Back
 JIS  Vol.8 No.3 , July 2017
On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering
Abstract: Tampering of biometric data has attracted a great deal of attention recently. Furthermore, there could be an intentional or accidental use of a particular biometric sample instead of another for a particular application. Therefore, there exists a need to propose a method to detect data tampering, as well as differentiate biometric samples in cases of intentional or accidental use for a different application. In this paper, fingerprint image tampering is studied. Furthermore, optically acquired fingerprints, synthetically generated fingerprints and contact-less acquired fingerprints are studied for separation purposes using the Benford’s law divergence metric. Benford’s law has shown in literature to be very effective in detecting tampering of natural images. In this paper, the Benford’s law features with support vector machine are proposed for the detection of malicious tampering of JPEG fingerprint images. This method is aimed at protecting against insider attackers and hackers. This proposed method detected tampering effectively, with Equal Error Rate (EER) of 2.08%. Again, the experimental results illustrate that, optically acquired fingerprints, synthetically generated fingerprints and contact-less acquired fingerprints can be separated by the proposed method effectively.
Cite this paper: Aamo, I. and Caleb, S. (2017) On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security, 8, 240-256. doi: 10.4236/jis.2017.83016.
References

[1]   Hsiao, D.-Y. and Pei, S.-C. (2005) Detecting Digital Tampering by Blur Estimation. Proceedings of the IEEE First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE05), 264-278.
https://doi.org/10.1109/SADFE.2005.8

[2]   Farid, H. (2009) A Survey of Image Forgery Detection. IEEE Signal Processing Magazine, 26, 16-25.
https://doi.org/10.1109/MSP.2008.931079

[3]   Li, X.H., Zhao, Y., Liao, M., Shih, F.Y. and Shi, Y.Q. (2012) Detection of Tampered Region for JPEG Images by Using Mode-Based First Digit Features. EURASIP Journal on Advances in Signal Processing, 190, 1-6.
https://doi.org/10.1186/1687-6180-2012-190

[4]   Meuwly, D. and Veldhuis, R. (2012) Forensic Biometrics: From Two Communities to One Discipline, 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), 13029856.

[5]   Iorliam, A., Ho, A.T.S., Poh, N. and Shi, Y.Q. (2014) Do Biometric Images Follow the Benford’s Law? 2nd International Workshop on Biometrics and Forensics, 1-6.
https://doi.org/10.1109/IWBF.2014.6914261

[6]   Roberts, C.M. (2007) Biometric Attack Vectors and Defences. Computers and Security, 26, 14-25.
https://doi.org/10.1016/j.cose.2006.12.008

[7]   Lazarick, R. (2012) Presentation Attack Detection. Department of Biometrics, Com-put. Sci. Corp., Tech. Rep.

[8]   Dong, J., Wang, W. and Tan, T. (2013) Casia Image Tampering Detection Evaluation Database. IEEE ChinaSIP, 422-426.

[9]   Ratha, N., Connell, J.H. and Bolle, R.M. (2001) An Analysis of Minutiae Matching Strength. Proc. Audio and Video-Based Biometric Person Authentication (AVBPA), 223-228.
https://doi.org/10.1007/3-540-45344-X_32

[10]   FastCompany (2011) The Dark Side of Biometrics: 9 Million Israelis Hacked Info Hits the Web.
http://www.fastcompany.com/1790444/dark-side-biometrics-9-million-israelis-hacked-info-hits-web

[11]   Hildebrandt, M., Sturm, J., Dittmann, J. and Vielhauer, C. (2013) Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications. In: IFIP International Conference on Communications and Multimedia Security, Springer, Berlin Heidelberg, 204-206.
https://doi.org/10.1007/978-3-642-40779-6_19

[12]   Maltoni, D., Maio, D., Jain, A.K. and Prabhakar, S. (2003) Synthetic Fingerprint Generation. Handbook of Fingerprint Recognition, 271-302.

[13]   Benford, F. (1938) The Law of Anomalous Numbers. Proceedings of the American Philosophical Society, 78, 551-572.

[14]   Shi, Y.Q. (2013) Image Statistical Modeling and Its Applications to Information Forensics. New Jersey Institute of Technology.

[15]   Hill, T.P. (1996) A Statistical Derivation of the Significant-Digit Law. Statistical Science, 10, 354-363.
https://doi.org/10.1214/ss/1177009869

[16]   Fu, D., Shi, Y.Q. and Su, W. (2007) A Generalized Benford’s Law for JPEG Coefficients and Its Applications in Image Forensics. Proceedings of SPIE, 6506, 1L1-1L11.

[17]   Nigrini, M. (1996) A Taxpayer Compliance Application of Benford’s Law. The Journal of the American Taxation Association, 18, 72-91.

[18]   Jolion, J.M. (2001) Images and Benford’s Law. Journal of Mathematical Imaging and Vision, 14, 73-81.
https://doi.org/10.1023/A:1008363415314

[19]   Gonzalez, F.P., Heileman, G.L. and Abdallah, C.T. (2007) Benford’s Law in Image Processing. IEEE International Conference on Image Processing, San Antonio, 16-19 September 2007, 405-408.

[20]   Qadir, G., Zhao, X., Ho, A.T.S. and Casey, M. (2011) Image Forensic of Glare Feature for Improving Image Retrieval Using Benford’s Law. IEEE International Symposium on Circuits and Systems, 2661-2664.

[21]   Iorliam, A. (2016) Application of Power Laws to Biometrics, Forensics and Network Traffic Analysis. Doctoral Dissertation, University of Surrey.

[22]   Efford, N. (2000) Digital Image Processing. A Practical Introduction Using Java TM. Pearson Education, Upper Saddle River.

[23]   FVC2000 (2000) Fingerprint Verification Competition Databases.
http://bias.csr.unibo.it/fvc2000/databases.asp

[24]   Yan, Y. and Osadciw, L.A. (2008) Bridging Biometrics and Forensics. EECS, Proceedings SPIE 6819, Security, Forensics, Steganography, and Watermaking of Multimedia Context X, 68190 Q, 2661-2664.

[25]   Schaefer, G. and Stich, M. (2003) UCID—An Uncompressed Color Image Database. School of Computing and Mathematics, Nottingham Trent University.

[26]   Li, B., Shi, Y.Q. and Huang, J. (2008) Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features. IEEE Multimedia Signal Processing, Cairns, 8-10 October 2008, 730-735.

[27]   Poh, N., Chan, C.-H., Kittler, J., Fierrez, J. and Galbally, J. (2012) Description of Metrics for the Evaluation of Biometrics Performance, Biometrics Evaluation and Testing.

[28]   Parzen, E. (1962) On Estimation of a Probability Density Function and Mode. The Annals of Mathematical Statistics, 33, 1065.
https://doi.org/10.1214/aoms/1177704472

[29]   Martin, A., Doddington, G., Kamm, T., Ordowski, M. and Przybocki, M. (1997) The DET Curve in Assessment of Detection Task Performance. Eurospeech, 97, 1899-1903.

 
 
Top