Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas Gloe is active.

Publication


Featured researches published by Thomas Gloe.


acm multimedia | 2007

Can we trust digital image forensics

Thomas Gloe; Matthias Kirchner; Antje Winkler; Rainer Böhme

Compared to the prominent role digital images play in nowadays multimedia society, research in the field of image authenticity is still in its infancy. Only recently, research on digital image forensics has gained attention by addressing tamper detection and image source identification. However, most publications in this emerging field still lack rigorous discussions of robustness against strategic counterfeiters, who anticipate the existence of forensic techniques. As a result, the question of trustworthiness of digital image forensics arises. This work will take a closer look at two state-of-the-art forensic methods and proposes two counter-techniques; one to perform resampling operations undetectably and another one to forge traces of image origin. Implications for future image forensic systems will be discussed.


Journal of Digital Forensic Practice | 2010

The Dresden Image Database for Benchmarking Digital Image Forensics

Thomas Gloe; Rainer Böhme

ABSTRACT This article introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More than 14,000 images of various indoor and outdoor scenes have been acquired under controlled and thus widely comparable conditions from altogether 73 digital cameras. The cameras were drawn from only 25 different models to ensure that device-specific and model-specific characteristics can be disentangled and studied separately, as validated with results in this article. In addition, auxiliary images for the estimation of device-specific sensor noise pattern were collected for each camera. Another subset of images to study model-specific JPEG compression algorithms has been compiled for each model. The Dresden Image Database is freely available for scientific purposes. The database is intended to become a useful resource for researchers and forensic investigators. Using a standard database as a benchmark makes results more ...


international workshop on information forensics and security | 2009

On resampling detection in re-compressed images

Matthias Kirchner; Thomas Gloe

Resampling detection has become a standard tool in digital image forensics. This paper investigates the important case of resampling detection in re-compressed JPEG images. We show how blocking artifacts of the previous compression step can help to increase the otherwise drastically reduced detection performance in JPEG compressed images. We give a formulation on how affine transformations of JPEG compressed images affect state-of-the-art resampling detectors and derive a new efficient detection variant, which better suits this relevant detection scenario. The principal appropriateness of using JPEG pre-compression artifacts for the detection of resampling in re-compressed images is backed with experimental evidence on a large image set and for a variety of different JPEG qualities.


conference on security steganography and watermarking of multimedia contents | 2007

Forensics for flatbed scanners

Thomas Gloe; Elke Franz; Antje Winkler

Within this article, we investigate possibilities for identifying the origin of images acquired with flatbed scanners. A current method for the identification of digital cameras takes advantage of image sensor noise, strictly speaking, the spatial noise. Since flatbed scanners and digital cameras use similar technologies, the utilization of image sensor noise for identifying the origin of scanned images seems to be possible. As characterization of flatbed scanner noise, we considered array reference patterns and sensor line reference patterns. However, there are particularities of flatbed scanners which we expect to influence the identification. This was confirmed by extensive tests: Identification was possible to a certain degree, but less reliable than digital camera identification. In additional tests, we simulated the influence of flatfielding and down scaling as examples for such particularities of flatbed scanners on digital camera identification. One can conclude from the results achieved so far that identifying flatbed scanners is possible. However, since the analyzed methods are not able to determine the image origin in all cases, further investigations are necessary.


Proceedings of SPIE | 2010

Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics

Thomas Gloe; Karsten Borowka; Antje Winkler

The analysis of lateral chromatic aberration forms another ingredient for a well equipped toolbox of an image forensic investigator. Previous work proposed its application to forgery detection1 and image source identification.2 This paper takes a closer look on the current state-of-the-art method to analyse lateral chromatic aberration and presents a new approach to estimate lateral chromatic aberration in a runtime-efficient way. Employing a set of 11 different camera models including 43 devices, the characteristic of lateral chromatic aberration is investigated in a large-scale. The reported results point to general difficulties that have to be considered in real world investigations.


international workshop on computational forensics | 2009

Multimedia Forensics Is Not Computer Forensics

Rainer Böhme; Felix C. Freiling; Thomas Gloe; Matthias Kirchner

The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigators view on (parts of) reality, which itself is not fully cognizable. Important consequences on the reliability of probative facts emerge with regard to available counter-forensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.


