Abstract
The use of digital images in journalism and as evidence in the court of law for crime investigation and law enforcement are some application areas where it is extremely important to ensure authenticity of the images being used. Wide availability of sophisticated image processing software has simplified image manipulation. Image forensics deals with the study of the images to reconstruct their history and detect if it has undergone some intentional or unintentional modifications. This paper presents an introductory overview of the digital image forensics and its counterpart aiming to help the beginners understand their alliance so as to develop robust forensic tools against intentional and unintentional attacks on the multimedia. A brief look into counter anti-forensics is also presented in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Guojuan, Z., Dianji, L.: An overview of digital watermarking in image forensics. In: IEEE Proceedings of Fourth International Joint Conference on Computational Sciences and Optimization, pp. 332−335 (2011)
Mohammad, N., Sun, X., Yang, H.: An adaptive visible watermarking algorithm for BTC compressed images. Inf. Technol. J. 13(3), 536–541 (2014)
Qazi, T., Hayat, K., Khan, S.U., Madani, S.A., Khan, I.A., Kołodziej, J., Li, H., Lin, W.Y.K.C., Xu, C.Z.: Survey on blind image forgery detection. IET Image Process. 7(7), 1–11 (2013)
Abhitha, E., Karthick, V.J.A.: Forensic technique for detecting tamper in digital image compression. Int. J. Adv. Res. Comput. Commun. Eng. 2(3), 1325–1330 (2013)
Swaminathan, A., Wu, M., Liu, K.J.R.: Digital image forensics via intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 3(1), 101–117 (2008)
Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1–26 (2012)
Bayram, S., Sencar, H.T., Memon, N.: A survey of copy-move forgery detection techniques. In: Proceedings of the IEEE Western New York Image Processing Workshop, pp. 538–542, IEEE (2008)
Weiqi, L., Zhenhua, Q., Feng, P., Jiwu, H.: A survey of passive technology for digital image forensics. Review article. Front. Comput. China (2007)
Lin, H.J., Wang, C.W., Kao, Y.T.: Fast copy-move forgery detection. WSEAS Trans. Signal Process. 5(5), 188–197 (2009)
Singh, V.K., Tripathi, R.C.: Fast and efficient region duplication detection in digital images using sub-blocking method. Int. J. Adv. Sci. Technol. 35, 93–102 (2011)
Yang, B., Sun, X., Chen, X., Zhang, J., Li, X.: An efficient forensic method for copy–move forgery detection based on DWT-FWHT. Radioengineering 22(4), 1098–1105 (2013)
Kaur, A., Sharma, R.: Optimization of copy-move forgery detection technique. Int. J. Adv.Res. Comput. Sci. Software Eng. 3(4), 576–578 (2013)
Kaur, A., Sharma, R.: Copy-move forgery detection using DCT and SIFT. Int. J. Comput. Appl. 70(7) (2013)
Böhme, R., Kirchner, M.: Counter-forensics: attacking image forensics. In: Digital Image Forensics. Springer, New York (2012)
Manimurugan, S., Kaimal, A.B.: A tailored anti-forensic technique for digital image applications. Int. J. Comput. Appl. 53(9) (2012)
Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.J.R.: Anti-forensics of JPEG compression. In: Proceedings of IEEE conference on ICASSP 2010, pp. 1694−1697 (2010)
Stamm, M.C., Liu, K.J.R.: Wavelet-based image compression anti-forensics. In: Proceedings of 2010 IEEE 17th International Conference on Image Processing, Hong Kong, pp. 1737–1740 (2010)
Sreelakshmi, M.S., Venkataraman, D.: Image compression using anti-forensics method. Int. J. Comput. Sci. Eng. Appl. 3(1), 81–89 (2013)
Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.J.R.: Undetectable image tampering through JPEG compression anti-forensics. In: Proceedings of 2010 IEEE 17th International Conference on Image Processing, Hong Kong, pp. 2109–2112 (2010)
Dang-Nguyen, D.T., Gebru, I.D., Conotter, V., Boato, G., De Natale, F.G.B.: Counter-forensics of median filtering. In: IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp. 260–265 (2013)
Fontani, M., Barni, M.: Hiding traces of median filtering in digital images. In: EUSIPCO, pp. 1239–1243 (2012)
Pandit, P.D., Rajput, M.: Survey on anti-forensics operations in image forensics. Int. J. Comput. Sci. Inf. Technol. 5(2), 1570–1573 (2014)
Fontani, M., Bonchi, A., Piva, A., Barni, M.: Countering anti-forensics by means of data fusion. In: Proceedings of SPIE Electronic Imaging Conference, 2–6 Feb 2014
Li, H., Luo, W., Huang, J.: Countering anti-JPEG compression forensics. In: 19th IEEE International Conference on Image Processing (ICIP), pp. 241–244 (2012)
Wang, M., Chen, Z., Fan, W., Xiong, Z.: Countering anti-forensics to wavelet-based compression. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), Paris, France, pp. 5382–5386 (2014)
Zeng, H., Qin, T., Kang, X., Liu, L.: Countering anti-forensics of median filtering. In: IEEE International Conference on Acoustic, Speech and Signal Processing, pp. 2723–2727 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Neha Singh, Sandeep Joshi (2016). Digital Image Forensics and Counter Anti-forensics. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_90
Download citation
DOI: https://doi.org/10.1007/978-81-322-2638-3_90
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2636-9
Online ISBN: 978-81-322-2638-3
eBook Packages: EngineeringEngineering (R0)