2015
DOI: 10.1007/978-3-319-19321-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Universal Counterforensics of Multiple Compressed JPEG Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…Recently, universal approaches are developed in such a way to be useful versus a whole class of forensic classifiers . Barni et al (2014) proposed a CF method that performs multiple compression undetectable based on investigating the histogram DCT coefficients. This approach removes double and multiple compression artifacts, while the visual quality of the image keeps high.…”
Section: • Attacker's Goalmentioning
confidence: 99%
“…Recently, universal approaches are developed in such a way to be useful versus a whole class of forensic classifiers . Barni et al (2014) proposed a CF method that performs multiple compression undetectable based on investigating the histogram DCT coefficients. This approach removes double and multiple compression artifacts, while the visual quality of the image keeps high.…”
Section: • Attacker's Goalmentioning
confidence: 99%
“…Hereafter we refer to such attacks as MPAs (Most Powerful Attacks), and the detector trained to recognise them MPA-aware detector. When the analysis is limited to first order statistics and the attack must satisfy a per-pixel distortion constraint, the optimum attack is known and the MPA corresponds to this attack (see [8] and [7] for attacks in the spatial and frequency domain respectively). The optimum attack in the DCT domain has been used in [10] to build an adversary-aware SVM, which was shown to be able to resist to other double JPEG counter-forensic attacks belonging to the same class, namely, first order attacks (e.g., the attack to the FSD coefficients [4], [5]).…”
Section: Mpa-aware Svm Detectormentioning
confidence: 99%
“…In [4] and [5], counterforensic schemes were introduced to remove the artefacts of double compression in the distribution of the first significant digits (FSD) of the DCT coefficients thus making the detector fail [6]. In [7], a universal double JPEG attack against first order based detectors has been proposed, which extends to the DCT domain the universal attack in the pixel domain originally proposed in [8].…”
Section: Introductionmentioning
confidence: 99%
“…In [7], an anti-forensic method based on the SAZ was developed to deceive double JPEG compression detectors. In [8], a universal antiforensic method was developed, which had the ability of deceptive detectors for the multiple-JPEG compression. Aforesaid approach, a multiple-compressed image like the DCT subband histograms were remapped so that the ensuing histograms look like a solitary compressed image.…”
Section: Introductionmentioning
confidence: 99%
“…The aforementioned anti-forensic method possesses well-built consequence in the consistency of forensic evaluation as it secrets the first compression traces to a huge scope. A counter-forensic method was developed to cover the multiple compressions traces due to the histograms analysis of quantized coefficients of DCT in [20]. This counter-forensic method has the ability to efficiently conceal the artifacts of double and triple JPEG compression and further offer an improved image visual quality.…”
Section: Introductionmentioning
confidence: 99%