现有的一些针对JPEG 图像重压缩特征进行篡改取证的方法在检测经历双重JPEG 压缩的图像效果较好,而对经历了多重JPEG 压缩的图像则检测效果不理想. 针对网络上低质量因子图片发生篡改这一情况进行研究,发现图像在经历先小后大质量因子压缩时,若能找到图像前一次经历的压缩痕迹便可以通过“去压缩”将图
像数据进行近似恢复. 通过计算DCT 系数直流分量量化误差的方法来检测图像前一次经历的压缩痕迹,之后结合“去压缩”进行数据恢复后再次进行压缩痕迹检测. 重复该过程,逐步找到图像经历的全部压缩痕迹,并根据待检测图像的不同分块经历的压缩痕迹不一致进行图像篡改检测.
Although some tamper detection methods based on compression characteristics work well for
tampered images that experienced double JPEG compression, they often fail for multiple JPEG compression.
That is because multiple JPEG compression may significantly change the DCT coefficient statistics of the
tampered images. Aimed at low quality network pictures that may be tampered, it is shown that approximate
recovery of the image may be done with a compression-removing method. This is feasible if one can explore
the compression trace of the image that has been compressed with various quality factors. This paper presents
a method to detect compression traces of images by calculating the quantization error of DC coefficient in the
DCT domain. A compression-removing method is then used to approximately recover the image. The same
method is used to detect compression traces in the recovered image afterwards. All compression traces can be
found by repeating the process. If there are different compression traces in different parts of the image, tamper
detection is achieved.
[1] Kee E, Johnson M K, and Farid H. Digital image authentication from JPEG headers[J]. IEEE Transactions on Information Forensics and Security, 2011,7(3):1066-1075.
[2] Fan Jiayuan, Cao Hong, Kot A C. Estimating EXIF parameters based on noise features for image manipulation detection[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(4): 608 – 618.
[3] Kee E, O’Brien J, Farid H. Exposing photo manipulation with inconsistent shadows[J]. ACM Transaction on Graphics, 2013, 32(4): 1-11.
[4] Abrams A, Miskell K, Pless R. The episolar constraint. monocular shape from shadow correspondence[C]//2013 IEEE Conference on Computer Vision and Pattern Recognition, 2013:1404-1414.
[5] Rang M H, Nguyen, Minh N L, Light source estimation from a single image[J]. International Conference on Control, Automation, Robotics&Vision, 2012,5(3): 1358-1363.
[6] 李叶舟, 吴小媚, 牛少彰, 孟宪哲. 基于相机标定的文字变造篡改鉴定[J].北京邮电大学学报, 2012,35(6):16-19.
LI Yezhou, WU Xiaomei, NIU Shaozhang, MENG Xianzhe. Forgeries of chinese character detecting based on camera calibration[J]. Journal of Beijing University of Posts and Telecommunications, 2012,35(6): 16-19 .
[7] Chierchia G, Poggi G, Sansone C, Verdoliva L. .A Bayesian-MRF approach for PRNU-based image forgery detection[J].IEEE Transactions on Information Forensics and Security, 2014,9(4):554-567.
[8] Riess C, Angelopoulou E. Scene illumination as an indicator of image manipulation[C]//12th Information Hiding. Springer Berlin Heidelberg, 2010: 66-80.
[9] Asatryan D, Asatryan N, Lanina N. Method for detection of image tampering and partial recovery[C]//Computer Science and Information Technologies (CSIT), 2013: 1-6.
[10] Muhammad G, Al-Hammadi M H, Hussain M. Copy move image forgery detection method using steerable pyramid transform and texture descriptor[C]//EUROCON, 2013: 1586-1592.
[11] Jaberi M, Bebis G, Hussain M. Improving the detection and localization of duplicated regions in copy-move image forgery[C]// 18th International Conference on Digital Signal Processing (DSP), 2013: 1-6.
[12] Hany Farid, exposing digital forgeries from JPEG ghosts[J]. IEEE Transactions on Information Forensics and Security archive, 2009,4(1):154~160.
[13] Puglisi G, Bruna A R, Galvan F. First JPEG quantization matrix estimation based on histogram analysis[C]//ICIP, 2013: 4502-4506.
[14] Galvan F, Puglisi G, Bruna A R, Battiato S. First quantization matrix estimation from double compressed JPEG images [J], Information Forensics and Security, IEEE Transactions on ,2014,9(8):1299-1310.
[15] Lukáš J, Fridrich J. Estimation of primary quantization matrix in double compressed JPEG images[C]//Processing of Digital Forensic Research Workshop, 2003: 5-8.
[16] Peng Y, Liu B. Accurate estimation of primary quantization table with applications to tampering detection [J]. Electronics Letters, 2013, 49(23): 1452-1454.
[17] Bianchi T, Piva A. Image forgery localization via block-grained analysis of JPEG artifacts [J]. Information Forensics and Security, IEEE Transactions on, 2012, 7(3): 1003-1017.
[18] 孟宪哲, 牛少彰, 李叶舟, 朱艳玲, 胡静. 基于双重JPEG压缩特征的数字图像篡改取证技术[J]. 四川大学学报(自然科学版),2010, 47(增刊):225-231.
Meng Xianzhe, Niu Shaozhang, Li Yezhou, Zhu Yanling, Hu Jing . Tamper Detection Based on the Statistical CharacteristicsCaused by Double JPEG Compression [J]. Journal of Sichuan University(Natural Science Edition), 2010, 47(Suppl.): 225-231.