Trans. Data Hiding and Multimedia Security | 2012

Feature-Based Forensic Camera Model Identification

Thomas Gloe

State-of-the-art digital forensic techniques for camera model identification draw attention on different sets of features to assign an image to the employed source model. This paper complements existing work, by a comprehensive evaluation of known feature sets employing a large set of 26 camera models with altogether 74 devices. We achieved the highest accuracies using the extended colour feature set and present several detail experiments to validate the ability of the features to separate between camera models and not between devices. Analysing more than 16,000 images, we present a comprehensive evaluation on 1) the number of required images and devices for training, 2) the influence of the number of camera models and camera settings on the detection results and 3) possibilities to handle unknown camera models when not all models coming into question are available or are even known. All experiments in this paper suggest: feature-based forensic camera model identification works in practice and provides reliable results even if only one device for each camera model under investigation is available to the forensic investigator.


information hiding | 2009

Feature-Based Camera Model Identification Works in Practice

Thomas Gloe; Karsten Borowka; Antje Winkler

Feature-based camera model identification plays an important role in the toolbox for image source identification. It enables the forensic investigator to discover the probable source model employed to acquire an image under investigation. However, little is known about the performance on large sets of cameras that include multiple devices of the same model. Following the process of a forensic investigation, this paper tackles important questions for the application of feature-based camera model identification in real world scenarios. More than 9,000 images were acquired under controlled conditions using 44 digital cameras of 12 different models. This forms the basis for an in-depth analysis of a) intra-camera model similarity, b) the number of required devices and images for training the identification method, and c) the influence of camera settings. All experiments in this paper suggest: feature-based camera model identification works in practice and provides reliable results even if only one device for each camera model under investigation is available to the forensic investigator.


information hiding | 2013

Forensic identification of GSM mobile phones

Jakob Hasse; Thomas Gloe; Martin Beck

With the rapid growth of GSM telecommunication, special requirements arise in digital forensics to identify mobile phones operating in a GSM network. This paper introduces a novel method to identify GSM devices based on physical characteristics of the radio frequency hardware. An implementation of a specialised receiver software allows passive monitoring of GSM traffic along with physical layer burst extraction even for handover and frequency hopping techniques. We introduce time-based patterns of modulation errors as a unique device-dependent feature and carefully remove random effects of the wireless communication channel. Using our characteristics, we could distinguish 13 mobile phones at an overall success rate of 97.62% under real-world conditions. This work proves practical feasibility of physical layer identification scenarios capable of tracking or authenticating GSM-based devices.


international workshop on information forensics and security | 2012

Forensic analysis of ordered data structures on the example of JPEG files

Thomas Gloe

JPEG file format standards define only a limited number of mandatory data structures and leave room for interpretation. Differences between implementations employed in digital cameras, image processing software, and software to edit metadata provide valuable clues for basic authentication of digital images. We show that there exists a realistic chance to fool state-of-the-art image file forensic methods using available software tools and introduce the analysis of ordered data structures on the example of JPEG file formats and the EXIF metadata format as countermeasure. The proposed analysis approach enables basic investigations of image authenticity and documents a much better trustworthiness of EXIF metadata than commonly accepted. Manipulations created with the renowned metadata editor ExifTool and various image processing software can be reliably detected. Analysing the sequence of elements in complex data structures is not limited to JPEG files and might be a general principle applicable to different multimedia formats.

Collaboration


Dive into the Thomas Gloe's collaboration.

Top Co-Authors

Avatar

Matthias Kirchner

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Antje Winkler

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Felix C. Freiling

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar

Karsten Borowka

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jakob Hasse

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Martin Beck

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Stefan Pfennig

Dresden University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge