+ All Categories
Home > Documents > Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian...

Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian...

Date post: 28-Aug-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
43
Automated Image Forgery Detection through Classification of JPEG Ghosts Dipl.-Inf. Christian Riess (joint work with Fabian Zach and Elli Angelopoulou) August 30th, 2012 Pattern Recognition Lab (CS 5) University of Erlangen-Nuremberg
Transcript
Page 1: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Automated Image Forgery Detection

through Classification of JPEG Ghosts

Dipl.-Inf. Christian Riess (joint work with Fabian Zach and Elli Angelopoulou)

August 30th, 2012

Pattern Recognition Lab (CS 5)

University of Erlangen-Nuremberg

Page 2: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Image forensics

● Is a picture authentic?

● Has a picture been taken with a

particular camera?

● Emerging application in

information security, signal

processing and computer vision

2

Page 3: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Image forensics

● Is a picture authentic?

● Has a picture been taken with a

particular camera?

● Emerging application in

information security, signal

processing and computer vision

3

Page 4: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Image forensics

● Is a picture authentic?

● Has a picture been taken with a

particular camera?

● Emerging application in

information security, signal

processing and computer vision

4

Page 5: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Image forensics

● Is a picture authentic?

● Has a picture been taken with a

particular camera?

● Emerging application in

information security, signal

processing and computer vision

5

Page 6: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Approaches to the detection of digital forgeries

6

World

Camera

ImageLens Sensor Processing

Page 7: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Approaches to the detection of digital forgeries

7

World

Camera

ImageLens Sensor

Geometry,

lighting

environment

Processing

Page 8: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Approaches to the detection of digital forgeries

8

World

Camera

ImageLens Sensor

Geometry,

lighting

environment

Chromatic

aberration

Processing

Page 9: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Approaches to the detection of digital forgeries

9

World

Camera

ImageLens Sensor

Geometry,

lighting

environment

Chromatic

aberration

Sensor

noise

Processing

Page 10: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Approaches to the detection of digital forgeries

10

World

Camera

ImageLens Sensor

Geometry,

lighting

environment

Chromatic

aberration

Sensor

noise

Demosaicking,

camera

response

Processing

Page 11: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Approaches to the detection of digital forgeries

11

World

Camera

ImageLens Sensor

Geometry,

lighting

environment

Chromatic

aberration

Sensor

noise

Demosaicking,

camera

response

Copy-move,

resampling,

double

compression

Processing

Page 12: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Approaches to the detection of digital forgeries

12

World

Camera

ImageLens Sensor

Geometry,

lighting

environment

Chromatic

aberration

Sensor

noise

Demosaicking,

camera

response

Copy-move,

resampling,

double

compression

Processing

Topic of this talk

Page 13: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

JPEG compression

Quality 100 Quality 20

● JPEG compression is block-based and lossy

● JPEG block grid: 8 by 8 pixels

● If recompressed, the new grid can be aligned/misaligned to previous grid

13

Page 14: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

JPEG compression

Quality 100 Quality 20

● JPEG compression is block-based and lossy

● JPEG block grid: 8 by 8 pixels

● If recompressed, the new grid can be aligned/misaligned to previous grid

● This work: Classification of single- vs double-compressed JPEG blocks

14

Page 15: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● JPEG is very popular “bad men” use JPEG, too

● If an image is recompressed, the statistics of JPEG artifacts change

● Forensic scenario:

● First JPEG compression: in camera

● Second JPEG compression: e.g. in a postprocessing tool

● If only part of an image is double-compressed? Maybe a manipulation!

JPEG artifacts as manipulation cues

15

Page 16: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● JPEG is very popular “bad men” use JPEG, too

● If an image is recompressed, the statistics of JPEG artifacts change

● Forensic scenario:

● First JPEG compression: in camera

● Second JPEG compression: e.g. in a postprocessing tool

● If only part of an image is double-compressed? Maybe a manipulation!

JPEG artifacts as manipulation cues

Forensic question: “Are the JPEG artifacts consistent?”

16

Page 17: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Manipulation scenario: image splicing

Background, JPEG

compressed

Foreground, JPEG

compressed

Forgery, JPEG compressed

17

Page 18: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Manipulation scenario: image splicing

Background, JPEG

compressed

Foreground, JPEG

compressed

Forgery, JPEG compressed

Background:

double-compressed

Cat (foreground):

single-compressed(due to editing)

Foreground is adjusted to

background

(e.g., by cutting, cropping,

painting, smearing)

this destroys original (primary)

JPEG artifacts

18

Page 19: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● Common approach:

● Inspect coefficients of the discrete cosine transform

(e.g. Lukas et al. 2003, He et al. 2005, Ye et al. 2007, Huang et al. 2010)

● Tricky: case-by-case analysis, depending on compression parameters

● e.g. primary (first) compression == secondary compression,

● or secondary quantization factors multiples of primary factors

Detecting forgeries from JPEG inconsistencies

19

Page 20: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● Common approach:

● Inspect coefficients of the discrete cosine transform

(e.g. Lukas et al. 2003, He et al. 2005, Ye et al. 2007, Huang et al. 2010)

● Tricky: case-by-case analysis, depending on compression parameters

● e.g. primary (first) compression == secondary compression,

● or secondary quantization factors multiples of primary factors

Detecting forgeries from JPEG inconsistencies

JPEG Ghosts [1] exploit a different cue

• Applicable if primary compression < secondary compression

• Simple to explain and implement

• But: manual browsing of 100’s of images required

[1] Hany Farid, “Exposing Digital Forgeries from JPEG Ghosts” in IEEE Transactions on Information Forensics and Security, vol. 1, no. 4,

2009, pp. 154-160.

20

Page 21: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● Read JPEG compression parameters from image header

● Recompress an image with lower qualities , ,…

● Look at difference images , ,…

● …and the “ghost” appears

The JPEG Ghost observation

21

Page 22: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● Read JPEG compression parameters from image header

● Recompress an image with lower qualities , ,…

● Look at difference images , ,…

● …and the “ghost” appears

The JPEG Ghost observation

22

Page 23: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● Read JPEG compression parameters from image header

● Recompress an image with lower qualities , ,…

● Look at difference images , ,…

● …and the “ghost” appears

The JPEG Ghost observation

(synthetic) double-

compressed square

23

Page 24: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● Read JPEG compression parameters from image header

● Recompress an image with lower qualities , ,…

● Look at difference images , ,…

● …and the “ghost” appears

The JPEG Ghost observation

(synthetic) double-

compressed square

24

Page 25: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● Read JPEG compression parameters from image header

● Recompress an image with lower qualities , ,…

● Look at difference images , ,…

● …and the “ghost” appears

The JPEG Ghost observation

(synthetic) double-

compressed square

25

Page 26: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Finding Ghosts requires patience

Ghost hardly

visible if

26

Page 27: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Finding Ghosts requires patience

Ghost hardly

visible if

block grid is not aligned

27

Page 28: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Finding Ghosts requires patience

Ghost hardly

visible if

block grid is not aligned[try all 64

alignments!]

28

Page 29: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Finding Ghosts requires patience

first and second

compression parameters

of similar magnitude

Ghost hardly

visible if

block grid is not aligned[try all 64

alignments!]

29

Page 30: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Finding Ghosts requires patience

first and second

compression parameters

of similar magnitude

Ghost hardly

visible if

block grid is not aligned[try all 64

alignments!]

[look

sharper!]

30

Page 31: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Finding Ghosts requires patience

first and second

compression parameters

of similar magnitude

Ghost hardly

visible if

block grid is not aligned[try all 64

alignments!]

[look

sharper!]

up to 500 low-

contrast b/w

images.

31

Page 32: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Finding Ghosts requires patience

first and second

compression parameters

of similar magnitude

Ghost hardly

visible if

block grid is not aligned[try all 64

alignments!]

[look

sharper!]

up to 500 low-

contrast b/w

images.

Contribution of this work:

Complete Automation of the JPEG Ghost Scheme

32

Page 33: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● For each JPEG block

● track , ,… over recompression steps , ,…

● extract features,

● classify the block.

Extraction of Ghost data

33

Page 34: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● For each JPEG block

● track , ,… over recompression steps , ,…

● extract features,

● classify the block.

Extraction of Ghost data

34

Page 35: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● For each JPEG block

● track , ,… over recompression steps , ,…

● extract features,

● classify the block.

Extraction of Ghost data

JPEG recompression quality

Diffe

rence to input im

age

35

Page 36: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● For each JPEG block

● track , ,… over recompression steps , ,…

● extract features,

● classify the block.

Extraction of Ghost data

JPEG recompression quality

Diffe

rence to input im

age

JPEG recompression quality

Diffe

rence to input im

age

36

Page 37: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Feature extraction Single compression Double compression

● Weighted mean

● Median

● Slope of regression line

● Y-axis intercept of

regression line

● Weighted sum of points

below 0.5

● SSD between diagonal

and curve

Diffe

rence to input im

age

Diffe

rence to input im

age

JPEG recompression quality JPEG recompression quality

JPEG recompression quality JPEG recompression quality

37

Page 38: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Feature histograms: double vs. single-compressed

Median

Weighted mean Y-intercept of

regression line

Slope of

regression line

SSD below diagonal

% of points below

0.5

38

Page 39: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Classification and evaluation

[2] G. Schaefer and M. Stich, “UCID – An Uncompressed Colour Image Database,” in SPIE Storage and Retrieval Methods and Applications for

Multimedia, Jan. 2004, pp. 472-480.

● Classifiers:

● Naïve Bayes

● Multilayer Perceptron

● AdaBoost

● Random Forests

● Ghost Embeddings in UCID dataset [2]

● 1338 images, 512x384 pixels

● Three compression variants:

a) Purely single-compressed

b) 192x192 pixels double-compressed, remainder single-compressed

c) The opposite of b)

● Specificity/Sensitivity on 8x8, 16x16, 32x32 and 64x64 windows

39

Page 40: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

● Metric: Specificity / Sensitivity

● Results by quality difference between first and second compression

● Best performance on 8x8 pixels ( 1 JPEG block):

● = 5: Specificity 0.82, Sensitivity 0.86

● = 20: Specificity 0.997, Sensitivity 0.93

● Comparison to 8x8 pixel block method by Lin et al.:

● = 5: Specificity 0.58, Sensitivity 0.64

● = 20: Specificity 0.70, Sensitivity 0.60

Quantitative results (aligned grid, per image)

40

Page 41: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Qualitative results (1)

41

Page 42: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Qualitative results (2)

42

Page 43: Automated Image Forgery Detection through Classification of …€¦ · Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification

Aug. 30th, 2012 | Christian Riess | Pattern Recognition Lab (CS 5) | Forgery Detection through Classification of JPEG Ghosts

Summary

● Full automation of the JPEG Ghost scheme for distinguishing

single- and double-JPEG compression

● Features:

● Recompress image block with various (lower) quality levels

● Differences to input image block serve as basis for feature extraction

● 6 “straightforward-to-compute” features such as

● median of differences

● y-axis intercept of regression line

● Competitive detection rates with the simplicity of the Ghost scheme

e.g. AdaBoost:

specificity = 0.82, sensitivity = 0.86 at quality difference=5, 8x8 pixels

43


Recommended