe, T., Böhme, R.: The Dresden image database for benchmarking digital image forensics. In: SAC 2010: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1584–1590ACM (2010) Gloe, T., Böhme, R.: The Dresden image database for benchmarking digital image forensics. In: SAC 2010: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1584–1590ACM (2010)
Metadata
Title
Comparative Compression Robustness Evaluation of Digital Image Forensics
Authors
Oliver Remy
Sebastian Strumegger
Jutta Hämmerle-Uhl
Andreas Uhl
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-10450-3_19

Premium Partner