Anti-forensic approach for JPEG compressed images with enhanced image quality and forensic undetectability

被引:2
|
作者
Kumar, Amit [1 ]
Kansal, Ankush [1 ]
Singh, Kulbir [1 ]
机构
[1] TIET, Dept Elect & Commun Engn, Patiala, Punjab, India
关键词
Image restoration; Anti-forensics; JPEG compression; TV-based deblocking; Image tampering; Machine learning-based forensic detectors; COSINE;
D O I
10.1007/s11042-019-08599-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the detectors employed in digital image forensics are based on JPEG compression. To determine the capability of these forensic detectors, proficient anti-forensic techniques that challenge and help in the upgradation of forensic techniques are required. This paper proposes an anti-forensic technique based on the shifted block Discrete Fractional Cosine Transform (DFrCT) approach. Afterwards, Total variation (TV) -based deblocking operation is used in order to remove the compression blocking artifacts. Due to the shifted block approach, the proposed method performs histogram smoothing without adding any dithering signal, which means that it is capable of applying dithering by itself. Further, to remove blocking artifacts which are left during the JPEG compression TV-based deblocking is used. The DFrCT approach provides an additional fractional parameter to improve the accuracy of the proposed approach. The proposed scheme is evaluated based on the UCID dataset images by considering the scalar based and machine learning-based forensic detectors. It is observed from the experimental results that the proposed approach provides improved performance in terms of PSNR, SSIM, and forensic undetectability when compared to existing techniques. The analysis performed in this paper challenges the security and robustness of JPEG compression forensic techniques.
引用
收藏
页码:8061 / 8084
页数:24
相关论文
共 50 条
  • [21] Digital Forensic of JPEG Images
    Mire, Archana V.
    Dhok, S. B.
    Porey, P. D.
    Mistry, N. J.
    2014 FIFTH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING (ICSIP 2014), 2014, : 131 - 136
  • [22] A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks
    Rekhis, Slim
    Boudriga, Noureddine
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 635 - 650
  • [23] Forensic analysis of anti-forensic file-wiping tools on Windows
    AlHarbi, Rayed
    AlZahrani, Ali
    Bhat, Wasim Ahmad
    JOURNAL OF FORENSIC SCIENCES, 2022, 67 (02) : 562 - 587
  • [24] Anti-Forensic Techniques Based on Malicious Cryptography
    Filioi, Eric
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 63 - 72
  • [25] Understanding Anti-forensic Techniques with Timestamp Manipulation
    Jang, Dae-il
    Ahn, Gail-Joon
    Hwang, Hyunuk
    Kim, Kibom
    PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI), 2016, : 609 - 614
  • [26] Anti-Forensic Approach for Password Protection Using Fuzzy Fingerprint Vault
    Choi, Woo Yong
    Un, Sung Kyong
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 643 - 646
  • [27] A Modified Anti-Forensic Technique for Removing Detectable Traces from Digital Images
    Kaimal, Athira B.
    Manimurugan, S.
    Anitha, J.
    2013 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS, 2013,
  • [28] FORENSIC AND ANTI-FORENSIC ANALYSIS OF INDOOR/OUTDOOR CLASSIFIERS BASED ON ACOUSTIC CLUES
    Mascia, M.
    Canclini, A.
    Antonacci, F.
    Tagliasacchi, M.
    Sarti, A.
    Tubaro, S.
    2015 23RD EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2015, : 2072 - 2076
  • [29] Criminal regulation of anti-forensic tools in Japan
    Ishii, Tetsuya
    Advances in Digital Forensics II, 2006, 222 : 357 - 364
  • [30] Systematic Review: Anti-Forensic Computer Techniques
    Arias, Rafael Gonzalez
    Higuera, Javier Bermejo
    Granados, J. Javier Rainer
    Higuera, Juan Ramon Bermejo
    Montalvo, Juan Antonio Sicilia
    APPLIED SCIENCES-BASEL, 2024, 14 (12):