Submitted:
15 July 2023
Posted:
17 July 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
- The proposed method was evaluated using various scenarios of copy-move forgeries in the encrypted domain. Copy-move forgeries involve duplicating an pasting a portion of an image onto another part of the same image. The testing included different combinations of high-quality dummy and low-quality featured image, low-quality and dummy-high-quality featured image, and equal JPEG quality for dummy and featured images. Pixel block sizes were varied from to as small as . The results of the testing indicate that the proposed method was effective in localizing the tampered portions of the image in the encrypted domain, despite the variations in quality levels and small pixel block sizes. These findings suggest that the proposed method may be useful for detecting and locating copy-move forgeries in images in an encrypted domain.
- The forgery detection results were analyzed and it was found that the quality of the featured image can be predicted from these plots. Specifically, the featured image quality corresponds to the first minima in the energy plot.
2. Related Work
3. Preliminaries
3.1. Paillier Encryption
3.1.1. Key Generation
3.1.2. Encryption
3.1.3. Decryption
3.1.4. Homomorphic Properties
4. The Proposed Framework
4.1. System Model and Threat Model
-
Investigator : As an Investigator the role is to identify the forged region in an encrypted image without compromising the confidentiality of the image content. The forged images, denoted as , are created by copying and pasting a portion of an image onto another region within the same image, and then saving the resulting image at different JPEG qualities [17]. To perform this task, the encrypted forged image is outsourced to a Cloud Service Provider (CSP), who is assumed to be honest but curious.To maintain confidentiality, the image is encrypted using Paillier encryption, a public-key encryption scheme that supports homomorphic operations. The CSP follows the proposed protocol for detecting forged regions, but may also be interested in learning about the content of the image. However, since Paillier encryption is semantically secure, the encryption scheme reveals no information about the underlying image content. This ensures the privacy of the original image while allowing the identification of any tampered regions. It is assumed that the Investigator is a reliable and trusted entity.
- Cloud Service Provider(CSP) : Cloud Service Provider is an entity that resaves the encrypted forged image at different JPEG qualities and computes the difference between the encrypted forged image with the resaved image of different qualities. This ensures the confidentiality of the original image content throughout the process. Once the CSP has computed the encrypted differences, they can outsource them to a third-party server for further analysis. We are considering communication channel to be insecure between investigator and CSP, implying that the CSP is deemed to be an honest yet curious entity.
-
Third-Party Server: As a Third-Party Server, the primary responsibility is to assist the Investigator in detecting forged regions in an encrypted image. This involves decrypting the encrypted difference between the resaved image received from the Cloud Service Provider.Once decrypted, the difference must be squared to amplify it before being sent back to the Investigator. His role is to ensure that the decryption process is performed securely and that the squared difference is sent back to the Investigator without any loss of data or privacy concerns. The third-party server is assumed to be a trusted entity.
4.2. Proposed Methodology
5. Security Analysis
6. Experimental Analysis
6.1. Result Analysis
- 1.
-
In the first scenario, there are three conditions where the forgery portion size in all the conditions is as shown in Figure 2. The first condition involves a dummy image with higher quality than the featured image, while the second condition involves the featured image having higher quality than the dummy image and the third condition involves the featured image having equal quality of the dummy image.
- (a)
- In Figure 3, the featured image quality is 40 and dummy image quality is 70 of size inserted at coordinate (50, 50).
- (b)
- In Figure 4, the featured image quality is 90 and dummy image quality is 70 of size inserted at coordinate(50, 50).
- (c)
- In Figure 5, the featured image quality is 90 and dummy image quality is 90 of size inserted at coordinate (90, 90).
- 2.
-
In the last scenario, there are three conditions where the forgery portion size in all conditions is as shown in Figure 6. The first condition involves a dummy image with higher quality than the featured image, while the second condition involves the featured image having higher quality than the dummy image. and the third condition involves the featured image having equal quality of the dummy image.
- (a)
