2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2014
DOI: 10.1109/icassp.2014.6854090
|View full text |Cite
|
Sign up to set email alerts
|

Transportation-theoretic image counterforensics to First Significant Digit histogram forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…Positive reports about FSD-based compression forensics in the literature have also led to a number of counter-forensic techniques [27] that attempt to restore block-DCT coefficient FSD histograms after JPEG compression [28,29]. Yet we demonstrated in a recent work [20] that restoration algorithms under a minimum cost constraint can lead to detectable artifacts in the histograms of second significant digits.…”
Section: Experiments With Block-dct Ssdsmentioning
confidence: 92%
“…Positive reports about FSD-based compression forensics in the literature have also led to a number of counter-forensic techniques [27] that attempt to restore block-DCT coefficient FSD histograms after JPEG compression [28,29]. Yet we demonstrated in a recent work [20] that restoration algorithms under a minimum cost constraint can lead to detectable artifacts in the histograms of second significant digits.…”
Section: Experiments With Block-dct Ssdsmentioning
confidence: 92%
“…Soon afterwards a second algorithm was proposed in [3], which did not perfectly enforce the target distribution either. This issue was solved in [4], but the distortion minimisation algorithm therein was heuristic. Finally, a completely general solution to the problem of optimum first-order counterforensics appeared in [5], and its authors showcased their approach by applying it to the problem of optimum FSD counterforensics.…”
Section: Introductionmentioning
confidence: 99%
“…When the analysis is limited to first order statistics and the attack must satisfy a per-pixel distortion constraint, the optimum attack is known and the MPA corresponds to this attack (see [8] and [7] for attacks in the spatial and frequency domain respectively). The optimum attack in the DCT domain has been used in [10] to build an adversary-aware SVM, which was shown to be able to resist to other double JPEG counter-forensic attacks belonging to the same class, namely, first order attacks (e.g., the attack to the FSD coefficients [4], [5]). …”
Section: Mpa-aware Svm Detectormentioning
confidence: 99%
“…In turn, a number of powerful attacks which are capable to prevent a correct detection while keeping the mean squared error distortion introduced by the attack limited, have been developed. In [4] and [5], counterforensic schemes were introduced to remove the artefacts of double compression in the distribution of the first significant digits (FSD) of the DCT coefficients thus making the detector fail [6]. In [7], a universal double JPEG attack against first order based detectors has been proposed, which extends to the DCT domain the universal attack in the pixel domain originally proposed in [8].…”
Section: Introductionmentioning
confidence: 99%