{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:47:36Z","timestamp":1762955256189},"reference-count":26,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>In this paper the authors propose a universal image counter-forensic scheme that contrasts any detector based on the analysis of the image histogram. Being universal, the scheme does not require knowledge of the detection algorithms available to the forensic analyst, and can be used to conceal traces left in the histogram of the image by any processing tool. Instead of adapting the histogram of the image to fit some statistical model, the proposed scheme makes it practically identical to the histogram of an untouched image, by solving an optimization problem. In doing this, the perceptual similarity between the processed and counter-attacked image is preserved to a large extent. The validity of the scheme in countering both contrast-enhancement and splicing- detection is assessed through experimental validation.<\/p>","DOI":"10.4018\/jdcf.2013070103","type":"journal-article","created":{"date-parts":[[2013,9,9]],"date-time":"2013-09-09T12:59:46Z","timestamp":1378731586000},"page":"35-52","source":"Crossref","is-referenced-by-count":17,"title":["A Universal Attack Against Histogram-Based Image Forensics"],"prefix":"10.4018","volume":"5","author":[{"given":"Mauro","family":"Barni","sequence":"first","affiliation":[{"name":"Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy"}]},{"given":"Marco","family":"Fontani","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy"}]},{"given":"Benedetta","family":"Tondi","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy"}]}],"member":"2432","reference":[{"key":"jdcf.2013070103-0","doi-asserted-by":"publisher","DOI":"10.1145\/2361407.2361424"},{"key":"jdcf.2013070103-1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412649"},{"key":"jdcf.2013070103-2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2237397"},{"key":"jdcf.2013070103-3","author":"P.Bonami","year":"2009","journal-title":"Algorithms and software for convex mixed integer nonlinear programs"},{"issue":"1","key":"jdcf.2013070103-4","first-page":"19","article-title":"Mixed-integer nonlinear programming. SIAG\/OPT Newsletter","volume":"14","author":"M. R.Bussieck","year":"2003","journal-title":"Views & News"},{"key":"jdcf.2013070103-5","doi-asserted-by":"crossref","unstructured":"Bussieck, M. R., & Vigerske, S. (2011). MINLP solver software.","DOI":"10.1002\/9780470400531.eorms0527"},{"key":"jdcf.2013070103-6","doi-asserted-by":"crossref","unstructured":"Cao, G., Zhao, Y., Ni, R., & Tian, H. (2010). Anti-forensics of contrast enhancement in digital images. In Proceedings of MM&Sec 2010, 12th ACM Workshop on Multimedia and Security (MM&Sec \u201910).","DOI":"10.1145\/1854229.1854237"},{"key":"jdcf.2013070103-7","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"jdcf.2013070103-8","doi-asserted-by":"publisher","DOI":"10.1109\/18.32134"},{"key":"jdcf.2013070103-9","doi-asserted-by":"crossref","unstructured":"Huiskes, M. J., & Lew, M. S. (2008). The MIR Flickr retrieval evaluation. In Proceedings of the ACM International Conference on Multimedia Information Retrieval (MIR \u201908). Vancouver, Canada: ACM.","DOI":"10.1145\/1460096.1460104"},{"key":"jdcf.2013070103-10","doi-asserted-by":"crossref","unstructured":"Kirchner, M., & B\u00f6hme, R. (2007). Tamper hiding: Defeating image forensics. In Proceedings of the IH 2007, Internatoinal Conference on Information Hiding (pp. 326\u2013341).","DOI":"10.1007\/978-3-540-77370-2_22"},{"key":"jdcf.2013070103-11","author":"A. A.Michelson","year":"1927","journal-title":"Studies in optics"},{"key":"jdcf.2013070103-12","doi-asserted-by":"crossref","unstructured":"Pele, O., & Werman, M. (2010). The quadratic-chi histogram distance family. In Proceedings of the ECCV 2010, European Conference on Computer Vision.","DOI":"10.1007\/978-3-642-15552-9_54"},{"key":"jdcf.2013070103-13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0620-1"},{"key":"jdcf.2013070103-14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026543900054"},{"key":"jdcf.2013070103-15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5651245"},{"key":"jdcf.2013070103-16","doi-asserted-by":"crossref","unstructured":"Stamm, M. C., Lin, S., & Liu, K. J. R. (2012). Forensics vs. anti-forensics: A decision and game theoretic framework. In Proceedings of the ICASSP 2012, IEEE International Conference on Acoustics, Speech, and Signal Processing.","DOI":"10.1109\/ICASSP.2012.6288237"},{"key":"jdcf.2013070103-17","doi-asserted-by":"crossref","unstructured":"Stamm, M. C., & Liu, K. J. R. (2008). Blind forensics of contrast enhancement in digital images. In Proceedings of the ICIP 2008, IEEE International Conference on Image Processing (pp. 3112\u20133115).","DOI":"10.1109\/ICIP.2008.4712454"},{"key":"jdcf.2013070103-18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2053202"},{"key":"jdcf.2013070103-19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946872"},{"key":"jdcf.2013070103-20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652553"},{"key":"jdcf.2013070103-21","doi-asserted-by":"crossref","unstructured":"Valenzise, G., Nobile, V., Tagliasacchi, M., & Tubaro, S. (2011). Countering JPEG anti-forensics. In Proceedings of the ICIP 2011, IEEE International Conference on Image Processing (pp. 1949\u20131952).","DOI":"10.1109\/ICIP.2011.6115854"},{"key":"jdcf.2013070103-22","author":"C.Villani","year":"2003","journal-title":"Topics in optimal transportation"},{"key":"jdcf.2013070103-23","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-004-0559-y"},{"key":"jdcf.2013070103-24","doi-asserted-by":"crossref","unstructured":"Wang, W., & Farid, H. (2006). Exposing digital forgeries in video by detecting double MPEG compression. In Proceedings of the MM&Sec 2006, 8th ACM Workshop on Multimedia & Security (pp. 37\u201347).","DOI":"10.1145\/1161366.1161375"},{"key":"jdcf.2013070103-25","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=84135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:08:46Z","timestamp":1654103326000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2013070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2013070103","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}