Although some tamper detection methods based on compression characteristics work well for
tampered images that experienced double JPEG compression, they often fail for multiple JPEG compression.
That is because multiple JPEG compression may significantly change the DCT coefficient statistics of the
tampered images. Aimed at low quality network pictures that may be tampered, it is shown that approximate
recovery of the image may be done with a compression-removing method. This is feasible if one can explore
the compression trace of the image that has been compressed with various quality factors. This paper presents
a method to detect compression traces of images by calculating the quantization error of DC coefficient in the
DCT domain. A compression-removing method is then used to approximately recover the image. The same
method is used to detect compression traces in the recovered image afterwards. All compression traces can be
found by repeating the process. If there are different compression traces in different parts of the image, tamper
detection is achieved.
Han Hong-li1, LI Ye-zhou1, NIU Shao-zhang2, SUN Xiao-ting1
. Detecting Compression Traces in Multiple JPEG-Compressed Image[J]. Journal of Applied Sciences, 2014
, 32(6)
: 596
-604
.
DOI: 10.3969/j.issn.0255-8297.2014.06.008
[1] Kee E, Johnson M K, and Farid H. Digital image authentication from JPEG headers[J]. IEEE Transactions on Information Forensics and Security, 2011,7(3):1066-1075.
[2] Fan Jiayuan, Cao Hong, Kot A C. Estimating EXIF parameters based on noise features for image manipulation detection[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(4): 608 – 618.
[3] Kee E, O’Brien J, Farid H. Exposing photo manipulation with inconsistent shadows[J]. ACM Transaction on Graphics, 2013, 32(4): 1-11.
[4] Abrams A, Miskell K, Pless R. The episolar constraint. monocular shape from shadow correspondence[C]//2013 IEEE Conference on Computer Vision and Pattern Recognition, 2013:1404-1414.
[5] Rang M H, Nguyen, Minh N L, Light source estimation from a single image[J]. International Conference on Control, Automation, Robotics&Vision, 2012,5(3): 1358-1363.
[6] 李叶舟, 吴小媚, 牛少彰, 孟宪哲. 基于相机标定的文字变造篡改鉴定[J].北京邮电大学学报, 2012,35(6):16-19.
LI Yezhou, WU Xiaomei, NIU Shaozhang, MENG Xianzhe. Forgeries of chinese character detecting based on camera calibration[J]. Journal of Beijing University of Posts and Telecommunications, 2012,35(6): 16-19 .
[7] Chierchia G, Poggi G, Sansone C, Verdoliva L. .A Bayesian-MRF approach for PRNU-based image forgery detection[J].IEEE Transactions on Information Forensics and Security, 2014,9(4):554-567.
[8] Riess C, Angelopoulou E. Scene illumination as an indicator of image manipulation[C]//12th Information Hiding. Springer Berlin Heidelberg, 2010: 66-80.
[9] Asatryan D, Asatryan N, Lanina N. Method for detection of image tampering and partial recovery[C]//Computer Science and Information Technologies (CSIT), 2013: 1-6.
[10] Muhammad G, Al-Hammadi M H, Hussain M. Copy move image forgery detection method using steerable pyramid transform and texture descriptor[C]//EUROCON, 2013: 1586-1592.
[11] Jaberi M, Bebis G, Hussain M. Improving the detection and localization of duplicated regions in copy-move image forgery[C]// 18th International Conference on Digital Signal Processing (DSP), 2013: 1-6.
[12] Hany Farid, exposing digital forgeries from JPEG ghosts[J]. IEEE Transactions on Information Forensics and Security archive, 2009,4(1):154~160.
[13] Puglisi G, Bruna A R, Galvan F. First JPEG quantization matrix estimation based on histogram analysis[C]//ICIP, 2013: 4502-4506.
[14] Galvan F, Puglisi G, Bruna A R, Battiato S. First quantization matrix estimation from double compressed JPEG images [J], Information Forensics and Security, IEEE Transactions on ,2014,9(8):1299-1310.
[15] Lukáš J, Fridrich J. Estimation of primary quantization matrix in double compressed JPEG images[C]//Processing of Digital Forensic Research Workshop, 2003: 5-8.
[16] Peng Y, Liu B. Accurate estimation of primary quantization table with applications to tampering detection [J]. Electronics Letters, 2013, 49(23): 1452-1454.
[17] Bianchi T, Piva A. Image forgery localization via block-grained analysis of JPEG artifacts [J]. Information Forensics and Security, IEEE Transactions on, 2012, 7(3): 1003-1017.
[18] 孟宪哲, 牛少彰, 李叶舟, 朱艳玲, 胡静. 基于双重JPEG压缩特征的数字图像篡改取证技术[J]. 四川大学学报(自然科学版),2010, 47(增刊):225-231.
Meng Xianzhe, Niu Shaozhang, Li Yezhou, Zhu Yanling, Hu Jing . Tamper Detection Based on the Statistical CharacteristicsCaused by Double JPEG Compression [J]. Journal of Sichuan University(Natural Science Edition), 2010, 47(Suppl.): 225-231.