Browse > Article
http://dx.doi.org/10.3745/KTCCS.2014.3.5.163

A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection  

Doyoddorj, Munkhbaatar (부경대학교 정보보호학과)
Rhee, Kyung-Hyune (부경대학교 IT융합응용공학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.3, no.5, 2014 , pp. 163-172 More about this Journal
Abstract
The Scale Invariant Feature Transform (SIFT) has been widely used in a lot of applications for image feature matching. Such a transform allows us to strong matching ability, stability in rotation, and scaling with the variety of different scales. Recently, it has been made one of the most successful algorithms in the research areas of copy-move forgery detections. Though this transform is capable of identifying copy-move forgery, it does not widely address the possibility that counter-forensics operations may be designed and used to hide the evidence of image tampering. In this paper, we propose a targeted counter-forensics method for impeding SIFT-based copy-move forgery detection by applying a semantically admissible distortion in the processing tool. The proposed method allows the attacker to delude a similarity matching process and conceal the traces left by a modification of SIFT keypoints, while maintaining a high fidelity between the processed images and original ones under the semantic constraints. The efficiency of the proposed method is supported by several experiments on the test images with various parameter settings.
Keywords
Counter-Forensics; SIFT; Copy-Move Forgery Detection; Hiding Traces;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T.-T. Do, E. Kijak, T. Furon, L. Amsaleg, "Understanding the Security and Robustness of SIFT," In Proc. of the International Conference on Multimedia, MM'10, pp. 1195-1198, 2010.
2 X. Pan, S. Lyu, "Detecting image region duplication using SIFT features," In Proc. ICASSP, Dallas, TX, 2010.
3 I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, G. Serra. "Geometric tampering estimation by means of a SIFT-based forensic analysis," In Proc. ICASSP, Dallas, TX, 2010.
4 C.Y. Hsu, C.-S. Lu, S.-C. Pei, "Secure and robust SIFT," In ACM Multimedia Conf., pp.637-640, 2009.
5 T.-T. Do, E. Kijak, T. Furon, L. Amsaleg, "Deluding Image Recognition in SIFT-Based CBIR Systems," In Proc. of the 2nd ACM Workshop on Multimedia Forensics, Security and Intelligence, MiFor'10, pp.7-12, 2010.
6 R. Caldelli, I. Amerini, L. Ballan, G. Serra, A. Costanzo, "On the Effectiveness of Local Warping Against SIFT-Based Copy-Move Detection," In Proc. of Int'l Symposium on Communications, Control and Signal Processing (ISCCSP), May, 2012.
7 A. Vealdi, B. Fulkerson, VLFeat: An open and portable library of computer vision algorithms. (http://www.vlfeat.org/), 2008.
8 I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo, G. Serra, "A SIFT-based forensic method for copy move attack and transformation recovery," IEEE Transactions on Information Forensics And Security, Vol.6, No.3, pp.1099-1110, 2011.   DOI   ScienceOn
9 J. Redi, W. Taktak, J.-L. Dugelay, "Digital image forensics: a booklet for beginners," Multimedia Tools and Applications, 51, pp.133-162, 2011.   DOI
10 L. Chen, S. Wang, S. Li, J. Li,."Countering Universal Image Tampering Detection with Histogram Restoration," International Workshop on Digital Forensics and Watermarking, IWDW 2012, LNCS 7128, pp.282-289, 2012.
11 R. Harris, "Arriving at an Anti-Forensics Consensus: Examining How to Define and Control the Anti-Forensics Problem," Digit. Investig. 3(Supplement 1), pp.44-49, 2006.   DOI   ScienceOn
12 R. Bohme, M. Kirchner, "Counter-Forensics: Attacking Image Forensics," In Digital Image Forensics, ed. by H.T. Sencar, N. Memon, Springer, New York, pp.327-366, 2013.
13 H. Huang, W. Guo, Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," In Proc. IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008.
14 Y.Q. Shi, C. Chen, G. Xuan, W. Su, "Steganalysis Versus Splicing Detection," In IWDW 2007, LNCS 5041, pp.158-172, 2008.
15 M. Kirchner, R. Bohme, "Tamper hiding: Defeating image forensics," In Information Hiding, LNCS 4567, pp.326-341, 2007.
16 M. Kirchner, R. Bohme, "Hiding Traces of Resampling in Digital Images," IEEE Transactions on Information Forensics and Security, Vol.3, No.4, pp.582-592, 2008.   DOI   ScienceOn
17 D. Lowe, "Distinctive image features from scale-invariant keypoints, "International Journal Computer. Vision, Vol.60, No.2, pp.91-110, 2004.   DOI   ScienceOn