Scale Invariant Feature Transform (SIFT) has been widely employed in several image application domains, including Image Forensics (e.g. detection of copy-move forgery or near duplicates). Until now, the research community has focused on studying the robustness of SIFT against legitimate image processing, but rarely concerned itself with the problem of SIFT security against malicious procedures. Recently, a number of methods allowing to remove SIFT keypoints from an original image have been devised. Although quite effective, such methods produce an attacked image with very few (or no) keypoints, thus leaving cues that can be easily exploited by a forensic analyst to reveal the occurred manipulation. In this paper, we explore the topic of reintroducing fake SIFT keypoints into a previously cleaned image in order to address the main weakness of the existing removal attacks. In particular, we evaluate the fitness of locally adaptive contrast enhancement methods to the task of injecting new keypoints. The results we obtained are encouraging: (i) it is possible to effectively introduce new keypoints whose descriptors do not match with those of the original image, thus concealing the removal forgery; (ii) the perceptual quality of the image following the removal and injection attacks is comparable to the one of the original image.

SIFT keypoint removal and injection for countering matching-based image forensics / Amerini, Irene; Mauro, Barni; Caldelli, Roberto; Andrea, Costanzo. - (2013), pp. 123-130. (Intervento presentato al convegno IH&MMSec '13 Proceedings of the first ACM workshop on Information hiding and multimedia security tenutosi a Montpellier; France) [10.1145/2482513.2482524].

SIFT keypoint removal and injection for countering matching-based image forensics

AMERINI, IRENE
;
2013

Abstract

Scale Invariant Feature Transform (SIFT) has been widely employed in several image application domains, including Image Forensics (e.g. detection of copy-move forgery or near duplicates). Until now, the research community has focused on studying the robustness of SIFT against legitimate image processing, but rarely concerned itself with the problem of SIFT security against malicious procedures. Recently, a number of methods allowing to remove SIFT keypoints from an original image have been devised. Although quite effective, such methods produce an attacked image with very few (or no) keypoints, thus leaving cues that can be easily exploited by a forensic analyst to reveal the occurred manipulation. In this paper, we explore the topic of reintroducing fake SIFT keypoints into a previously cleaned image in order to address the main weakness of the existing removal attacks. In particular, we evaluate the fitness of locally adaptive contrast enhancement methods to the task of injecting new keypoints. The results we obtained are encouraging: (i) it is possible to effectively introduce new keypoints whose descriptors do not match with those of the original image, thus concealing the removal forgery; (ii) the perceptual quality of the image following the removal and injection attacks is comparable to the one of the original image.
2013
IH&MMSec '13 Proceedings of the first ACM workshop on Information hiding and multimedia security
counter-forensics; image forensics; keypoint injection; sift keypoints
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
SIFT keypoint removal and injection for countering matching-based image forensics / Amerini, Irene; Mauro, Barni; Caldelli, Roberto; Andrea, Costanzo. - (2013), pp. 123-130. (Intervento presentato al convegno IH&MMSec '13 Proceedings of the first ACM workshop on Information hiding and multimedia security tenutosi a Montpellier; France) [10.1145/2482513.2482524].
File allegati a questo prodotto
File Dimensione Formato  
Amerini_SIFT_2013.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1.94 MB
Formato Adobe PDF
1.94 MB Adobe PDF   Contatta l'autore
VE_2013_11573-1324982.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1.94 MB
Formato Adobe PDF
1.94 MB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1324982
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? ND
social impact