Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 24, pp 31895–31910 | Cite as

Double JPEG compression detection based on block statistics

  • Jixian Li
  • Wei Lu
  • Jian Weng
  • Yijun Mao
  • Guoqiang Li
Article
  • 58 Downloads

Abstract

In this paper, a novel method is proposed to detect the aligned double JPEG compression with different quantization matrix. The proposed method is based on the theory that the correlation among adjacent coefficients of frequency spectrum in DCT blocks is enhanced after DCT transformation, and the correlation among same locations in adjacent DCT blocks is strong. Classification features are divided into two types, the intra-block frequency domain features and the inter-block frequency domain features. The intra-block frequency domain features are used to catch the strong correlation among adjacent coefficients in DCT blocks, and the inter-block frequency domain features are used to catch the correlation among same locations of adjacent DCT blocks. Then the intra-block frequency domain features with inter-block frequency domain features are combined as the classification features. Finally, the classification features are used to train classifiers to detect double JPEG compression. The results of extensive experiments demonstrate the effectiveness of the proposed method.

Keywords

Double JPEG compression detection Block-DCT frequency Markov transition probability Matrix 

Notes

Acknowledgments

This work is supported by the National Natural Science Foundation of China (No. U1736118), the Natural Science Foundation of Guangdong (No. 2016A030313350), the Special Funds for Science and Technology Development of Guangdong (No. 2016KZ010103), the Key Project of Scientific Research Plan of Guangzhou (No. 201804020068), the Fundamental Research Funds for the Central Universities (No. 16lgjc83 and No. 17lgjc45).

References

  1. 1.
    Bianchi T, Piva A (2011) Analysis of non-aligned double jpeg artifacts for the localization of image forgeries. In: IEEE International workshop on information forensics and security. Iguacu Falls, pp 1–6Google Scholar
  2. 2.
    Bianchi T, Piva A (2011) Detection of non-aligned double jpeg compression with estimation of primary compression parameters. In: IEEE International conference on image processing. Brussels, pp 1929–1932Google Scholar
  3. 3.
    Bianchi T, Piva A (2012) Detection of nonaligned double jpeg compression based on integer periodicity maps. IEEE Trans Inform Forens Secur 7(2):842–848CrossRefGoogle Scholar
  4. 4.
    Chang CC, Lin CJ (2011) LIBSVM: a library for support vector machines. ACMGoogle Scholar
  5. 5.
    Chen YL, Hsu CT (2011) Detecting recompression of jpeg images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans Inform Forens Secur 6(2):396–406CrossRefGoogle Scholar
  6. 6.
    Chen C, Shi YQ, Su W (2008) A machine learning based scheme for double JPEG compression detection. In: 19th International conference on pattern recognition. Tampa, pp 1–4Google Scholar
  7. 7.
    Chen L, Lu W, Ni J (2012) An image region description method based on step sector statistics and its application in image copy-rotate/flip-move forgery detection. Int J Digit Crime Forens 4(1):49–62CrossRefGoogle Scholar
  8. 8.
    Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254CrossRefGoogle Scholar
  9. 9.
    Dong LS, Kong XW, Wang B, You XG (2011) Double compression detection based on markov model of the first digits of dct coefficients. In: 2011 Sixth International conference image and graphics. Hefei, pp 234–237Google Scholar
  10. 10.
    Feng X, Doërr G (2010) Jpeg recompression detection. In: Media Forensics and security II. San Jose, p 75410Google Scholar
  11. 11.
    Fu D, Shi YQ, Su W (2007) A generalized benford’s law for jpeg coefficients and its applications in image forensics. In: Security, Steganography, and watermarking of multimedia contents IX. San Jose, pp 65,051L–65,051L–11Google Scholar
  12. 12.
    Gong Z, Niu S, Han H (2016) Tamper detection method for clipped double jpeg compression image. In: International Conference on intelligent information hiding and multimedia signal processing. Adelaide, pp 185–188Google Scholar
  13. 13.
    Guyon I, Weston J, Barnhill S, Vapnik V (2002) Gene selection for cancer classification using support vector machines. Mach Learn 46(1–3):389–422CrossRefGoogle Scholar
  14. 14.
    He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on markov features in dct and dwt domain. Pattern Recogn 45(12):4292–4299CrossRefGoogle Scholar
  15. 15.
    Huang F, Huang J, Shi YQ (2010) Detecting double jpeg compression with the same quantization matrix. IEEE Trans Inform Forens Secur 5(4):848–856CrossRefGoogle Scholar
  16. 16.
    Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forens Secur 7(2):432–444CrossRefGoogle Scholar
  17. 17.
    Li B, Shi YQ, Huang J (2009) Detecting doubly compressed jpeg images by using mode based first digit features. Siam J Sci Comput 31(4):2842–2865MathSciNetCrossRefGoogle Scholar
  18. 18.
    Li J, Yang F, Lu W, Sun W (2016) Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimed Tools Appl, 1–15Google Scholar
  19. 19.
    Lin ZX, Peng F, Long M (2017) A reversible watermarking for authenticating 2d vector graphics based on bionic spider web. Signal Process Image Commun 57:134–146CrossRefGoogle Scholar
  20. 20.
    Liu Q, Sung AH, Qiao M (2011) A method to detect jpeg-based double compression. In: Proceedings of the 8th international conference on advances in neural networks - volume part II. Springer, Berlin, pp 466–476CrossRefGoogle Scholar
  21. 21.
    Lu W, Sun W, Chung FL, Lu H (2011) Revealing digital fakery using multiresolution decomposition and higher order statistics. Eng Appl Artif Intel 24(4):666–672CrossRefGoogle Scholar
  22. 22.
    Luo W, Qu Z, Huang J, Qiu G (2007) A novel method for detecting cropped and recompressed image block. In: IEEE International conference on acoustics, speech and signal processing. Honolulu, pp. II–217 – II–220Google Scholar
  23. 23.
    Meng Xz, Niu Sz, Zou Jc (2008) Tamper detection for shifted double jpeg compression. In: IEEE International conference on acoustics, speech and signal processing. Caesars Palace, pp 1661–1664Google Scholar
  24. 24.
    NRCS Photo Gallery. http://photogallery.nrcs.usda.gov/res/sites/PhotoGallery/index.html. [Online; Accessed 19 June 2016]
  25. 25.
    Pawel Korus JH (2016) Muliti-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans Image Process 25(3):1312–1326MathSciNetCrossRefGoogle Scholar
  26. 26.
    Peng F, Gong XQ, Long M, Sun XM (2016) A selective encryption scheme for protecting h.264/avc video in multimedia social network. Multimed Tools Appl, 1–19Google Scholar
  27. 27.
    Peng F, Qin L, Long M (2017) Face presentation attack detection using guided scale texture. Multimed Tools Appl, 1–27Google Scholar
  28. 28.
    Peng F, Zhou DL, Long M, Sun XM (2017) Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis. Int J Electron Commun 71:72–81CrossRefGoogle Scholar
  29. 29.
    Popescu AC (2004) Statistical tools for digital image forensics, vol 3200. Springer, Berlin, pp 128–147Google Scholar
  30. 30.
    Qu Z, Luo W, Huang J (2008) A convolutive mixing model for shifted double jpeg compression with application to passive image authentication. In: IEEE International conference on acoustics, speech and signal processing. Caesars Palace, pp 1661–1664Google Scholar
  31. 31.
    Schaefer G, Stich M (2004) Ucid - an uncompressed colour image database. Storage Retriev Methods Appl Multimed 5307:472–480Google Scholar
  32. 32.
    Shang S, Zhao Y, Ni R (2016) Double jpeg detection using high order statistic features. In: IEEE International conference on digital signal processing. Beijing, pp 550–554Google Scholar
  33. 33.
    Tiziano Bianchi AP (2011) Analysis of non-aligned double jpeg artifacts for the localization of image forgeries. In: IEEE International workshop on information forensics and security. Iguacu Falls, pp 1–6Google Scholar
  34. 34.
    Tiziano Bianchi AP (2012) Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans Inform Forens Secur 7(3):1003–10,017CrossRefGoogle Scholar
  35. 35.
    Wang W, Dong J, Tan T (2014) Exploring dct coefficient quantization effects for local tampering detection. IEEE Trans Inform Forens Secur 9(10):1653–1666CrossRefGoogle Scholar
  36. 36.
    Xue F, Ye Z, Lu W, Liu H, Li B (2017) Mse period based estimation of first quantization step in double compressed jpeg images. Signal Process Image Commun 57:76–83CrossRefGoogle Scholar
  37. 37.
    Yang J, Xie J, Zhu G, Kwong S, Shi YQ (2014) An effective method for detecting double jpeg compression with the same quantization matrix. IEEE Trans Inform Forens Secur 9(11):1933–1942CrossRefGoogle Scholar
  38. 38.
    Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intel 59:73–83CrossRefGoogle Scholar
  39. 39.
    Zhang Y, Li S, Wang S (2013) Detecting shifted double jpeg compression tampering utilizing both intra-block and inter-block correlations. J Shanghai Jiaotong Univers 18(1):7–16CrossRefGoogle Scholar
  40. 40.
    Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Data and Computer Science, Guangdong Key Laboratory of Information Security TechnologySun Yat-sen UniversityGuangzhouChina
  2. 2.State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  3. 3.College of Information Science and TechnologyJinan UniversityGuangzhouChina
  4. 4.College of Mathematics and InformaticsSouth China Agricultural UniversityGuangzhouChina
  5. 5.School of SoftwareShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations