Visible to the public A Gradient-Based Pixel-Domain Attack against SVM Detection of Global Image Manipulations

TitleA Gradient-Based Pixel-Domain Attack against SVM Detection of Global Image Manipulations
Publication TypeConference Paper
Year of Publication2017
AuthorsChen, Z., Tondi, B., Li, X., Ni, R., Zhao, Y., Barni, M.
Conference Name2017 IEEE Workshop on Information Forensics and Security (WIFS)
Date PublishedDec. 2017
PublisherIEEE
ISBN Number978-1-5090-6769-5
Keywordsadaptive filtering, adaptive histogram equalization, computational complexity, Detectors, equalisers, estimation theory, feature extraction, forensic techniques, Forensics, global image manipulations, gradient descent methodology, gradient estimation, gradient methods, gradient-based pixel-domain attack, high-dimensional SPAM features, histogram stretching, Histograms, image enhancement, image filtering, limited knowledge, LK, median filtering, median filters, Metrics, noise figure 50 dB to 70 dB, Nonlinear distortion, PSNR, pubcrawl, resilience, Resiliency, Scalability, Support vector machines, SVM detection
Abstract

We present a gradient-based attack against SVM-based forensic techniques relying on high-dimensional SPAM features. As opposed to prior work, the attack works directly in the pixel domain even if the relationship between pixel values and SPAM features can not be inverted. The proposed method relies on the estimation of the gradient of the SVM output with respect to pixel values, however it departs from gradient descent methodology due to the necessity of preserving the integer nature of pixels and to reduce the effect of the attack on image quality. A fast algorithm to estimate the gradient is also introduced to reduce the complexity of the attack. We tested the proposed attack against SVM detection of histogram stretching, adaptive histogram equalization and median filtering. In all cases the attack succeeded in inducing a decision error with a very limited distortion, the PSNR between the original and the attacked images ranging from 50 to 70 dBs. The attack is also effective in the case of attacks with Limited Knowledge (LK) when the SVM used by the attacker is trained on a different dataset with respect to that used by the analyst.

URLhttp://ieeexplore.ieee.org/document/8267668/
DOI10.1109/WIFS.2017.8267668
Citation Keychen_gradient-based_2017