Abstract
Many digital images need to be redacted before they can be disseminated. A common way to remove the sensitive information replaces the pixels in the sensitive region with black or white values. Our goal is to study the effectiveness of this simple method in purging information. Since digital images are usually lossily compressed via quantization in the frequency domain, each pixel in the spatial domain will be “spread” to its surroundings, similar to the Gibbs-effect, before it is redacted. Hence, information of the original pixels might not be completely purged by replacing pixels in the compressed image. Although such residual information is insufficient to reconstruct the original, it can be exploited when the content has low entropy. We consider a scenario where the goal of the adversary is to identify the original among a few templates. We give two approaches and investigate their effectiveness when the image is compressed using JPEG or wavelet-based compression scheme. We found that, if a redacted image is compressed in higher bit rate compared to the compression of the original image, then the correct template can be identified with noticeable certainty. Although the requirements are stringent, it will not be surprising that redacted images matching the requirements can be found in the public domain. Hence, our findings highlight a subtle attack that must be considered when declassifying images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, G.B., Gross, B.P., Marlin, J.W., Tucker, V.D.: Method for storing and retrieving annotations and redactions in final form documents. US Patent (5581682) (1996)
Berger, S., Kjeldsen, R., Pinhanez, C., Podlaseck, M., Narayanaswami, C., Raghunath, M.: Using symbiotic displays to view sensitive information in public. In: IEEE International Conference on Pervasive Computing and Communications, pp. 139–148 (2005)
Butler, D.: US intelligence exposed as student decodes Iraq memo. Nature 429, 116 (2004)
Daubechies, I.: Ten Lecture Notes on Wavelets. SIAM, Philadelphia (1992)
Fan, Z., de Queiroz, R.: Identification of bitmap compression history: Jpeg detection and quantizer estimation. IEEE Transaction of Image Processing 12, 230–235 (2003)
Fridrich, J., Goljan, M., Du, R.: Steganalysis based on jpeg compatibility. In: SPIE Multimedia Systems and Applications, pp. 275–280 (2001)
Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences 28, 270–299 (1984)
Johnson, D.: Redacting pdf files: A survey of tools. Adobe Acrobat User community Newsletter (2006), http://www.acrobatusers.com/
Kelly, D., Foster, B.: A process for electronic document redaction. WO Patent (WO/2006/041318) (2006)
Lopresti, D., Spitz, A.L.: Quantifying information leakage in document redaction. In: 1st ACM workshop on Hardcopy Document Processing, pp. 63–69 (2004)
Mallat, S.: A Wavelet Tour of Signal Processing. Academic Press, London (1999)
Marcellin, M.W., Gormish, M.J., Bilgin, A., Boliek, M.P.: An overview of JPEG-2000. In: IEEE Data Compression Conference, pp. 523–541 (2000)
Popescu, A.C.: Statistical tools for digital image forensics (2004)
Quaeler, L., Charnock, E., Dhakouani, N.: Method and apparatus to provide a unified redaction system. United States Patent and Trademark Office (Application number: 20070030528) (2007)
Sallee, P.: Matlab JPEG toolbox, http://www.philsallee.com/jpegtbx/index.html
Ye, S., Sun, Q., Chang, E.-C.: Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: IEEE International Conference on Multimedia and Expo. (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ho, N.ZY., Chang, EC. (2008). Residual Information of Redacted Images Hidden in the Compression Artifacts. In: Solanki, K., Sullivan, K., Madhow, U. (eds) Information Hiding. IH 2008. Lecture Notes in Computer Science, vol 5284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88961-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-88961-8_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88960-1
Online ISBN: 978-3-540-88961-8
eBook Packages: Computer ScienceComputer Science (R0)