Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature

Published: 12 November 2021 Publication History
  • Get Citation Alerts
  • Abstract

    Due to the popularity of JPEG format images in recent years, JPEG images will inevitably involve image editing operation. Thus, some tramped images will leave tracks of Non-aligned double JPEG (NA-DJPEG) compression. By detecting the presence of NA-DJPEG compression, one can verify whether a given JPEG image has been tampered with. However, only few methods can identify NA-DJPEG compressed images in the case that the primary quality factor is greater than the secondary quality factor. To address this challenging task, this article proposes a novel feature extraction scheme based optimized pixel difference (OPD), which is a new measure for blocking artifacts. Firstly, three color channels (RGB) of a reconstructed image generated by decompressing a given JPEG color image are mapped into spherical coordinates to calculate amplitude and two angles (azimuth and zenith). Then, 16 histograms of OPD along the horizontal and vertical directions are calculated in the amplitude and two angles, respectively. Finally, a set of features formed by arranging the bin values of these histograms is used for binary classification. Experiments demonstrate the effectiveness of the proposed method, and the results show that it significantly outperforms the existing typical methods in the mentioned task.

    References

    [1]
    M. Barni, L. Bondi, N. Bonettini, P. Bestagini, A. Costanzo, M. Maggini, B. Tondi, and S. Tubaro. 2019. Aligned and non-aligned double JPEG detection using convolutional neural networks. Journal of Visual Communication & Image Representation 49 (2019), 153–163.
    [2]
    Tiziano Bianchi and Alessandro Piva. 2012. Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Transactions on Information Forensics & Security 7, 2 (2012), 842–848.
    [3]
    Chih-Chung Chang and Chih-Jen Lin. 2011. LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST) 2, 3 (2011), 27.
    [4]
    Y. L. Chen and C. T. Hsu. 2011. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics & Security 6, 2 (2011), 396–406.
    [5]
    Zhigang Fan and Ricardo L. De Queiroz. 2003. Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transactions on Image Processing 12, 2 (2003), 230–235.
    [6]
    M. A. Fischler. 1982. Recovering intrinsic scene characteristics from images. Southwest Research Inst. Report (1982).
    [7]
    Dongdong Fu, Yun Q. Shi, and Su Wei. 2007. A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of the SPIE 6505 (2007), 65051L–65051L-11.
    [8]
    Miguel Hernandez-Cabronero, Michael W. Marcellin, Ian Blanes, and Joan Serra-Sagrista. 2017. Lossless compression of color filter array mosaic images with visualization via JPEG 2000. IEEE Transactions on Multimedia 20, 2 (2017), 257–270.
    [9]
    Fangjun Huang, Jiwu Huang, and Qing Shi Yun. 2010. Detecting Double JPEG Compression With the Same Quantization Matrix.
    [10]
    Douglas A. Kerr. 2012. Chrominance subsampling in digital images. The Pumpkin 2012, 3 (2012), 1–15.
    [11]
    Shi Yue Lai and Rainer Bohme. 2013. Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In IEEE International Conference on Acoustics.
    [12]
    Bin Li, Yun Q. Shi, and Jiwu Huang. 2008. Detecting doubly compressed JPEG images by using mode based first digit features. In IEEE Workshop on Multimedia Signal Processing.
    [13]
    Weiqi Luo, Zhenhua Qu, Jiwu Huang, and Guoping Qiu. 2007. A novel method for detecting cropped and recompressed image block. In IEEE International Conference on Acoustics.
    [14]
    Ghazal Mazaheri, Niluthpol Chowdhury Mithun, Jawadul H. Bappy, and Amit K. Roy-Chowdhury. 2019. A skip connection architecture for localization of image manipulations. In CVPR Workshops. 119–129.
    [15]
    John D. McDonnell, Robert N. Shorten, and Anthony D. Fagan. 1994. An edge classification based approach to the post-processing of transform encoded images. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’94). IEEE, V–329.
    [16]
    Yana Mileva, Andrés Bruhn, and Joachim Weickert. 2007. Illumination-robust variational optical flow with photometric invariants. In DAGM Conference on Pattern Recognition.
    [17]
    Alessandro Piva. 2013. An overview on image forensics. ISRN Signal Processing 2013 (2013).
    [18]
    Neelamani Ramesh, De Queiroz Ricardo, Fan Zhigang, Dash Sanjeeb, and Richard G. Baraniuk. 2006. JPEG compression history estimation for color images. IEEE Transactions on Image Processing 15, 6 (2006), 1365–1378.
    [19]
    Gerald Schaefer and Michal Stich. 2003. UCID: An uncompressed color image database. In Storage and Retrieval Methods and Applications for Multimedia 2004, Vol. 5307. International Society for Optics and Photonics, 472–480.
    [20]
    Steven A. Shafer. 1985. Using color to separate reflection components. Color Research and Application 10, 4 (1985), 210–218.
    [21]
    Tanveer Fathima Syeda-Mahmood. 1992. Data and model-driven selection using color regions. In European Conference on Computer Vision. Springer, 115–123.
    [22]
    Gregory K. Wallace. 1992. The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics 38, 1 (1992), xviii–xxxiv.
    [23]
    J. Van De Weijer and Th. Gevers. 2004. Robust optical flow from photometric invariants. In International Conference on Image Processing.
    [24]
    Lanying Wu, Xiangwei Kong, Bo Wang, and Shize Shang. 2013. Image tampering localization via estimating the non-aligned double JPEG compression. In IS&T/SPIE Electronic Imaging.
    [25]
    Jianquan Yang, Jin Xie, Guopu Zhu, Sam Kwong, and Yun Qing Shi. 2014. An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics & Security 9, 11 (2014), 1933–1942.
    [26]
    Jianquan Yang, Guopu Zhu, Junlong Wang, and Qing Shi Yun. 2013. Detecting non-aligned double JPEG compression based on refined intensity difference and calibration. In International Workshop on Digital Watermarking.
    [27]
    Shuyuan Zhu, Mingyu Li, Chen Chen, Shuaicheng Liu, and Bing Zeng. 2018. Cross-space distortion directed color image compression. IEEE Transactions on Multimedia 20, 3 (2018), 525–538.

    Cited By

    View all
    • (2024)Distributed Learning Mechanisms for Anomaly Detection in Privacy-Aware Energy Grid Management SystemsACM Transactions on Sensor Networks10.1145/3640341Online publication date: 17-Jan-2024
    • (2024)AQMon: A Fine-grained Air Quality Monitoring System Based on UAV Images for Smart CitiesACM Transactions on Sensor Networks10.1145/363876620:2(1-20)Online publication date: 19-Jan-2024
    • (2024)Color Transfer for Images: A SurveyACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363515220:8(1-29)Online publication date: 9-Jul-2024
    • Show More Cited By

    Index Terms

    1. Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 17, Issue 4
        November 2021
        529 pages
        ISSN:1551-6857
        EISSN:1551-6865
        DOI:10.1145/3492437
        Issue’s Table of Contents

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 12 November 2021
        Accepted: 01 May 2021
        Revised: 01 January 2021
        Received: 01 June 2020
        Published in TOMM Volume 17, Issue 4

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Color image forensics
        2. non-aligned double JPEG compression
        3. spherical coordinates
        4. blocking artifacts

        Qualifiers

        • Research-article
        • Refereed

        Funding Sources

        • National Natural Science Foundation of China
        • National Key R & D Program of China
        • plan for Scientific Talent of Henan Province
        • Post graduate Research & Practice Innvoation Program of Jiang su Province
        • Priority Academic Program Development of Jiang su Higher Education Institutions (PAPD)

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)57
        • Downloads (Last 6 weeks)2
        Reflects downloads up to 11 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Distributed Learning Mechanisms for Anomaly Detection in Privacy-Aware Energy Grid Management SystemsACM Transactions on Sensor Networks10.1145/3640341Online publication date: 17-Jan-2024
        • (2024)AQMon: A Fine-grained Air Quality Monitoring System Based on UAV Images for Smart CitiesACM Transactions on Sensor Networks10.1145/363876620:2(1-20)Online publication date: 19-Jan-2024
        • (2024)Color Transfer for Images: A SurveyACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363515220:8(1-29)Online publication date: 9-Jul-2024
        • (2024)Cross-domain Recommendation via Dual Adversarial AdaptationACM Transactions on Information Systems10.1145/363252442:3(1-26)Online publication date: 22-Jan-2024
        • (2024)Real-time Cyber-Physical Security Solution Leveraging an Integrated Learning-Based ApproachACM Transactions on Sensor Networks10.1145/358200920:2(1-22)Online publication date: 9-Jan-2024
        • (2024)Multi-View MERA Subspace ClusteringIEEE Transactions on Multimedia10.1109/TMM.2023.330723926(3102-3112)Online publication date: 1-Jan-2024
        • (2024)Rate-Adaptive Neural Network for Image Compressive SensingIEEE Transactions on Multimedia10.1109/TMM.2023.330121326(2515-2530)Online publication date: 2024
        • (2023)Attention-guided Multi-modality Interaction Network for RGB-D Salient Object DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/362474720:3(1-22)Online publication date: 23-Oct-2023
        • (2023)Towards Health-Aware Fairness in Food Recipe RecommendationProceedings of the 17th ACM Conference on Recommender Systems10.1145/3604915.3610659(1184-1189)Online publication date: 14-Sep-2023
        • (2023)HUMMUS: A Linked, Healthiness-Aware, User-centered and Argument-Enabling Recipe Data Set for RecommendationProceedings of the 17th ACM Conference on Recommender Systems10.1145/3604915.3609491(1-11)Online publication date: 14-Sep-2023
        • Show More Cited By

        View Options

        Get Access

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        Full Text

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media