Skip to main content

Re–compression Based JPEG Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor Dependency

  • Conference paper
  • First Online:
  • 1054 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11281))

Abstract

In this work, we deal with the problem of re–compression based image forgery detection, where some regions of an image are modified illegitimately, hence giving rise to presence of dual compression characteristics within a single image. There have been some significant researches in this direction, in the last decade. However, almost all existing techniques fail to detect this form of forgery, when the first compression factor is greater than the second. We address this problem in re–compression based forgery detection, here Recently, Machine Learning techniques have started gaining a lot of importance in the domain of digital image forensics. In this work, we propose a Convolution Neural Network based deep learning architecture, which is capable of detecting the presence of re–compression based forgery in JPEG images. The proposed architecture works equally efficiently, even in cases where the first compression ratio is greater than the second. In this work, we also aim to localize the regions of image manipulation based on re–compression features, using the trained neural network. Our experimental results prove that the proposed method outperforms the state–of–the–art, with respect to forgery detection and localization accuracy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Conotter, V.: Active and passive multimedia forensics. Ph.D. thesis, University of Trento (2011)

    Google Scholar 

  2. Pennebaker, W.B., Mitchell, J.L.: JPEG: Still Image Data Compression Standard. Springer, Berlin (1992)

    Google Scholar 

  3. Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10(3), 226–245 (2013)

    Article  Google Scholar 

  4. Wang, W., Dong, J., Tan, T.: Exploring DCT coefficient quantization effects for local tampering detection. IEEE Trans. Inf. Forensics Secur. 9(10), 1653–1666 (2014)

    Article  Google Scholar 

  5. Cozzolino, D., Poggi, G., Verdoliva, L.: Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 159–164. ACM (2017)

    Google Scholar 

  6. Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6, December 2016. https://doi.org/10.1109/WIFS.2016.7823911

  7. Bianchi, T., De Rosa, A., Piva, A.: Improved DCT coefficient analysis for forgery localization in JPEG images. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2444–2447. IEEE (2011)

    Google Scholar 

  8. Lin, Z., Wang, R., Tang, X., Shum, H.Y.: Detecting doctored images using camera response normality and consistency. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 1087–1092. IEEE (2005)

    Google Scholar 

  9. Popescu, A., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technology report TR2004-515, Department Computer Science, Dartmouth College (2004)

    Google Scholar 

  10. Lukáš, J., Fridrich, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. In: Electronic Imaging 2006, p. 60720Y. International Society for Optics and Photonics (2006)

    Google Scholar 

  11. Fu, D., Shi, Y.Q., Su, W.: A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 65051L. International Society for Optics and Photonics (2007)

    Google Scholar 

  12. Li, W., Yuan, Y., Yu, N.: Detecting copy-paste forgery of JPEG image via block artifact grid extraction. In: International Workshop on Local and Non-Local Approximation in Image Processing, pp. 1–6 (2008)

    Google Scholar 

  13. Mahdian, B., Saic, S.: Detecting double compressed JPEG images. In: 3rd International Conference on Crime Detection and Prevention (ICDP 2009), pp. 1–6. IET (2009)

    Google Scholar 

  14. Malviya, P., Naskar, R.: Digital forensic technique for double compression based JPEG image forgery detection. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 437–447. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-13841-1_25

    Chapter  Google Scholar 

  15. Fridrich, A.J., Soukal, B.D., Lukáš, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop. Citeseer (2003)

    Google Scholar 

  16. Gopi, E., Lakshmanan, N., Gokul, T., KumaraGanesh, S., et al.: Digital image forgery detection using artificial neural network and auto regressive coefficients. In: Canadian Conference on Electrical and Computer Engineering, (CCECE 2006), pp. 194–197. IEEE (2006)

    Google Scholar 

  17. Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 5–10. ACM (2016)

    Google Scholar 

  18. Barni, M., et al.: Aligned and non-aligned double JPEG detection using convolutional neural networks. J. Vis. Commun. Image Represent. 49, 153–163 (2017)

    Article  Google Scholar 

  19. Schaefer, G., Stich, M.: UCID: an uncompressed color image database. In: Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472–481. International Society for Optics and Photonics (2003)

    Google Scholar 

  20. Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097–1105 (2012)

    Google Scholar 

Download references

Acknowledgement

This work is partially funded by Board of Research in Nuclear Sciences (BRNS), Department of Atomic Energy (DAE), Govt. of India, Grant No. 34/20/22/2016-BRNS/34363, dated: 16/11/2016.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jamimamul Bakas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bakas, J., Rawat, P., Kokkalla, K., Naskar, R. (2018). Re–compression Based JPEG Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor Dependency. In: Ganapathy, V., Jaeger, T., Shyamasundar, R. (eds) Information Systems Security. ICISS 2018. Lecture Notes in Computer Science(), vol 11281. Springer, Cham. https://doi.org/10.1007/978-3-030-05171-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05171-6_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05170-9

  • Online ISBN: 978-3-030-05171-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics