Skip to main content

A Method for Detecting JPEG Anti-forensics

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 841))

Abstract

In this paper, a new approach is proposed for the detection of JPEG anti-forensic operations. It is based on the fact that when a JPEG anti-forensic operation is applied, the values of DCT coefficients are changed. This change decreases, especially in high frequency subbands, if we apply anti-forensic operation again. Hence, we propose to calculate a normalized difference between absolute values of DCT coefficients in 28 high frequency AC-subbands of the test image and its anti-forensically modified version. Based on this normalized feature, it is possible to differentiate between uncompressed and anti-forensically modified images. Experimental results show the effectiveness of the proposed method.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Farid, H.: Image forgery detection. IEEE Sig. Process. Mag. 26(2), 16–25 (2009)

    Article  Google Scholar 

  2. Huang, F., Huang, J., Shi, Y.Q.: Detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Forensics Secur. 5(4), 848–856 (2010)

    Article  Google Scholar 

  3. Chen, Y.L., Hsu, C.T.: Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans. Inf. Forensics Secur. 6(2), 396–406 (2011)

    Article  Google Scholar 

  4. Bianchi, T., Piva, A.: Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Forensics Secur. 7(3), 1003–1017 (2012)

    Article  Google Scholar 

  5. Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.J.R.: Anti-forensics of JPEG compression. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1694–1697, March 2010

    Google Scholar 

  6. Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)

    Article  Google Scholar 

  7. Fan, W., Wang, K., Cayre, F., Xiong, Z.: JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality. IEEE Trans. Inf. Forensics Secur. 9(8), 1211–1226 (2014)

    Article  Google Scholar 

  8. Valenzise, G., Tagliasacchi, M., Tubaro, S.: Revealing the traces of JPEG compression anti-forensics. IEEE Trans. Inf. Forensics Secur. 8(2), 335–349 (2013)

    Article  Google Scholar 

  9. Lai, S., Böhme, R.: Countering counter-forensics: the case of JPEG compression. In: Proceedings of International Conference on Information Hiding, pp. 285–298 (2011)

    Chapter  Google Scholar 

  10. Li, H., Luo, W., Qiu, X., Huang, J.: Identification of various image operations using residual-based features. IEEE Trans. Circ. Syst. Video Technol. PP(99), 1 (2016)

    Google Scholar 

  11. Lam, E.Y., Goodman, J.W.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans. Image Process. 9(10), 1661–1666 (2000)

    Article  Google Scholar 

  12. Schaefer, G., Stich, M.: UCID - an uncompressed colour image database. In: Proceedings of SPIE, pp. 472–480, March 2004

    Google Scholar 

  13. Gloe, T., Bhme, R.: The ‘Dresden Image Database’ for benchmarking digital image forensics. In: Proceedings of the 25th Symposium on Applied Computing (ACM SAC 2010), vol. 2, pp. 1585–1591 (2010)

    Google Scholar 

  14. Bas, P., Filler, T., Pevný, T.: Break our steganographic system: the ins and outs of organizing boss. In: Proceedings of 13th International Conference on Information Hiding, pp. 59–70 (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dinesh Bhardwaj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhardwaj, D., Kumawat, C., Pankajakshan, V. (2018). A Method for Detecting JPEG Anti-forensics. In: Rameshan, R., Arora, C., Dutta Roy, S. (eds) Computer Vision, Pattern Recognition, Image Processing, and Graphics. NCVPRIPG 2017. Communications in Computer and Information Science, vol 841. Springer, Singapore. https://doi.org/10.1007/978-981-13-0020-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0020-2_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0019-6

  • Online ISBN: 978-981-13-0020-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics