Top Banner
Statistical Tools for Digital Forensics Multimedia Security
38

Statistical Tools for Digital Forensics Multimedia Security.

Dec 31, 2015

Download

Documents

Matthew Adams
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Statistical Tools for Digital Forensics Multimedia Security.

Statistical Tools forDigital Forensics

Multimedia Security

Page 2: Statistical Tools for Digital Forensics Multimedia Security.

Henry Chang-Yu Lee

• One of the world’s foremost forensicscientists.

• Chief Emeritus for Scientific Servicesfor the State of Connecticut.

• Full professor of forensic science at the University of New Haven, where he has helped to set up the Henry C. Lee Forensic Institute.

Page 3: Statistical Tools for Digital Forensics Multimedia Security.

Forensics

• Forensic science, the application of a broad spectrum of sciences to answer questions of interest to the legal system.

• Criminal investigations.• Other forensics disciplines:

– Forensic accounting.– Forensic economics.– Forensic engineering.– Forensic linguistics.– Forensic toxicology.– …

Page 4: Statistical Tools for Digital Forensics Multimedia Security.

Digital Forensics

• Application of the scientific method to digital media in order to establish factual information for judicial review.

• What is digital forensics associate with DRM?– Authorized images have been tampered.– How to declare the image is neither authentic, nor authorized.

Page 5: Statistical Tools for Digital Forensics Multimedia Security.

Image Tampering

• Tampering with images is neither new, nor recent.• Tampering of film photographs:

– Airbrushing.– Re-touching.– Dodging and burning.– Contrast and color adjustment.– …

• Outside the reach of the average user.

Page 6: Statistical Tools for Digital Forensics Multimedia Security.

Image Tampering

• Digital Tampering:– Compositing.– Morphing.– Re-touching.– Enhancing.– Computer graphics.– Painted.

Page 7: Statistical Tools for Digital Forensics Multimedia Security.

Image Tampering

• Tampering is not a well defined notion, and is often application dependent.

• Image manipulations may be legitimate in some cases, ex. use a composite image for a magazine cover.

• But illegitimate in others, ex. evidence in a court of law.

Page 8: Statistical Tools for Digital Forensics Multimedia Security.

Watermarking-Based Forensics

• Digital watermarking has been proposed as a means by which a content can be authenticated.

• Exact authentication schemes:– Change even a single bit is unacceptable.– Fragile watermarks.

• Watermarks will be undetectable when the content is changed in any way.

– Embedded signatures.• Embed at the time of recording an authentication signature in

the content.– Erasable watermarks.

• aka invertible watermarks, are employed in applications that do not tolerate the slight content changes.

Page 9: Statistical Tools for Digital Forensics Multimedia Security.

Watermarking-Based Forensics

• Selective authentication schemes:– Verify if a content has been modified by any illegitimate

distortions.– Semi-fragile watermarks.

• Watermark will survive only under legitimate distortion.– Tell-tale watermarks.

• Robust watermarks that survive tampering, but are distorted in the process.

• The major drawback is that a watermark must be inserted at the time of recording, which would limit this approach to specially equipped digital cameras.

Page 10: Statistical Tools for Digital Forensics Multimedia Security.

Statistical Techniques for Detecting Traces

• Assumption:– Digital forgeries may be visually imperceptible, nevertheless,

they may alter the underlying statistics of an image.

• Techniques:– Copy-move forgery.– Duplicated image regions.– Re-sampled images.– Inconsistencies in lighting.– Chromatic Aberration.– Inconsistent sensor pattern noise.– Color filter array interpolation.– …

Page 11: Statistical Tools for Digital Forensics Multimedia Security.

Detecting Inconsistencies in Lighting

• L: direction of the light source.• A: constant ambient light term.

Page 12: Statistical Tools for Digital Forensics Multimedia Security.

Detecting InconsistentSensor Pattern Noise

• • • • p: series of images.• F: denoising filter.• n: noise residuals.

• Pc: camera reference pattern.

kkk pFpn pk

c NnP

Page 13: Statistical Tools for Digital Forensics Multimedia Security.

Detecting InconsistentSensor Pattern Noise

• Calculate for regions Qk of the same size and shape coming from other cameras or different locations.

• • Decide R was tampered if p > th = 10-3 and not tapere

d otherwise.

RPQn ck ,

R

Page 14: Statistical Tools for Digital Forensics Multimedia Security.

Detecting Color Filter Array Interpolation

• Most digital cameras have the CFA algorithm, by each pixel only detecting one color.

• Detecting image forgeries by determining the CFA matrix and calculating the correlation.

Page 15: Statistical Tools for Digital Forensics Multimedia Security.

Reference

• H. Farid, “Exposing Digital Forgeries in Scientific Images,”in ACM MMSec, 2006

• J. Fridrich, D. Soukal, J. Lukas,“Detection of Copy-Move Forgery in Digital Images,”in Proceedings of Digital Forensic Research Workshop, Aug. 2003

• A. C. Popescu, H. Farid,“Exposing Digital Forgeries by Detecting Duplicated Image Regions,”in Technical Report, 2004

• A. C. Popescu, H. Farid,“Exposing Digital Forgeries by Detecting Traces of Resampling,” in IEEE TSP, vol.53, no.2, Feb. 2005

Page 16: Statistical Tools for Digital Forensics Multimedia Security.

Reference

• M. K. Johnson, H. Farid,“Exposing Digital Forgeries by Detecting Inconsistencies in Lighting,”in ACM MMSec, 2005

• M. K. Johnson, H. Farid,“Exposing Digital Forgeries Through Chromatic Aberration,”in ACM MMSec, 2006

• J. Lukas, J. Fridrich, M. Goljan,“Detecting Digital Image Forgeries Using Sensor Pattern Noise,”in SPIE, Feb. 2006

• A. C. Popescu, H. Farid,“Exposing Digital Forgeries in Color Filter Array Interpolated Images,”in IEEE TSP, vol.53, no.10, Oct. 2005

Page 17: Statistical Tools for Digital Forensics Multimedia Security.

Discussion

• The problem of detecting digital forgeries is a complex one with no universally applicable solution.

• Reliable forgery detection should be approached from multiple directions.

• Forensics is done in a fashion that adheres to the standards of evidence admissible in a court of law.

• Thus, digital forensics must be techno-legal in nature rather than purely technical or purely legal.

Page 18: Statistical Tools for Digital Forensics Multimedia Security.

Exposing Digital Forgeries inScientific Images

Hany Farid,ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep. 2006

Page 19: Statistical Tools for Digital Forensics Multimedia Security.

Outline

• Introduction• Image Manipulation• Image Segmentation• Automatic Detection• Discussion

Page 20: Statistical Tools for Digital Forensics Multimedia Security.

Introduction

• 南韓黃禹錫幹細胞研究造假– 2005/06/17 黃禹錫宣布成功的建立 11 個病人

身上體細胞所衍生的幹細胞株,論文並於國際知名的《科學》期刊發表。

– 2005/11/11 共同作者夏騰指控黃禹錫對他隱瞞卵子取得來源的事實,並認為其與黃禹錫所發表的論文數據有瑕疵。

– 2005/11/21 南韓首爾國立大學應黃禹錫自己要求也展開調查其實驗結果。

Page 21: Statistical Tools for Digital Forensics Multimedia Security.

Introduction

• 南韓黃禹錫幹細胞研究造假– 2005/12/23 初步報告顯示,黃禹錫在 2005 年

發表在《科學》期刊的論文,數據絕大部份都是子虛烏有:由 11 個病人身上體細胞所衍生的幹細胞株,實際存在的只有兩個,這項結果也顯示黃禹錫的人為疏失並不是無意造成地,而是刻意欺騙。

– 2005/12/29 調查委員會再公佈所謂的實際存在的兩個病人幹細胞株其 DNA 也不符合原來的體細胞。

– 2006/1/13 《科學》期刊正式宣佈撤回黃禹錫在 2005 年和 2004 年的兩篇論文。

Page 22: Statistical Tools for Digital Forensics Multimedia Security.

Outline

• Introduction• Image Manipulation• Image Segmentation• Automatic Detection• Discussion

Page 23: Statistical Tools for Digital Forensics Multimedia Security.

Image Manipulation

• Action of each manipulation scheme:– Deletion, (a).

• A band was erased.– Healing, (b).

• Several bands were removing using Photoshop’s “healing brush.”

– Duplication, (c).• A band was copied and pasted

into a new location.

Page 24: Statistical Tools for Digital Forensics Multimedia Security.

Image Manipulation

• Effect of each manipulation scheme:– Deletion.

• Remove small amounts of noise that are present through the dark background of the image.

– Healing.• Disturb the underlying spatial frequency (texture).

– Duplication.• Leave behind an obvious statistical pattern – two regions in

the image are identical.

• Formulate the problem of detecting each of these statistical patterns as an image segmentation problem.

Page 25: Statistical Tools for Digital Forensics Multimedia Security.

Outline

• Introduction• Image Manipulation• Image Segmentation• Automatic Detection• Discussion

Page 26: Statistical Tools for Digital Forensics Multimedia Security.

Image Segmentation:Graph Cut

• Consider a weighted graph G = (V, E).• A graph can be partitioned into A and B such that A ∩

B = φ and A B = V.∪•

• To remove the bias which is anatural tendency to cut a smallnumber of low-cost edges:

• •

Page 27: Statistical Tools for Digital Forensics Multimedia Security.

Image Segmentation:Graph Cut

• Define W a n×n matrix such that Wi,j = w (i, j) is the weight between vertices i and j.

• Define D a n×n diagonal matrix whose ith element on the diagonal is .

• Solve the eigenvector problem with the secondsmallest eigenvalue λ.

• Let the sign of each component of define the membership of thevertex.

e

Page 28: Statistical Tools for Digital Forensics Multimedia Security.

Image Segmentation: Intensity

• For deletion.

• • I ( . ): gray value at a given pixel.

• Δi,j: Euclidean distance.

Page 29: Statistical Tools for Digital Forensics Multimedia Security.

Image Segmentation: Intensity

• First Iteration:– Group into regions corresponding to the bands (gray pixels) and

the background.

• Second Iteration:– The background is grouped into two regions (black and white

pixels.)

Page 30: Statistical Tools for Digital Forensics Multimedia Security.

Image Segmentation: Texture

• For healing.

• Ig ( . ): the magnitude of the image gradient at a given pixel.

• • •

Page 31: Statistical Tools for Digital Forensics Multimedia Security.

Image Segmentation: Texture

• s • d ( . ): 1D deravative filte

r.– [0.0187 0.1253 0.1930 0.0 −0.

1930 −0.1253 −0.0187]

• p ( . ): low-pass filter.– [0.0047 0.0693 0.2454 0.361

1 0.2454 0.0693 0.0047]

101

202

101

101

1

2

1

Page 32: Statistical Tools for Digital Forensics Multimedia Security.

Image Segmentation: Texture

• First Iteration:– Using intensity-based segm

entation.– Group into regions correspo

nding to the bands (gray pixels) and the background.

• Second Iteration:– Using texture-based segmen

tation.– The background is grouped i

nto two regions (black and white pixels.)

Page 33: Statistical Tools for Digital Forensics Multimedia Security.

Image Segmentation: Duplication

• For duplication.

• • • One iteration.

Page 34: Statistical Tools for Digital Forensics Multimedia Security.

Outline

• Introduction• Image Manipulation• Image Segmentation• Automatic Detection• Discussion

Page 35: Statistical Tools for Digital Forensics Multimedia Security.

Automatic Detection

• Denote the segmentation map as S (x, y).• Consider all pixels x, y with value S (x, y) = 0 such that

all 8 spatial neighbors also have value 0. The mean of all of the edge weights between such vertices is computed across the entire segmentation map.

• This process is repeated for all pixels x, y with value S (x, y) = 1.

• Values near 1 are indicative of tampering because of significant similarity in the underlying measures of intensity, texture, or duplication.

Page 36: Statistical Tools for Digital Forensics Multimedia Security.

Automatic Detection

S0 = 0.19 S0 = 0.99 S0 = 0.30 S0 = 0.98 S0 = 0.50 S0 = 0.97

Page 37: Statistical Tools for Digital Forensics Multimedia Security.

Outline

• Introduction• Image Manipulation• Image Segmentation• Automatic Detection• Discussion

Page 38: Statistical Tools for Digital Forensics Multimedia Security.

Discussion

• These techniques are specifically designed for scientific images, and for common manipulations that may be applied to them.

• As usual, these techniques are vulnerable to a host of counter-measures that can hide traces of tampering.

• As continuing to develop new techniques, it will become increasingly difficult to evade all approaches.