Advertisement

Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics

  • Zhenhua Qu
  • Weiqi Luo
  • Jiwu Huang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7633)

Abstract

Non-intrusive digital image forensics (NIDIF) aims at authenticating the validity of digital images utilizing their intrinsic characteristics when the active forensic methods, such as digital watermarking or digital signatures, fail or are not present. The NIDIF for lossy JPEG compressed images are of special importance due to its pervasively use in many applications. Recently, researchers showed that certain types of tampering manipulations can be revealed when JPEG re-compress artifacts (JRCA) is found in a suspicious JPEG image. Up to now, most existing works mainly focus on the detection of doubly JPEG compressed images without block shifting. However, they cannot identify another JRCA – the shifted double JPEG (SD-JPEG) compression artifacts which are commonly present in composite JPEG images. In this paper, the SD-JPEG artifacts are modeled as a noisy 2-D convolutive mixing model. A symmetry verification based method and a first digit histogram based remedy method are proposed to form an integral identification framework. It can reliably detect the SD-JPEG artifacts when a critical state is not reached. The experimental results have shown the effectiveness of the proposed framework.

Keywords

Independent Component Analysis Blind Source Separation JPEG Compression Digital Watermark JPEG Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bayram, S., Sencar, H., Memon, N.: Identifying digital cameras using cfa interpolation. In: Advances in Digital Forensics II, vol. 222, pp. 289–299 (2006)Google Scholar
  2. 2.
    Bell, J.A., Sejnowski, T.J.: An information-maximization approach to blind separation and blind deconvolution. Neural Computation 7, 1129–1159 (1995)CrossRefGoogle Scholar
  3. 3.
    Chang, C.C., Lin, C.J.: LIBSVM:a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm
  4. 4.
    Chen, M., Fridrich, J., Lukáš, J., Goljan, M.: Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 342–358. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. 5.
    Fu, D.D., Shi, Y.Q., Su, W.: A generalized benford’s law for jpeg coefficients and its applications in image forensics - art. no. 65051l. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. L5051 (2007)Google Scholar
  6. 6.
    He, J., Lin, Z., Wang, L., Tang, X.: Detecting Doctored JPEG Images Via DCT Coefficient Analysis. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006, Part III. LNCS, vol. 3953, pp. 423–435. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Johnson, M.K., Farid, H.: Exposing digital forgeries in complex lighting environments. IEEE Trans. Inf. Forensics Security 2(3), 450–461 (2007)CrossRefGoogle Scholar
  8. 8.
    Li, B., Shi, Y.Q., Huang, J.W.: Detecting doubly compressed jpeg images by using mode based first digit features. In: IEEE Workshop on Multimedia Signal Processing, pp. 730–735 (2008)Google Scholar
  9. 9.
    Lukas, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed jpeg images. In: Proc. of DFRWS, Cleveland, OH, USA (2003)Google Scholar
  10. 10.
    Luo, W., Qu, Z., Huang, J., Qiu, G.: A novel method for detecting cropped and recompressed image block. In: IEEE Int. Conf. on Acoustics Speech and Signal Processing, April 15-20, vol. 2, pp. II-217–II-220 (2007)Google Scholar
  11. 11.
    Ng, T.T., Chang, S.F., Tsui, M.P.: Using geometry invariants for camera response function estimation. In: IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, June 17-22, pp. 1–8 (2007)Google Scholar
  12. 12.
    Popescu, A.: Statistical Tools for Digital Image Forensics. Ph.D. thesis, Department of Computer Science,Dartmouth College (2005)Google Scholar
  13. 13.
    Qu, Z., Luo, W., Huang, J.: A convolutive mixing model for shifted double jpeg compression with application to passive image authentication. In: IEEE Int. Conf. on Acoustics Speech and Signal Processing, March 31-April 4, pp. 1661–1664 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Zhenhua Qu
    • 1
    • 3
  • Weiqi Luo
    • 2
  • Jiwu Huang
    • 1
  1. 1.School of Information Science and TechnologySun Yat-Sen UniversityGuangzhouChina
  2. 2.School of SoftwareSun Yat-Sen UniversityGuangzhouChina
  3. 3.Guangdong Research Institute of China TelecomGuangzhouChina

Personalised recommendations