Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Printing and Scanning Attack for Image Counter Forensics (2005.02160v2)

Published 27 Apr 2020 in cs.CV, cs.LG, eess.IV, and stat.ML

Abstract: Examining the authenticity of images has become increasingly important as manipulation tools become more accessible and advanced. Recent work has shown that while CNN-based image manipulation detectors can successfully identify manipulations, they are also vulnerable to adversarial attacks, ranging from simple double JPEG compression to advanced pixel-based perturbation. In this paper we explore another method of highly plausible attack: printing and scanning. We demonstrate the vulnerability of two state-of-the-art models to this type of attack. We also propose a new machine learning model that performs comparably to these state-of-the-art models when trained and validated on printed and scanned images. Of the three models, our proposed model outperforms the others when trained and validated on images from a single printer. To facilitate this exploration, we create a dataset of over 6,000 printed and scanned image blocks. Further analysis suggests that variation between images produced from different printers is significant, large enough that good validation accuracy on images from one printer does not imply similar validation accuracy on identical images from a different printer.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (36)
  1. Cnn-based detection of generic contrast adjustment with jpeg post-processing. 2018 25th IEEE International Conference on Image Processing (ICIP), Oct 2018.
  2. A deep learning approach to universal image manipulation detection using a new convolutional layer. ACM Workshop on Information Hiding and Multimedia Security, pages 5–10, 2016.
  3. Deep learning for detecting processing history of images. In Media Watermarking, Security, and Forensics, 2018.
  4. Edge-based blur metric for tamper detection. Journal of Information Hiding and Multimedia Signal Processing, 1(1):20–27, 2010.
  5. Forensic detection of median filtering in digital images. In 2010 IEEE International Conference on Multimedia and Expo, pages 89–94. IEEE, 2010.
  6. Forensic detection of median filtering in digital images. In 2010 IEEE International Conference on Multimedia and Expo, pages 89–94, 2010.
  7. Adversarial examples are not easily detected: Bypassing ten detection methods. In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pages 3–14, 2017.
  8. Median filtering forensics based on convolutional neural networks. Signal Processing Letters, IEEE, 22:1849–1853, 11 2015.
  9. A multi-purpose image forensic method using densely connected convolutional neural networks. Journal of Real-Time Image Processing, 16, 03 2019.
  10. Francois Chollet. Xception: Deep learning with depthwise separable convolutions. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jul 2017.
  11. Recasting residual-based local descriptors as convolutional neural networks. Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec ’17, 2017.
  12. Study of the impact of standard image compression techniques on performance of image classification with a convolutional neural network. 2017.
  13. Hany Farid. Exposing digital forgeries from jpeg ghosts. IEEE transactions on information forensics and security, 4(1):154–160, 2009.
  14. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7:868–882, 06 2012.
  15. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572, 2014.
  16. Explaining and harnessing adversarial examples, 2014.
  17. Analysis of adversarial attacks against cnn-based image forgery detectors. 2018 26th European Signal Processing Conference (EUSIPCO), Sep 2018.
  18. Detecting digital tampering by blur estimation. In First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE’05), pages 264–278. IEEE, 2005.
  19. Exposing digital forgeries in complex lighting environments. IEEE Transactions on Information Forensics and Security, 2(3):450–461, 2007.
  20. Median filtered image restoration and anti-forensics using adversarial networks. IEEE Signal Processing Letters, 25:278–282, 2018.
  21. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083, 2017.
  22. Deepfool: a simple and accurate method to fool deep neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 2574–2582, 2016.
  23. The limitations of deep learning in adversarial settings. In 2016 IEEE European symposium on security and privacy (EuroSP), pages 372–387. IEEE, 2016.
  24. The limitations of deep learning in adversarial settings. 2016 IEEE European Symposium on Security and Privacy (EuroSP), Mar 2016.
  25. Exposing digital forgeries by detecting traces of re-sampling. IEEE Transactions on Signal Processing, 53:758–767, 02 2005.
  26. Exposing digital forgeries by detecting traces of resampling. Trans. Sig. Proc., 53(2):758–767, Feb. 2005.
  27. A deep learning approach to detection of splicing and copy-move forgeries in images. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pages 1–6, 2016.
  28. Robust median filtering forensics using image deblocking and filtered residual fusion. IEEE Access, PP:1–1, 01 2019.
  29. Blind forensics of contrast enhancement in digital images. In 2008 15th IEEE International Conference on Image Processing, pages 3112–3115. IEEE, 2008.
  30. Going deeper with convolutions, 2014.
  31. Median filtering detection of small-size image based on cnn. Journal of Visual Communication and Image Representation, 51:162 – 168, 2018.
  32. Benedetta Tondi. Pixel-domain adversarial examples against cnn-based manipulation detectors. Electronics Letters, 54, 08 2018.
  33. Mauro Barni; Kassem Kallas; Ehsan Nowroozi; Benedetta Tondi. On the transferability of adversarial examples against cnn-based image forensics. 2020.
  34. Camera model identification with the use of deep convolutional neural networks. In 2016 IEEE International workshop on information forensics and security (WIFS), pages 1–6. IEEE, 2016.
  35. Robust contrast enhancement forensics using convolutional neural networks. CoRR, abs/1803.04749, 2018.
  36. Pyramid scene parsing network. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jul 2017.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (3)
  1. Hailey Joren (7 papers)
  2. Otkrist Gupta (16 papers)
  3. Dan Raviv (28 papers)
Citations (3)

Summary

We haven't generated a summary for this paper yet.