DOI QR코드

DOI QR Code

A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection

SIFT 기반 카피-무브 위조 검출에 대한 타켓 카운터-포렌식 기법

  • ;
  • 이경현 (부경대학교 IT융합응용공학과)
  • Received : 2013.12.30
  • Accepted : 2014.02.13
  • Published : 2014.05.31

Abstract

The Scale Invariant Feature Transform (SIFT) has been widely used in a lot of applications for image feature matching. Such a transform allows us to strong matching ability, stability in rotation, and scaling with the variety of different scales. Recently, it has been made one of the most successful algorithms in the research areas of copy-move forgery detections. Though this transform is capable of identifying copy-move forgery, it does not widely address the possibility that counter-forensics operations may be designed and used to hide the evidence of image tampering. In this paper, we propose a targeted counter-forensics method for impeding SIFT-based copy-move forgery detection by applying a semantically admissible distortion in the processing tool. The proposed method allows the attacker to delude a similarity matching process and conceal the traces left by a modification of SIFT keypoints, while maintaining a high fidelity between the processed images and original ones under the semantic constraints. The efficiency of the proposed method is supported by several experiments on the test images with various parameter settings.

Scale Invariant Feature Transform (SIFT)은 높은 매칭 능력과 회전이나 스케일 조정 시 안정성으로 인해 이미지 특징 매칭을 위해 많은 응용에서 사용되어지고 있으며, 이러한 특성으로 인해 카피-무브 위조 검출을 위한 핵심 알고리즘으로 각광받고 있다. 하지만 SIFT 변환은 이미지 조작의 증거를 감출 수 있는 안티포렌식의 가능성이 높음에도 불구하고 이에 대한 연구는 거의 없으므로, 본 논문에서는 의미론적으로 허용될 수 있는 왜곡을 적용하여 SIFT 기반 카피-무브 위조 검출을 방해하기 위한 타켓 카운터-포렌식 기법을 제안한다. 제안 기법은 공격자가 유사성 매칭 절차를 속일 수 있는 동시에 SIFT 키포인트의 변형을 통한 추적을 방해하여 이미지 조작의 증거를 숨길 수 있는 방안을 제공한다. 또한 제안 기법은 의미론적 제약 하에서 가공된 이미지와 원본 이미지 간의 높은 충실도를 유지하는 특성을 가진다. 한편, 다양한 조건의 테스트 이미지에 대한 실험을 통해 제안 기법의 효율성을 확인하였다.

Keywords

References

  1. J. Redi, W. Taktak, J.-L. Dugelay, "Digital image forensics: a booklet for beginners," Multimedia Tools and Applications, 51, pp.133-162, 2011. https://doi.org/10.1007/s11042-010-0620-1
  2. L. Chen, S. Wang, S. Li, J. Li,."Countering Universal Image Tampering Detection with Histogram Restoration," International Workshop on Digital Forensics and Watermarking, IWDW 2012, LNCS 7128, pp.282-289, 2012.
  3. R. Harris, "Arriving at an Anti-Forensics Consensus: Examining How to Define and Control the Anti-Forensics Problem," Digit. Investig. 3(Supplement 1), pp.44-49, 2006. https://doi.org/10.1016/j.diin.2006.06.005
  4. R. Bohme, M. Kirchner, "Counter-Forensics: Attacking Image Forensics," In Digital Image Forensics, ed. by H.T. Sencar, N. Memon, Springer, New York, pp.327-366, 2013.
  5. Y.Q. Shi, C. Chen, G. Xuan, W. Su, "Steganalysis Versus Splicing Detection," In IWDW 2007, LNCS 5041, pp.158-172, 2008.
  6. M. Kirchner, R. Bohme, "Tamper hiding: Defeating image forensics," In Information Hiding, LNCS 4567, pp.326-341, 2007.
  7. M. Kirchner, R. Bohme, "Hiding Traces of Resampling in Digital Images," IEEE Transactions on Information Forensics and Security, Vol.3, No.4, pp.582-592, 2008. https://doi.org/10.1109/TIFS.2008.2008214
  8. H. Huang, W. Guo, Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," In Proc. IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008.
  9. D. Lowe, "Distinctive image features from scale-invariant keypoints, "International Journal Computer. Vision, Vol.60, No.2, pp.91-110, 2004. https://doi.org/10.1023/B:VISI.0000029664.99615.94
  10. X. Pan, S. Lyu, "Detecting image region duplication using SIFT features," In Proc. ICASSP, Dallas, TX, 2010.
  11. I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, G. Serra. "Geometric tampering estimation by means of a SIFT-based forensic analysis," In Proc. ICASSP, Dallas, TX, 2010.
  12. C.Y. Hsu, C.-S. Lu, S.-C. Pei, "Secure and robust SIFT," In ACM Multimedia Conf., pp.637-640, 2009.
  13. T.-T. Do, E. Kijak, T. Furon, L. Amsaleg, "Understanding the Security and Robustness of SIFT," In Proc. of the International Conference on Multimedia, MM'10, pp. 1195-1198, 2010.
  14. T.-T. Do, E. Kijak, T. Furon, L. Amsaleg, "Deluding Image Recognition in SIFT-Based CBIR Systems," In Proc. of the 2nd ACM Workshop on Multimedia Forensics, Security and Intelligence, MiFor'10, pp.7-12, 2010.
  15. R. Caldelli, I. Amerini, L. Ballan, G. Serra, A. Costanzo, "On the Effectiveness of Local Warping Against SIFT-Based Copy-Move Detection," In Proc. of Int'l Symposium on Communications, Control and Signal Processing (ISCCSP), May, 2012.
  16. A. Vealdi, B. Fulkerson, VLFeat: An open and portable library of computer vision algorithms. (http://www.vlfeat.org/), 2008.
  17. I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo, G. Serra, "A SIFT-based forensic method for copy move attack and transformation recovery," IEEE Transactions on Information Forensics And Security, Vol.6, No.3, pp.1099-1110, 2011. https://doi.org/10.1109/TIFS.2011.2129512