- In Figure 7, the featured image quality is 60 and dummy image quality is 85 of size inserted at coordinate (90, 90).
- (b)
- In Figure 8, the featured image quality is 85 and dummy image quality is 60 of size inserted at coordinate (90, 90).
- (c)
- In Figure 9, the featured image quality is 90 and dummy image quality is 90 of size inserted at coordinate (90, 90).
By varying the JPEG quality of resaved images, we analyzed different combinations of dummy and featured images. Through experimentation and testing with different sizes of forged portions, we determined that the detection of forged regions was effective for a range of JPEG quality and potential combinations of dummy and featured images.We also analyze the different experimental scenarios based on the difference between the energy of forged and resaved version of the image as shown in Equation (4), where P(x,y) is the energy of the image.where, represents the sum of the amplified pixel valuesof the difference image obtained in Equation (1). The first minima in graphs of "energy of image" against its "compression quality" indicate the quality of the featured image. In the Figure 10 and Figure 11 the first minima occur at compression quality corresponds to the quality of the featured image along with that the minute forgeries can be identified using our proposed scheme.
7. Conclusion and Future Work
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Abidin, A.B.Z.; Majid, H.B.A.; Samah, A.B.A.; Hashim, H.B. Copy-move image forgery detection using deep learning methods: a review. 2019 6th international conference on research and innovation in information systems (ICRIIS). IEEE, 2019, pp. 1–6.
- Wallace, G.K. The JPEG still picture compression standard. IEEE transactions on consumer electronics 1992, 38, xviii–xxxiv. [Google Scholar]
- Jiansheng, M.; Sukang, L.; Xiaomei, T. A digital watermarking algorithm based on DCT and DWT. Proceedings. The 2009 International Symposium on Web Information Systems and Applications (WISA 2009). Citeseer, 2009, p. 104.
- Rocha, A.; Scheirer, W.; Boult, T.; Goldenstein, S. Vision of the unseen: Current trends and challenges in digital image and video forensics. ACM Computing Surveys (CSUR) 2011, 43, 1–42. [Google Scholar] [CrossRef]
- Al-Qershi, O.M.; Khoo, B.E. Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic science international 2013, 231, 284–295. [Google Scholar] [CrossRef] [PubMed]
- Singh, D.; Singh, P.; Jena, R.; Chakraborty, R.S. An image forensic technique based on JPEG ghosts. Multimedia Tools and Applications 2022, pp. 1–17.
- Farid, H. Exposing digital forgeries from JPEG ghosts. IEEE transactions on information forensics and security 2009, 4, 154–160. [Google Scholar] [CrossRef]
- Lukáš, J.; Fridrich, J.; Goljan, M. Detecting digital image forgeries using sensor pattern noise. Security, Steganography, and Watermarking of Multimedia Contents VIII. International Society for Optics and Photonics, 2006, Vol. 6072, p. 60720Y.
- Amerini, I.; Uricchio, T.; Ballan, L.; Caldelli, R. Localization of JPEG double compression through multi-domain convolutional neural networks. 2017 IEEE Conference on computer vision and pattern recognition workshops (CVPRW). IEEE, 2017, pp. 1865–1871.
- Zhou, P.; Han, X.; Morariu, V.I.; Davis, L.S. Learning rich features for image manipulation detection. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 1053–1061.
- Rahmati, M.; Razzazi, F.; Behrad, A. Double JPEG compression detection and localization based on convolutional auto-encoder for image content removal. Digital Signal Processing 2022, 123, 103429. [Google Scholar] [CrossRef]
- Rao, Y.; Ni, J. A deep learning approach to detection of splicing and copy-move forgeries in images. 2016 IEEE international workshop on information forensics and security (WIFS). IEEE, 2016, pp. 1–6.
- Kumar, S.; Mukherjee, S.; Pal, A.K. An improved reduced feature-based copy-move forgery detection technique. Multimedia Tools and Applications 2023, 82, 1431–1456. [Google Scholar] [CrossRef]
- Diallo, B.; Urruty, T.; Bourdon, P.; Fernandez-Maloigne, C. Robust forgery detection for compressed images using CNN supervision. Forensic Science International: Reports 2020, 2, 100112. [Google Scholar] [CrossRef]
- Doegar, A.; Hiriyannaiah, S.; Siddesh, G.; Srinivasa, K.; Dutta, M. Cloud-based fusion of residual exploitation-based convolutional neural network models for image tampering detection in bioinformatics. BioMed Research International 2021, 2021, 1–12. [Google Scholar] [CrossRef]
- Paillier, P. Public-key cryptosystem based on discrete logarithm residues. EUROCRYPT 1999 1999. [Google Scholar]
- Kabeen, K.; Gent, P. Image Compression and Discrete Cosine Transform. College of Redwoods.
- Sridokmai, T.; Prakancharoen, S. The homomorphic other property of Paillier cryptosystem. 2015 International Conference on Science and Technology (TICST). IEEE, 2015, pp. 356–359.


| (a) Featured Image | (b) Dummy Image | (c) Forged Image |




| (a) Featured Image | (b) Dummy Image | (c) Forged Image |





Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).