首页> 外文会议>Conference on media watermarking, security, and forensics >Image counter-forensics based on feature injection
【24h】

Image counter-forensics based on feature injection

机译:基于特征注入的图像反取证

获取原文

摘要

Starting from the concept that many image forensic tools are based on the detection of some features revealing a particular aspect of the history of an image, in this work we model the counter-forensic attack as the injection of a specific fake feature pointing to the same history of an authentic reference image. We propose a general attack strategy that does not rely on a specific detector structure. Given a source image x and a target image y, the adversary processes x in the pixel domain producing an attacked image x, perceptually similar to x, whose feature f(x) is as close as possible to f(y) computed on y. Our proposed counter-forensic attack consists in the constrained minimization of the feature distance Φ(z) = | f(z) - f(y) | through iterative methods based on gradient descent. To solve the intrinsic limit due to the numerical estimation of the gradient on large images, we propose the application of a feature decomposition process, that allows the problem to be reduced into many subproblems on the blocks the image is partitioned into. The proposed strategy has been tested by attacking three different features and its performance has been compared to state-of-the-art counter-forensic methods.
机译:从许多图像取证工具都是基于检测揭示图像历史特定方面的某些特征这一概念开始,在这项工作中,我们将反取证攻击建模为注入指向相同图像的特定伪造特征真实参考图像的历史记录。我们提出了一种不依赖特定检测器结构的一般攻击策略。给定源图像x和目标图像y,对手在像素域中处理x会生成在视觉上类似于x的被攻击图像x,其特征f(x)尽可能接近于y计算的f(y)。我们提出的反取证攻击在于特征距离Φ(z)= |的受约束的最小化。 f(z)-f(y)|通过基于梯度下降的迭代方法。为了解决由于对大图像上的梯度进行数值估计而导致的固有限制,我们提出了一种特征分解过程的应用,该特征分解过程可将问题减少到图像被分割成的块上的许多子问题中。通过攻击三种不同的功能对提出的策略进行了测试,并将其性能与最新的反取证方法进行了比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号