Attacks capable of removing SIFT keypoints from images have been recently devised with the intention of com- promising the correct functioning of SIFT-based copy–move forgery detection. To tackle with these attacks, we propose three novel forensic detectors for the identification of images whose SIFT keypoints have been globally or locally removed. The detectors look for inconsistencies like the absence or anom- alous distribution of keypoints within textured image regions. We first validate the methods on state-of-the-art keypoint removal techniques, then we further assess their robustness by devising a counter-forensic attack injecting fake SIFT keypoints in the attempt to cover the traces of removal. We apply the detectors to a practical image forensic scenario of SIFT-based copy-move forgery detection, assuming the presence of a counterfeiter who resorts to keypoint removal and injection to create copy–move forgeries that successfully elude SIFT-based detectors but are in turn exposed by the newly proposed tools.
Forensic Analysis of SIFT Keypoint Removal and Injection / Andrea, Costanzo; Amerini, Irene; Caldelli, Roberto; Barni, Mauro. - In: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. - ISSN 1556-6013. - 9:9(2014), pp. 1450-1464. [10.1109/TIFS.2014.2337654]
Forensic Analysis of SIFT Keypoint Removal and Injection
AMERINI, IRENE
;
2014
Abstract
Attacks capable of removing SIFT keypoints from images have been recently devised with the intention of com- promising the correct functioning of SIFT-based copy–move forgery detection. To tackle with these attacks, we propose three novel forensic detectors for the identification of images whose SIFT keypoints have been globally or locally removed. The detectors look for inconsistencies like the absence or anom- alous distribution of keypoints within textured image regions. We first validate the methods on state-of-the-art keypoint removal techniques, then we further assess their robustness by devising a counter-forensic attack injecting fake SIFT keypoints in the attempt to cover the traces of removal. We apply the detectors to a practical image forensic scenario of SIFT-based copy-move forgery detection, assuming the presence of a counterfeiter who resorts to keypoint removal and injection to create copy–move forgeries that successfully elude SIFT-based detectors but are in turn exposed by the newly proposed tools.File | Dimensione | Formato | |
---|---|---|---|
Costanzo_Forensic-Analysis_2014.pdf
solo gestori archivio
Tipologia:
Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
6.48 MB
Formato
Adobe PDF
|
6.48 MB | Adobe PDF | Contatta l'autore |
VE_2014_11573-1325017.pdf
solo gestori archivio
Tipologia:
Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
6.49 MB
Formato
Adobe PDF
|
6.49 MB | Adobe PDF | Contatta l'autore |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.