Skip to main content
  • 846 Accesses

Abstract

The use of digital images in journalism and as evidence in the court of law for crime investigation and law enforcement are some application areas where it is extremely important to ensure authenticity of the images being used. Wide availability of sophisticated image processing software has simplified image manipulation. Image forensics deals with the study of the images to reconstruct their history and detect if it has undergone some intentional or unintentional modifications. This paper presents an introductory overview of the digital image forensics and its counterpart aiming to help the beginners understand their alliance so as to develop robust forensic tools against intentional and unintentional attacks on the multimedia. A brief look into counter anti-forensics is also presented in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guojuan, Z., Dianji, L.: An overview of digital watermarking in image forensics. In: IEEE Proceedings of Fourth International Joint Conference on Computational Sciences and Optimization, pp. 332−335 (2011)

    Google Scholar 

  2. Mohammad, N., Sun, X., Yang, H.: An adaptive visible watermarking algorithm for BTC compressed images. Inf. Technol. J. 13(3), 536–541 (2014)

    Article  Google Scholar 

  3. Qazi, T., Hayat, K., Khan, S.U., Madani, S.A., Khan, I.A., Kołodziej, J., Li, H., Lin, W.Y.K.C., Xu, C.Z.: Survey on blind image forgery detection. IET Image Process. 7(7), 1–11 (2013)

    Article  Google Scholar 

  4. Abhitha, E., Karthick, V.J.A.: Forensic technique for detecting tamper in digital image compression. Int. J. Adv. Res. Comput. Commun. Eng. 2(3), 1325–1330 (2013)

    Google Scholar 

  5. Swaminathan, A., Wu, M., Liu, K.J.R.: Digital image forensics via intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 3(1), 101–117 (2008)

    Article  Google Scholar 

  6. Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1–26 (2012)

    Article  Google Scholar 

  7. Bayram, S., Sencar, H.T., Memon, N.: A survey of copy-move forgery detection techniques. In: Proceedings of the IEEE Western New York Image Processing Workshop, pp. 538–542, IEEE (2008)

    Google Scholar 

  8. Weiqi, L., Zhenhua, Q., Feng, P., Jiwu, H.: A survey of passive technology for digital image forensics. Review article. Front. Comput. China (2007)

    Google Scholar 

  9. Lin, H.J., Wang, C.W., Kao, Y.T.: Fast copy-move forgery detection. WSEAS Trans. Signal Process. 5(5), 188–197 (2009)

    Google Scholar 

  10. Singh, V.K., Tripathi, R.C.: Fast and efficient region duplication detection in digital images using sub-blocking method. Int. J. Adv. Sci. Technol. 35, 93–102 (2011)

    Google Scholar 

  11. Yang, B., Sun, X., Chen, X., Zhang, J., Li, X.: An efficient forensic method for copy–move forgery detection based on DWT-FWHT. Radioengineering 22(4), 1098–1105 (2013)

    Google Scholar 

  12. Kaur, A., Sharma, R.: Optimization of copy-move forgery detection technique. Int. J. Adv.Res. Comput. Sci. Software Eng. 3(4), 576–578 (2013)

    Google Scholar 

  13. Kaur, A., Sharma, R.: Copy-move forgery detection using DCT and SIFT. Int. J. Comput. Appl. 70(7) (2013)

    Google Scholar 

  14. Böhme, R., Kirchner, M.: Counter-forensics: attacking image forensics. In: Digital Image Forensics. Springer, New York (2012)

    Google Scholar 

  15. Manimurugan, S., Kaimal, A.B.: A tailored anti-forensic technique for digital image applications. Int. J. Comput. Appl. 53(9) (2012)

    Google Scholar 

  16. Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.J.R.: Anti-forensics of JPEG compression. In: Proceedings of IEEE conference on ICASSP 2010, pp. 1694−1697 (2010)

    Google Scholar 

  17. Stamm, M.C., Liu, K.J.R.: Wavelet-based image compression anti-forensics. In: Proceedings of 2010 IEEE 17th International Conference on Image Processing, Hong Kong, pp. 1737–1740 (2010)

    Google Scholar 

  18. Sreelakshmi, M.S., Venkataraman, D.: Image compression using anti-forensics method. Int. J. Comput. Sci. Eng. Appl. 3(1), 81–89 (2013)

    Google Scholar 

  19. Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.J.R.: Undetectable image tampering through JPEG compression anti-forensics. In: Proceedings of 2010 IEEE 17th International Conference on Image Processing, Hong Kong, pp. 2109–2112 (2010)

    Google Scholar 

  20. Dang-Nguyen, D.T., Gebru, I.D., Conotter, V., Boato, G., De Natale, F.G.B.: Counter-forensics of median filtering. In: IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp. 260–265 (2013)

    Google Scholar 

  21. Fontani, M., Barni, M.: Hiding traces of median filtering in digital images. In: EUSIPCO, pp. 1239–1243 (2012)

    Google Scholar 

  22. Pandit, P.D., Rajput, M.: Survey on anti-forensics operations in image forensics. Int. J. Comput. Sci. Inf. Technol. 5(2), 1570–1573 (2014)

    Google Scholar 

  23. Fontani, M., Bonchi, A., Piva, A., Barni, M.: Countering anti-forensics by means of data fusion. In: Proceedings of SPIE Electronic Imaging Conference, 2–6 Feb 2014

    Google Scholar 

  24. Li, H., Luo, W., Huang, J.: Countering anti-JPEG compression forensics. In: 19th IEEE International Conference on Image Processing (ICIP), pp. 241–244 (2012)

    Google Scholar 

  25. Wang, M., Chen, Z., Fan, W., Xiong, Z.: Countering anti-forensics to wavelet-based compression. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), Paris, France, pp. 5382–5386 (2014)

    Google Scholar 

  26. Zeng, H., Qin, T., Kang, X., Liu, L.: Countering anti-forensics of median filtering. In: IEEE International Conference on Acoustic, Speech and Signal Processing, pp. 2723–2727 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neha Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Neha Singh, Sandeep Joshi (2016). Digital Image Forensics and Counter Anti-forensics. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_90

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2638-3_90

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2636-9

  • Online ISBN: 978-81-322-2638-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics