Imperial College London > Talks@ee.imperial > COMMSP & CP list > Forensic and anti-forensic methods for JPEG-based image authentication Traditional methods for image authentication including, e.g., watermarking and hashing, rely on extrinsic information embedded into the image at the moment of acquisition, or received

Forensic and anti-forensic methods for JPEG-based image authentication Traditional methods for image authentication including, e.g., watermarking and hashing, rely on extrinsic information embedded into the image at the moment of acquisition, or received

Add to your list(s) Download to your calendar using vCal

  • UserMarco Tagliasacchi, Dipartimento di Elettronica e Informazione Politecnico di Milano, Italy
  • ClockWednesday 07 March 2012, 14:00-15:00
  • HouseGabor Seminar Room.

If you have a question about this talk, please contact Danilo Mandic.

Traditional methods for image authentication including, e.g., watermarking and hashing, rely on extrinsic information embedded into the image at the moment of acquisition, or received by a secure server upon demand. Conversely, in recent years, image forensics has tackled the same problem from a different standpoint, as the questioned image is typically the only source of information available to the forensic analyst. Forensic techniques analyze the image content in order to find traces left by specific acquisition, coding or editing operations, which could be tell-tale of malicious tampering. The traces left by JPEG compression play an important role in detecting possible forgeries, and they were shown to be effectively used for image authentication and tampering localization. However, these traces could be concealed by a knowledgeable adversary by applying anti-forensic methods. In this case, an interesting trade-off arises between the image quality, which is affected by the anti-forensic manipulation, and the probability of detecting traces of JPEG compression.

This talk is part of the COMMSP & CP list series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.

 

Changes to Talks@imperial | Privacy and Publicity