skip to main content
10.1145/3009977.3010067acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicvgipConference Proceedingsconference-collections
research-article

First quantization matrix estimation for double compressed JPEG images utilizing novel DCT histogram selection strategy

Authors Info & Claims
Published:18 December 2016Publication History

ABSTRACT

The Double JPEG problem in image forensics has been gaining importance since it involves two compression cycles and there is a possibility of tampering having taken place after the first cycle thereby calling for accurate methods to detect and localize the introduced tamper. First quantization matrix estimation which basically retrieves the missing quantization table of the first cycle is one of the ways of image authentication for Double JPEG images. This paper presents a robust method for first quantization matrix estimation in case of double compressed JPEG images by improving the selection strategy which chooses the quantization estimate from the filtered DCT histograms. The selection strategy is made robust by increasing the available statistics utilizing the DCT coefficients from the double compressed image under investigation coupled with performing relative comparison between the obtained histograms followed by a novel priority assignment and selection step, which accurately estimates the first quantization value. Experimental testing and comparative analysis with two state-of-art methods show the robustness of the proposed method for accurate first quantization estimation. The proposed method finds its application in image forensics as well as in steganalysis.

References

  1. T. Bianchi and A. Piva. Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Transactions on Information Forensics and Security, 7(3):1003--1017, June 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. G. Cao, Y. Zhao, R. Ni, and X. Li. Contrast enhancement-based forensics in digital images. IEEE Transactions on Information Forensics and Security, 9(3):515--525, March 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Y. L. Chen and C. T. Hsu. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics and Security, 6(2):396--406, June 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Farid. Exposing digital forgeries from JPEG ghosts. IEEE Transactions on Information Forensics and Security, 4(1):154--160, March 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Fridrich. Digital image forensics. Signal Processing Magazine, IEEE, 26(2):26--37, March 2009.Google ScholarGoogle ScholarCross RefCross Ref
  6. J. Fridrich, M. Goljan, and D. Hogea. Steganalysis of JPEG images: Breaking the F5 algorithm. In 5th International Workshop on Information Hiding, IH '02, pages 310--323, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. Galvan, G. Puglisi, A. R. Bruna, and S. Battiato. First quantization matrix estimation from double compressed JPEG images. IEEE Transactions on Information Forensics and Security, 9(8):1299--1310, Aug 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. E. Kee, M. K. Johnson, and H. Farid. Digital image authentication from JPEG headers. IEEE Transactions on Information Forensics and Security, 6(3):1066--1075, Sept 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. V. Lanh, K. S. Chong, S. Emmanuel, and M. S. Kankanhalli. A survey on digital camera image forensic methods. In 2007 IEEE International Conference on Multimedia and Expo, pages 16--19, July 2007.Google ScholarGoogle ScholarCross RefCross Ref
  10. W. S. Lin, S. K. Tjoa, H. V. Zhao, and K. J. R. Liu. Digital image source coder forensics via intrinsic fingerprints. IEEE Transactions on Information Forensics and Security, 4(3):460--475, Sept 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Lukas and J. Fridrich. Estimation of primary quantization matrix in double compressed JPEG images. In Digit. Forensic Res. Workshop (DFRWS), pages 5--8, 2003.Google ScholarGoogle Scholar
  12. W. Luo, J. Huang, and G. Qiu. JPEG error analysis and its applications to digital image forensics. IEEE Transactions on Information Forensics and Security, 5(3):480--491, Sept 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. Pevny and J. Fridrich. Detection of double-compression in JPEG images for applications in steganography. IEEE Transactions on Information Forensics and Security, 3(2):247--258, June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. Schaefer and M. Stich. UCID: an uncompressed color image database. In Proc. SPIE, volume 5307, pages 472--480, 2003.Google ScholarGoogle Scholar
  15. M. C. Stamm, M. Wu, and K. J. R. Liu. Information forensics: An overview of the first decade. IEEE Access, 1:167--200, 2013.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. First quantization matrix estimation for double compressed JPEG images utilizing novel DCT histogram selection strategy

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICVGIP '16: Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing
        December 2016
        743 pages
        ISBN:9781450347532
        DOI:10.1145/3009977

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 December 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        ICVGIP '16 Paper Acceptance Rate95of286submissions,33%Overall Acceptance Rate95of286submissions,33%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader