Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps

被引:179
作者
Bianchi, Tiziano [1 ,2 ]
Piva, Alessandro [1 ,2 ]
机构
[1] Univ Florence, CNIT Res Unit, I-50139 Florence, Italy
[2] Univ Florence, Dept Elect & Telecommun, I-50139 Florence, Italy
关键词
Image forensics; JPEG artifacts; nonaligned double JPEG compression; threshold detector;
D O I
10.1109/TIFS.2011.2170836
中图分类号
TP301 [理论、方法];
学科分类号
080201 [机械制造及其自动化];
摘要
In this paper, a simple yet reliable algorithm to detect the presence of nonaligned double JPEG compression (NA-JPEG) in compressed images is proposed. The method evaluates a single feature based on the integer periodicity of the blockwise discrete cosine transform (DCT) coefficients when the DCT is computed according to the grid of the previous JPEG compression. Even if the proposed feature is computed relying only on DC coefficient statistics, a simple threshold detector can classify NA-JPEG images with improved accuracy with respect to existing methods and on smaller image sizes, without resorting to a properly trained classifier. Moreover, the proposed scheme is able to accurately estimate the grid shift and the quantization step of the DC coefficient of the primary JPEG compression, allowing one to perform a more detailed analysis of possibly forged images.
引用
收藏
页码:842 / 848
页数:7
相关论文
共 14 条
[1]
Barni M, 2010, IEEE INT SYMP CIRC S, P1687, DOI 10.1109/ISCAS.2010.5537505
[2]
Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection [J].
Chen, Yi-Lei ;
Hsu, Chiou-Ting .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :396-406
[3]
Chen YL, 2008, 2008 IEEE 10TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, VOLS 1 AND 2, P807
[4]
SUPPORT-VECTOR NETWORKS [J].
CORTES, C ;
VAPNIK, V .
MACHINE LEARNING, 1995, 20 (03) :273-297
[5]
Image Forgery Detection A survey [J].
Farid, Hany .
IEEE SIGNAL PROCESSING MAGAZINE, 2009, 26 (02) :16-25
[6]
Exposing Digital Forgeries From JPEG Ghosts [J].
Farid, Hany .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) :154-160
[7]
Fu D., 2007, P SPIE SECURITY STEG, V6505, p1L1
[8]
Learning from Imbalanced Data [J].
He, Haibo ;
Garcia, Edwardo A. .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (09) :1263-1284
[9]
Kang PS, 2006, LECT NOTES COMPUT SC, V4232, P837
[10]
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis [J].
Lin, Zhouchen ;
He, Junfeng ;
Tang, Xiaoou ;
Tang, Chi-Keung .
PATTERN RECOGNITION, 2009, 42 (11) :2492-2501