Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Double JPEG compression detection based on block statistics

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel method is proposed to detect the aligned double JPEG compression with different quantization matrix. The proposed method is based on the theory that the correlation among adjacent coefficients of frequency spectrum in DCT blocks is enhanced after DCT transformation, and the correlation among same locations in adjacent DCT blocks is strong. Classification features are divided into two types, the intra-block frequency domain features and the inter-block frequency domain features. The intra-block frequency domain features are used to catch the strong correlation among adjacent coefficients in DCT blocks, and the inter-block frequency domain features are used to catch the correlation among same locations of adjacent DCT blocks. Then the intra-block frequency domain features with inter-block frequency domain features are combined as the classification features. Finally, the classification features are used to train classifiers to detect double JPEG compression. The results of extensive experiments demonstrate the effectiveness of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Bianchi T, Piva A (2011) Analysis of non-aligned double jpeg artifacts for the localization of image forgeries. In: IEEE International workshop on information forensics and security. Iguacu Falls, pp 1–6

  2. Bianchi T, Piva A (2011) Detection of non-aligned double jpeg compression with estimation of primary compression parameters. In: IEEE International conference on image processing. Brussels, pp 1929–1932

  3. Bianchi T, Piva A (2012) Detection of nonaligned double jpeg compression based on integer periodicity maps. IEEE Trans Inform Forens Secur 7(2):842–848

    Article  Google Scholar 

  4. Chang CC, Lin CJ (2011) LIBSVM: a library for support vector machines. ACM

  5. Chen YL, Hsu CT (2011) Detecting recompression of jpeg images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans Inform Forens Secur 6(2):396–406

    Article  Google Scholar 

  6. Chen C, Shi YQ, Su W (2008) A machine learning based scheme for double JPEG compression detection. In: 19th International conference on pattern recognition. Tampa, pp 1–4

  7. Chen L, Lu W, Ni J (2012) An image region description method based on step sector statistics and its application in image copy-rotate/flip-move forgery detection. Int J Digit Crime Forens 4(1):49–62

    Article  Google Scholar 

  8. Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254

    Article  Google Scholar 

  9. Dong LS, Kong XW, Wang B, You XG (2011) Double compression detection based on markov model of the first digits of dct coefficients. In: 2011 Sixth International conference image and graphics. Hefei, pp 234–237

  10. Feng X, Doërr G (2010) Jpeg recompression detection. In: Media Forensics and security II. San Jose, p 75410

  11. Fu D, Shi YQ, Su W (2007) A generalized benford’s law for jpeg coefficients and its applications in image forensics. In: Security, Steganography, and watermarking of multimedia contents IX. San Jose, pp 65,051L–65,051L–11

  12. Gong Z, Niu S, Han H (2016) Tamper detection method for clipped double jpeg compression image. In: International Conference on intelligent information hiding and multimedia signal processing. Adelaide, pp 185–188

  13. Guyon I, Weston J, Barnhill S, Vapnik V (2002) Gene selection for cancer classification using support vector machines. Mach Learn 46(1–3):389–422

    Article  Google Scholar 

  14. He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on markov features in dct and dwt domain. Pattern Recogn 45(12):4292–4299

    Article  Google Scholar 

  15. Huang F, Huang J, Shi YQ (2010) Detecting double jpeg compression with the same quantization matrix. IEEE Trans Inform Forens Secur 5(4):848–856

    Article  Google Scholar 

  16. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forens Secur 7(2):432–444

    Article  Google Scholar 

  17. Li B, Shi YQ, Huang J (2009) Detecting doubly compressed jpeg images by using mode based first digit features. Siam J Sci Comput 31(4):2842–2865

    Article  MathSciNet  Google Scholar 

  18. Li J, Yang F, Lu W, Sun W (2016) Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimed Tools Appl, 1–15

  19. Lin ZX, Peng F, Long M (2017) A reversible watermarking for authenticating 2d vector graphics based on bionic spider web. Signal Process Image Commun 57:134–146

    Article  Google Scholar 

  20. Liu Q, Sung AH, Qiao M (2011) A method to detect jpeg-based double compression. In: Proceedings of the 8th international conference on advances in neural networks - volume part II. Springer, Berlin, pp 466–476

    Chapter  Google Scholar 

  21. Lu W, Sun W, Chung FL, Lu H (2011) Revealing digital fakery using multiresolution decomposition and higher order statistics. Eng Appl Artif Intel 24(4):666–672

    Article  Google Scholar 

  22. Luo W, Qu Z, Huang J, Qiu G (2007) A novel method for detecting cropped and recompressed image block. In: IEEE International conference on acoustics, speech and signal processing. Honolulu, pp. II–217 – II–220

  23. Meng Xz, Niu Sz, Zou Jc (2008) Tamper detection for shifted double jpeg compression. In: IEEE International conference on acoustics, speech and signal processing. Caesars Palace, pp 1661–1664

  24. NRCS Photo Gallery. http://photogallery.nrcs.usda.gov/res/sites/PhotoGallery/index.html. [Online; Accessed 19 June 2016]

  25. Pawel Korus JH (2016) Muliti-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans Image Process 25(3):1312–1326

    Article  MathSciNet  Google Scholar 

  26. Peng F, Gong XQ, Long M, Sun XM (2016) A selective encryption scheme for protecting h.264/avc video in multimedia social network. Multimed Tools Appl, 1–19

  27. Peng F, Qin L, Long M (2017) Face presentation attack detection using guided scale texture. Multimed Tools Appl, 1–27

  28. Peng F, Zhou DL, Long M, Sun XM (2017) Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis. Int J Electron Commun 71:72–81

    Article  Google Scholar 

  29. Popescu AC (2004) Statistical tools for digital image forensics, vol 3200. Springer, Berlin, pp 128–147

    Google Scholar 

  30. Qu Z, Luo W, Huang J (2008) A convolutive mixing model for shifted double jpeg compression with application to passive image authentication. In: IEEE International conference on acoustics, speech and signal processing. Caesars Palace, pp 1661–1664

  31. Schaefer G, Stich M (2004) Ucid - an uncompressed colour image database. Storage Retriev Methods Appl Multimed 5307:472–480

    Google Scholar 

  32. Shang S, Zhao Y, Ni R (2016) Double jpeg detection using high order statistic features. In: IEEE International conference on digital signal processing. Beijing, pp 550–554

  33. Tiziano Bianchi AP (2011) Analysis of non-aligned double jpeg artifacts for the localization of image forgeries. In: IEEE International workshop on information forensics and security. Iguacu Falls, pp 1–6

  34. Tiziano Bianchi AP (2012) Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans Inform Forens Secur 7(3):1003–10,017

    Article  Google Scholar 

  35. Wang W, Dong J, Tan T (2014) Exploring dct coefficient quantization effects for local tampering detection. IEEE Trans Inform Forens Secur 9(10):1653–1666

    Article  Google Scholar 

  36. Xue F, Ye Z, Lu W, Liu H, Li B (2017) Mse period based estimation of first quantization step in double compressed jpeg images. Signal Process Image Commun 57:76–83

    Article  Google Scholar 

  37. Yang J, Xie J, Zhu G, Kwong S, Shi YQ (2014) An effective method for detecting double jpeg compression with the same quantization matrix. IEEE Trans Inform Forens Secur 9(11):1933–1942

    Article  Google Scholar 

  38. Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intel 59:73–83

    Article  Google Scholar 

  39. Zhang Y, Li S, Wang S (2013) Detecting shifted double jpeg compression tampering utilizing both intra-block and inter-block correlations. J Shanghai Jiaotong Univers 18(1):7–16

    Article  Google Scholar 

  40. Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (No. U1736118), the Natural Science Foundation of Guangdong (No. 2016A030313350), the Special Funds for Science and Technology Development of Guangdong (No. 2016KZ010103), the Key Project of Scientific Research Plan of Guangzhou (No. 201804020068), the Fundamental Research Funds for the Central Universities (No. 16lgjc83 and No. 17lgjc45).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jixian Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, J., Lu, W., Weng, J. et al. Double JPEG compression detection based on block statistics. Multimed Tools Appl 77, 31895–31910 (2018). https://doi.org/10.1007/s11042-018-6175-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6175-2

Keywords