MM-Forensics Multimedia Forensics and Security

MM-Forensics - Multimedia Forensics and Security

Multimedia forensics and Security project aims to introduce novel methodologies to support clue analysis and to provide an aid for making a decision about a crime by looking at a multimedia content as a digital clue (image and video).

Multimedia forensics deals with developing technological instruments operating in the absence of signatures or watermarks inserted in the image. These techniques basically allow the user to determine if a particular content has been tampered with or which was the acquisition device used.

In many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watcher’s opinion. In the MM-Forensics project we have been working on novel methods that focuses on various questions regarding Image Forensics.

In particular, the first issue we focused on is about detecting if a tampered image has been created by cloning an area of the image onto another zone to make a duplication or to cancel something awkward.

In particular, one of the proposed approach is based on SIFT features and allows both to understand if a copy-move attack has occurred and which are the image points involved, and, furthermore, to recover which has been the geometric transformation happened to perform cloning, by computing the transformation parameters. In fact when a copy-move attack takes place, usually an affine transformation is applied to the image patch selected to fit in a specified position according to that context.

Splicing attack detection
Splicing attack detection

On the basis of this technique, developed to deal with tampered digital images, a method for detecting copy-move forgery from printed pictures has been developed too.

Acquisition device identification
Acquisition device identification

During this project we focused also on splicing forgery localization and we devised a method that is able to localize which parts of an image have been altered. In fact, localization is basic within the process of image examination because it permits to link the modified zone with the corresponding image area and, above all, with the meaning of it.

Example of counter-forensic attack
Example of counter-forensic attack

Forensic instruments dealing with copy-move manipulation quite always provides a localization map, but, on the contrary, only a few tools, devised to detect a splicing operation, are able to give information about localization too. So a method to distinguish and then localize a single and a double JPEG compression in portions of an image through the use of the DCT coefficients first digit features and employing a Support Vector Machine (SVM) classifier has been proposed.

Furthermore the MM-Forensics project is involved in investigating two aspects regarding the task of acquisition device identification: the first is to determine which specific camera or scanner (by recognizing model and brand) acquired that certain content, while the second is to understand which kind of device generated a digital image (e.g. a scanner, a digital camera or is a computer graphics product).

Finally the question of trustworthiness of digital image forensic has been analyzed in this project. Forensic methods might benefit from research on countermeasures in a similar way as reasoning about attacks in multimedia security in general is useful to improve security.

In this sense attacks on image forensic algorithms can be understood as schemes to mislead the detection methods. In general, such attacks can be assigned to one of the following three objectives: the camouflage of malicious post-processing or tampering of an image, the suppression of correct image origin identification and furthermore the forgery of image origin.

In particular attacks capable of removing SIFT keypoints from images have been recently devised with the intention of compromising the correct functioning of SIFT-based copy–move forgery detection. To tackle with these attacks, we have realized three novel forensic detectors for the identification of images whose SIFT keypoints have been globally or locally removed.

PUBLICATIONS:

  • Irene Amerini, Lamberto Ballan,Roberto Caldelli, Alberto Del Bimbo, Luca Del Tongo, Giuseppe Serra, “Copy-Move Forgery Detection and Localization by Means of Robust Clustering with J-Linkage”. In Signal Processing: Image Communication, March 2013, vol. 28, no. 6, pp. 659-669
    http://www.sciencedirect.com/science/article/pii/S0923596513000453
  • I.Amerini, M.Barni, R.Caldelli, A.Costanzo – SIFT keypoint removal and injection for countering matching-based Image Forensics, IH&MMSec13 ACM Information Hiding and Multimedia Security Workshop, 17-19 June 2013, Montpellier, France
    http://dl.acm.org/citation.cfm?id=2482524
  • I.Amerini, M.Barni, R.Caldelli, A.Costanzo, “Removal and injection of keypoints for SIFT-based copy-move counter-forensics”, EURASIP Journal on Information Security, 13/11/2013.
    http://www.jis.eurasipjournals.com/content/2013/1/8
  • I.Amerini, R.Becarelli, R.Caldelli, A.Del Mastio Splicing Forgeries Localization through the Use of First Digit Features, IEEE Workshop on Information Forensics and Security at IEEE GlobalSIP , 3-5 December 2014, Atlanta (US) http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7084318
  • I.Amerini, R.Caldelli, A.Del Bimbo, A.Di Fuccia, A.P.Rizzo, L.Saravo, Detection of manipulations on printed images to address crime scene analysis: A case study Forensic Science International, ISSN 0379-0738, Available online 30 March 2015. http://www.sciencedirect.com/science/article/pii/S0379073815001267
  • I.Amerini, R.Caldelli, P.Crescenzi, A.Del Mastio, A.Marino, Blind image clustering based on the Normalized Cuts criterion for camera identification , Signal Processing: Image Communication, 23/09/2014. http://www.sciencedirect.com/science/article/pii/S092359651400109X
  • I.Amerini, R.Caldelli, A.Del Bimbo, A.Di Fuccia, A.P.Rizzo, L.Saravo, Copy-Move Forgery Detection from Printed Images “, Proc. SPIE Electronic Imaging, San Francisco, CA US, february 2014.
    http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1833125
  • A.Costanzo, I.Amerini, R.Caldelli, M.Barni, Forensic Analysis of SIFT Keypoint Removal and Injection IEEE Transactions on Information Forensics & Security, 12/09/2014. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6851909
    http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6851909
  • R.Caldelli, I.Amerini, A.Costanzo, “SIFT match removal and keypoint preservation through dominant orientation shift”, European Signal Processing Conference (EUSIPCO) 2015, Nice, France , 31st August- 4th September 2015 .
    http://www.eurasip.org/Proceedings/Eusipco/Eusipco2015/papers/1570097323.pdf
  • Amerini, M.Barni, R.Caldelli, A.Costanzo, Counter-forensics of SIFT-based copy-move detection by means of keypoint classification EURASIP Journal of Image and Video Processing JIVP, 2013, 15 April 2013.http://www.jivp.eurasipjournals.com/content/2013/1/18#refs
  • I.Amerini, R.Caldelli, A.Del Bimbo, A.Di Fuccia, A.P.Rizzo, L.Saravo, Forgery detection from printed images: a tool in crime scene analysis, AAFS 66th Annual Scientific Meeting, Seattle, WA,
  • I.Amerini, F.Battisti, R.Caldelli, M.Carli, A.Costanzo, Exploiting perceptual quality issues in countering SIFT-based Forensic methods, 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2014, Florence, Italy, May 4-9, 2014.
    http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6854083&tag=1
    http://www.comlab.uniroma3.it/BattistiPapers/ICASSP2014_Battisti.pdf
  • I.Amerini, R.Becarelli, B.Bertini, R.Caldelli, Acquisition source identification through a blind image classification. IET Image Processing, 15/10/2014.
    http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7073726

VIDEO: https://vimeo.com/115243905