skip to main content
10.1145/2909827.2930787acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Forensics of High Quality and Nearly Identical JPEG Image Recompression

Published:20 June 2016Publication History

ABSTRACT

We address the known problem of detecting a previous compression in JPEG images, focusing on the challenging case of high and very high quality factors (>= 90) as well as repeated compression with identical or nearly identical quality factors. We first revisit the approaches based on Benford--Fourier analysis in the DCT domain and block convergence analysis in the spatial domain. Both were originally conceived for specific scenarios. Leveraging decision tree theory, we design a combined approach complementing the discriminatory capabilities. We obtain a set of novel detectors targeted to high quality grayscale JPEG images.

References

  1. T. Bianchi, A. Piva, and F. Pérez-González. Near optimal detection of quantized signals and application to JPEG forensics. In IEEE Workshop on Informations Forensics and Security (WIFS), 2013.Google ScholarGoogle ScholarCross RefCross Ref
  2. L. Breslow and D. Aha. Simplifying decision trees: A survey. The Knowledge Engineering Review, 12(1):1--40, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Carnein, P. Schöttle, and R. Böhme. Forensics of high-quality JPEG images with color subsampling. In IEEE Workshop on Informations Forensics and Security (WIFS), 2015.Google ScholarGoogle ScholarCross RefCross Ref
  4. Y. Chen and C. Hsu. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics and Security, 6, n. 2:396--406, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Gloe and R. Boehme. The Dresden image database for benchmarking digital image forensics. In ACM Symposium on Applied Computing, volume 2, pages 1585--1591, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Huang, J. Huang, and Y. Shi. Detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security, 5(4):848--856, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S.-Y. Lai and R. Böhme. Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 3028--3032, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  8. B. Li, Y. Shi, and J. Huang. Detecting doubly compressed JPEG images by using mode based first digit features. In IEEE Workshop on Multimedia Signal Processing (MMSP), pages 730--735, 2008.Google ScholarGoogle Scholar
  9. S. Milani, M. Tagliasacchi, and S. Tubaro. Discriminating multiple JPEG compression using first digit features. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 25--30, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  10. C. Pasquini, G. Boato, and F. Pérez-González. Multiple JPEG compression detection by means of Benford-Fourier coefficients. In IEEE Workshop on Informations Forensics and Security (WIFS), pages 113--118, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  11. C. Pasquini, F. Pérez-González, and G. Boato. A Benford-Fourier JPEG compression detector. In IEEE International Conference on Image Processing (ICIP), pages 5322--5326, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  12. F. Pérez-González, T. Quach, S. J. Miller, C. Abdallah, and G. Heileman. Application of Benford's law to images. S. J. Miller, A. Berger and T. Hill (Eds), The Theory and Applications of Benford's law, Princeton University Press, 2015.Google ScholarGoogle Scholar
  13. T. Pevnỳ and J. Fridrich. Detection of double-compression in JPEG images for applications in steganography. IEEE Transactions on Information Forensics and Security, 3(2):247--258, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Rokach and O. Maimon. Top-down induction of decision trees classifiers - a survey. IEEE Transactions on Systems, Man, and Cybernetics, 35(4):476--487, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. Schaefer and M. Stich. UCID - An uncompressed colour image database. In SPIE Storage and Retrieval Methods and Applications to Multimedia, volume 5307, 2004.Google ScholarGoogle Scholar
  16. J. Yang, J. Xie, G. Zhu, S. Kwong, and Y. Shi. An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security, 9(11), 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Forensics of High Quality and Nearly Identical JPEG Image Recompression

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IH&MMSec '16: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
          June 2016
          200 pages
          ISBN:9781450342902
          DOI:10.1145/2909827

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 20 June 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          IH&MMSec '16 Paper Acceptance Rate21of61submissions,34%Overall Acceptance Rate128of318submissions,40%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader