Images in Computer Forensics

Images in Computer Forensics

Northumbria Research Link Citation: Kalms, Matthias, Gloe, Thomas and Laing, Christopher (2012) File forensics for RAW camera image formats. In: 6th International Conference on Software Knowledge Information Management and Applications (SKIMA 2012), 9-11 September, 2012, Chengdu University, China. URL: This version was downloaded from Northumbria Research Link: http://nrl.northumbria.ac.uk/id/eprint/15648/ Northumbria University has developed Northumbria Research Link (NRL) to enable users to access the University’s research output. Copyright © and moral rights for items on NRL are retained by the individual author(s) and/or other copyright owners. Single copies of full items can be reproduced, displayed or performed, and given to third parties in any format or medium for personal research or study, educational, or not-for-profit purposes without prior permission or charge, provided the authors, title and full bibliographic details are given, as well as a hyperlink and/or URL to the original metadata page. The content must not be changed in any way. Full items must not be sold commercially in any format or medium without formal permission of the copyright holder. The full policy is available online: http://nrl.northumbria.ac.uk/policies.html This document may differ from the final, published version of the research and has been made available online in accordance with publisher policies. To read and/or cite from the published version of the research, please visit the publisher’s website (a subscription may be required.) 1 File Forensics for RAW Camera Image Formats Matthias Kalms1, Thomas Gloe1, Christopher Laing2 1Institute of Systems Architecture, Technische Universität Dresden, 01602 Dresden, Germany 2School of Computing, Engineering and Information Sciences, Northumbria University, NE2 1XE Newcastle upon Tyne, U.K. Abstract—Recent research in multimedia forensics has developed a variety of methods to detect image tampering and to identify the origin of image files. Many of these techniques are based on characteristics in the JPEG format, as it is the most used file format for digital images. In recent years RAW image formats have gained popularity among amateur and professional photographers. This increase in their use and possible misuse makes these file formats an important subject to file forensic examinations. The aim of this paper is to explore to which extend methods previously developed for images in JPEG format can be applied to RAW image formats. Index Terms—digital image forensics, image file forensics, RAW image formats, tamper detection I. INTRODUCTION try to identify characteristics in the file that can give In digital photography, JPEG is the most commonly clues on devices and software, used to create it. The used file format for digital images. Especially as storage first analysing the information stored in the file header format in digital cameras, it has been used by most for characteristics of the encoding software. The other manufacturers since the beginning of commercial digital focusing on a statistical analysis of image data using photography in the late 1990s. With higher demands on manipulation artefacts and device characteristics. image quality and growing importance of digital post- processing, raw file formats come into focus, providing A. JPEG File Information access to never processed sensor data. These are generally The JPEG file format allows to store the compressed referred to as RAW image formats. Although not used on image data together with all necessary parameters for de- most compact cameras, these formats are now widely avai- compression. It is also possible to store metadata including lable as an option in digital single lens refractor (DSLR) information of camera settings, identifying serial numbers cameras. Just as negatives in analogue photography they and time and location of image acquisition. Recent re- provide a high quality version with a wider colour range search has shown that this information stored in JPEG file and higher resolution, from which the final image can headers can help to uncover the creation and processing be developed and have therefore sometimes been referred history of an image. The file header consists of a series of to as ’digital negatives’. In contrast to JPEG files, RAW segments, each tagged with a specific marker. Although images can only be decoded by special software and the JFIF standard defines exactly how the information is codecs that are not pre-installed on common operating stored in these segments, there are vendor specific segment systems. Consequently RAW file formats can be found markers. The APP14 segment for example is specifically as backup file on a local hard drive rather than being used by Adobe, to store information about the software published online. Common image processing software do version and the compression quality that was used for post- not allow to save images in these formats. RAW images are processing. Gloe [3] showed that the sequence of all JPEG therefore regarded as much more trustworthy as a JPEG marker segments in a file can be camera manufacturer or compressed version. For images in a research context, software specific. Apart from that the characteristics of the the guidelines by Cromey [1] even suggest RAW image data stored in the segments and the combination of these formats as reference files that can later be compared to a characteristics, can be used very effectively to identify the processed version. It is nevertheless possible to manipulate source camera or whether an image has been altered by RAW image files, although special software is required to software. do so. Consequently it is desirable to detect whether or Common formats to store metadata are EXIF, IPTC not it has been manipulated. It has been shown by Kee and XMP. Also manufacturer-specific formats are used et al. [2] that extracting a signature from header parameters by camera and software manufacturers. Almost all digital can effectively be used for image authentication in JPEG cameras store their metadata in the EXIF format as part images. Building on their method we show that a similar of the JPEG file. This format contains a variety of tags, approach can also be used on three of the most common unique byte signatures specified in the EXIF standard [4], RAW image formats. that are used to identify the information in the binary file. Using these tags information about the camera, technical II. RECENT RESEARCH ON JPEG FILES details of the photograph and the date and time it was Multimedia forensic techniques on JPEG files can shot can be stored in the APP1 segment. This includes mainly be divided into two categories. Both categories information about the camera manufacturer, model and 2 time of acquisition. Sometimes, even serial numbers of converted to JPEG by software. In this case the software the camera body or a interchangeable lens are stored in can influence the Quantization tables, image dimensions this segment. Has this information been deleted or altered and the EXIF segment. These files might than have the in the file, other metadata can also give clues on the source same characteristics as a JPEG file, processed with that device. To give an example, image dimensions dependent specific software. on the chip size and processing algorithm are specific EXIF information is not inherent to each image and can to one manufacturer, small group of camera models or easily be edited or replaced. To avoid detection, the whole even a single model. The marker notes tag also provides header can be replaced, altered or faked. But, apart from a segment where a manufacturer specific set of tags and editing EXIF information, this is not a feature of modern therefore more detailed information about the camera and image processing software. Also the findings of Kee et al. shot can be stored. Alvarez [5] discussed the use of EXIF [2] show, that it takes more than changing a single feature information in a computer forensic examination. He stated of the file header, when faking another image source that this information can never stand on its own and must be examined together with the photo’s context. III. RAW IMAGE FILES FORENSICS As a part of JPEG compression, the quantization stage A. Structure of RAW File Formats depends on a set of parameter tables, known as Define In this section we will examine the structure of the two Quantization Tables (DQT). Two or more tables are stored most commonly used proprietary RAW formats: the Nikon in the header of every JPEG file. The use of these tables Electronic Format (NEF) and CR2, the second version of in the detection of image forgery was discussed in a paper the Camera Image File Format (CIFF) [10]. Additionally, by Kornblum [6], following a study by Farid [7]. Camera we will take a closer look on Adobe’s Digital Negative manufacturers and software companies often use custom (DNG) [11], as it not only promises to be the format quantization tables, suitable to identify groups of camera for future archiving, but also gets increasingly used in models using the same quantisation table. Also a sepa- high-end middle format cameras. It is also the only RAW ration between authentic image files and post-processed format in this examination, for which a full documentation image files is possible, as software vendors employ their is available. Therefore the examination of the structure own quantisation tables. Source devices and programmes of RAW files has to be based on observable rules in that use the standard quantization tables proposed by the general file structure. All three of these formats, like Independent JPEG Group (IJG) in 1998 cannot be deter- most RAW image formats are based on the Tagged Image mined by the tables alone, as they are not manufacturer File (TIFF) Standard. In the first section in every TIFF specific.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us