Skip to main navigation Skip to search Skip to main content

Ambiguity attack on the integrity of a genuine picture by producing another picture immune to generic digital forensic test

Research output: Contribution to journalConference articlepeer-review

Abstract

Conventional image forgery relies heavily on various digital image processing techniques, which will inevitably introduce artifacts and inconsistency. For the goal of raising suspicion over the integrity of a genuine picture P, we proposed an ambiguity attack not employing any digital image processing techniques. It works by deliberately producing a second picture Pamb containing a target ROI(Region-of-Interest) that highly resembles the ROI in P. Except for the target ROI, the rest of the contents might be dramatically different between P and Pamb, so that Pamb tells a rather different story from P. Since Pamb is not involved with any forgery in digital domain, Pamb shall pass generic digital image forensic tests. Furthermore, several measures can be taken to make the ROI in Pamb looks more 'original' than its counterpart in P, which induces people to believe Pamb is genuine and P is no more than a forgery derived from Pamb instead. The ambiguity created between P and Pamb is hard to resolve due to three reasons. Firstly, no digital forensic tool shall identify any artifacts or inconsistency in Pamb; secondly, the fact of being able to pass all digital forensic tests still does not assure P is genuine; lastly, determine the chronological order of P and Pamb is very hard for general cases.

Original languageEnglish
JournalIS and T International Symposium on Electronic Imaging Science and Technology
DOIs
StatePublished - 2016
EventMedia Watermarking, Security, and Forensics 2016 - San Francisco, United States
Duration: Feb 14 2016Feb 18 2016

Fingerprint

Dive into the research topics of 'Ambiguity attack on the integrity of a genuine picture by producing another picture immune to generic digital forensic test'. Together they form a unique fingerprint.

Cite this