Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Detecting double JPEG compression with the same quantization matrix

Published: 01 December 2010 Publication History

Abstract

Detection of double joint photographic experts group (JPEG) compression is of great significance in the field of digital forensics. Some successful approaches have been presented for detecting double JPEG compression when the primary compression and the secondary compression have different quantization matrixes. However, when the primary compression and the secondary compression have the same quantization matrix, no detection method has been reported yet. In this paper, we present a method which can detect double JPEG compression with the same quantization matrix. Our algorithm is based on the observation that in the process of recompressing a JPEG image with the same quantization matrix over and over again, the number of different JPEG coefficients, i.e., the quantized discrete cosine transform coefficients between the sequential two versions will monotonically decrease in general. For example, the number of different JPEG coefficients between the singly and doubly compressed images is generally larger than the number of different JPEG coefficients between the corresponding doubly and triply compressed images. Via a novel random perturbation strategy implemented on the JPEG coefficients of the recompressed test image, we can find a "proper" randomly perturbed ratio. For different images, this universal "proper" ratio will generate a dynamically changed threshold, which can be utilized to discriminate the singly compressed image and doubly compressed image. Furthermore, our method has the potential to detect triple JPEG compression, four times JPEG compression, etc.

References

[1]
J. Lukáš and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," in Proc. Digital Forensic Research Workshop, Cleveland, OH, Aug. 2003.
[2]
T. Pevny and J. Fridrich, "Detection of double-compression in JPEG images for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
[3]
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
[4]
Z. Lin, J. He, X. Tang, and C. -K. Tang, "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognit., vol. 42, pp. 2492-2501, 2009.
[5]
A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm)," in Proc. 4th Int. Workshop Information Hiding, 2001, vol. 2137, pp. 289-302, Lecture Notes in Computer Science.
[6]
N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX Security Symp., Washington, DC, 2001.
[7]
R. Yang, Y. Q. Shi, and J. Huang, "Defeating fake-quality MP3," in Proc. ACM Multimedia and Security'09, Princeton, NJ, Sep. 7-8, 2009.
[8]
W. Wang and H. Farid, "Exposing digital forgeris in video by detecting double MPEG compression," in Porc. ACM Multimedia and Security'06, Geneva, Switzerland, Sep. 26-27, 2006.
[9]
W. Wang and H. Farid, "Exposing digital forensics in video by detecting double quantization," in Proc. ACM Multimedia and Security' 09, Princeton, NJ, Sep. 7-8, 2009.
[10]
A. C. Popescu, "Statistical Tools for Digital Image Forensics," Ph. D., Department of Computer Science, Dartmouth College, Hanover, NH, 2004.
[11]
A. C. Popescu and H. Farid, "Statistical tools for digital forensics," in Proc. 6th Int. Workshop on Information Hiding, 2004, vol. 3200, pp. 128-147, Lecture Notes in Computer Science.
[12]
D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Proc. SPIE, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, CA, Jan. 2007.
[13]
B. Li, Y. Q. Shi, and J. Huang, "Detecting double compressed JPEG images by using mode based first digit features," in Proc. IEEE Int. Workshop on Multimedia Signal Processing (MMSP 2008), Cairns, Queensland, Australia, Oct. 8-10, 2008.
[14]
C. Chen, Y. Q. Shi, and W. Su, "A marching learning based scheme for double JPEG compression detection," in Proc. IEEE Int. Conf. Pattern Recognition, Tampa, FL, Dec. 8-11, 2008.
[15]
G. K. Wallace, "The JPEG still picture compression standard," IEEE Trans. Consumer Electron., vol. 38, no. 1, pp. XVIII-XXXIV, Feb. 1992.
[16]
G. Schaefer and M. Stich, UCID--An Uncompressed Colour Image Database School of Computing and Mathematics, Nottingham Trent University, U.K., 2003.
[17]
NRCS Photo Gallery {Online}. Available: http://photogallery.nrcs. usda.gov
[18]
JPEG Tool Box {Online}. Available: http://www.philsallee.com/ jpegtbx/index.html

Cited By

View all
  • (2024)Signals Are All You Need: Detecting and Mitigating Digital and Real-World Adversarial Patches Using Signal-Based FeaturesProceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems10.1145/3665451.3665530(24-34)Online publication date: 2-Jul-2024
  • (2024)Generating Image Adversarial Example by Modifying JPEG StreamProceedings of the International Conference on Computer Vision and Deep Learning10.1145/3653804.3654719(1-8)Online publication date: 19-Jan-2024
  • (2024)Copy-paste forgery detection using deep learning with error level analysisMultimedia Tools and Applications10.1007/s11042-023-15594-583:2(3425-3449)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security  Volume 5, Issue 4
December 2010
352 pages

Publisher

IEEE Press

Publication History

Published: 01 December 2010
Accepted: 26 August 2010
Revised: 25 August 2010
Received: 08 April 2010

Author Tags

  1. Digital forensic
  2. digital forensic
  3. double joint photographic experts group (JPEG) compression
  4. quantization matrix

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Signals Are All You Need: Detecting and Mitigating Digital and Real-World Adversarial Patches Using Signal-Based FeaturesProceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems10.1145/3665451.3665530(24-34)Online publication date: 2-Jul-2024
  • (2024)Generating Image Adversarial Example by Modifying JPEG StreamProceedings of the International Conference on Computer Vision and Deep Learning10.1145/3653804.3654719(1-8)Online publication date: 19-Jan-2024
  • (2024)Copy-paste forgery detection using deep learning with error level analysisMultimedia Tools and Applications10.1007/s11042-023-15594-583:2(3425-3449)Online publication date: 1-Jan-2024
  • (2023)General Forensics for Aligned Double JPEG Compression Based on the Quantization InterferenceIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2023.334103234:6(5191-5206)Online publication date: 7-Dec-2023
  • (2023)Analysis of large-deviation multifractal spectral properties through successive compression for double JPEG detectionMultimedia Tools and Applications10.1007/s11042-023-15130-582:23(36255-36277)Online publication date: 17-Mar-2023
  • (2022)Overview of Image Inpainting and Forensic TechnologySecurity and Communication Networks10.1155/2022/92919712022Online publication date: 1-Jan-2022
  • (2022)Double compression detection in HEVC-coded video with the same coding parameters using picture partitioning informationImage Communication10.1016/j.image.2022.116638103:COnline publication date: 1-Apr-2022
  • (2022)jForge: An adversarial method to deceive JPEG forgery localization schemesMultimedia Tools and Applications10.1007/s11042-021-11265-581:16(22807-22832)Online publication date: 1-Jul-2022
  • (2022)Image forgery techniques: a reviewArtificial Intelligence Review10.1007/s10462-022-10211-756:2(1577-1625)Online publication date: 6-Jun-2022
  • (2022)Passive image forensics using universal techniques: a reviewArtificial Intelligence Review10.1007/s10462-021-10046-855:3(1629-1679)Online publication date: 1-Mar-2022
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media