Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts

被引:325
作者
Bianchi, Tiziano [1 ,2 ]
Piva, Alessandro [1 ,2 ]
机构
[1] Univ Florence, CNIT Res Unit, I-50139 Florence, Italy
[2] Univ Florence, Dept Elect & Telecommun, I-50139 Florence, Italy
关键词
Double JPEG compression; forgery localization; image forensics; JPEG artifacts; COMPRESSION;
D O I
10.1109/TIFS.2012.2187516
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose a forensic algorithm to discriminate between original and forged regions in JPEG images, under the hypothesis that the tampered image presents a double JPEG compression, either aligned (A-DJPG) or nonaligned (NA-DJPG). Unlike previous approaches, the proposed algorithm does not need to manually select a suspect region in order to test the presence or the absence of double compression artifacts. Based on an improved and unified statistical model characterizing the artifacts that appear in the presence of both A-DJPG or NA-DJPG, the proposed algorithm automatically computes a likelihood map indicating the probability for each 8 8 discrete cosine transform block of being doubly compressed. The validity of the proposed approach has been assessed by evaluating the performance of a detector based on thresholding the likelihood map, considering different forensic scenarios. The effectiveness of the proposed method is also confirmed by tests carried on realistic tampered images. An interesting property of the proposed Bayesian approach is that it can be easily extended to work with traces left by other kinds of processing.
引用
收藏
页码:1003 / 1017
页数:15
相关论文
共 23 条
[1]  
[Anonymous], 2003, Probability Theory
[2]  
Barni M, 2010, IEEE INT SYMP CIRC S, P1687, DOI 10.1109/ISCAS.2010.5537505
[3]  
Bianchi T., 2011, P ICIP, P1969
[4]  
Bianchi T., 2011, P ICASSP 2011 MAY, P2444
[5]  
Bianchi T., 2012, IEEE T INF FORENSICS, V7
[6]   Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection [J].
Chen, Yi-Lei ;
Hsu, Chiou-Ting .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :396-406
[7]  
Chen YL, 2008, 2008 IEEE 10TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, VOLS 1 AND 2, P807
[8]   MAXIMUM LIKELIHOOD FROM INCOMPLETE DATA VIA EM ALGORITHM [J].
DEMPSTER, AP ;
LAIRD, NM ;
RUBIN, DB .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-METHODOLOGICAL, 1977, 39 (01) :1-38
[9]   Identification of bitmap compression history: JPEG detection and quantizer estimation [J].
Fan, ZG ;
de Queiroz, RL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) :230-235
[10]   Image Forgery Detection A survey [J].
Farid, Hany .
IEEE SIGNAL PROCESSING MAGAZINE, 2009, 26 (02) :16-25