Skip to main content

Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13180))

Included in the following conference series:

Abstract

As Joint Photographic Experts Group (JPEG) compression is widely used in image processing and computer vision, the detection of JPEG forgery has become an important issue in digital image forensics, and many related works have been reported. However, these works all assume that the quantization table in the JPEG header file is real, and corresponding research is carried out based on this assumption. This assumption leaves a potential flaw for those wise forgers to confuse or even invalidate the current JPEG forensics detectors. Taking double JPEG compression forensics as an example, if the quantization table in the header file is modified, it will cause the algorithm to fail. However, the tampering of header files not only brings negative effects, it can also improve the forensics performance of the algorithm. According to our analysis and experiments, increasing the step in the quantization table in the header file can lead to the failure of the forensics algorithm, and reducing the step in the quantization table in the header file can improve the performance of the existing algorithm. Based on this observation, we propose a general forensics and anti-forensics model by replacing the quantization table in the header file. The experimental results on the UCID database show that the scheme is effective for obfuscating and improving the three typical double JPEG compression forensics work.

This work was jointly supported by the National Natural Science Foundation of China (Grant No. 62072250, 61772281, 61702235, U1804263, U20B2065, U1636117, U1636219, 61872203, 71802110 and 61802212), in part by the National Key R & D Program of China (Grant No. 2016QY01W0105), in part by the Natural Science Foundation of Jiangsu Province, BK20200750, in part by the plan for Scientific Talent of Henan Province (Grant No. 2018JR0018), in part by Post graduate Research & Practice Innvoation Program of Jiang su Province (Grant No. KYCX200974), supported by the Opening Project of GuangDong Province Key Laboratory of Information Security Technology(Grant No. 2020B1212060078), in part by the Ministry of education of Humanities and Social Science project (Grant No. 19YJA630061) and the Priority Academic Program Development of Jiang su Higher Education Institutions (PAPD) fund.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Barni, M., et al.: Aligned and non-aligned double JPEG detection using convolutional neural networks. J. Vis. Commun. Image Represent. 49, 153–163 (2017)

    Article  Google Scholar 

  2. Chen, C., Li, H., Luo, W., Yang, R., Huang, J.: Anti-forensics of JPEG detectors via adaptive quantization table replacement. In: 2014 22nd International Conference on Pattern Recognition, pp. 672–677. IEEE (2014)

    Google Scholar 

  3. Deshpande, A.U., Harish, A.N., Singh, S., Verma, V., Khanna, N.: Neural network based block-level detection of same quality factor double JPEG compression. In: 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 828–833. IEEE (2020)

    Google Scholar 

  4. Farid, H.: Image forgery detection. IEEE Sig. Process. Mag. 26(2), 16–25 (2009)

    Article  Google Scholar 

  5. Huang, X., Wang, S., Liu, G.: Detecting double JPEG compression with same quantization matrix based on dense CNN feature. In: 2018 25th IEEE International Conference on Image Processing (ICIP), pp. 3813–3817. IEEE (2018)

    Google Scholar 

  6. Luo, W., Qu, Z., Pan, F., Huang, J.: A survey of passive technology for digital image forensics. Front. Comput. Sci. China 1(2), 166–179 (2007). https://doi.org/10.1007/s11704-007-0017-0

    Article  Google Scholar 

  7. Niu, Y., Li, X., Zhao, Y., Ni, R.: An enhanced approach for detecting double JPEG compression with the same quantization matrix. Sig. Process. Image Commun. 76, 89–96 (2019)

    Article  Google Scholar 

  8. Niu, Y., Tondi, B., Zhao, Y., Barni, M.: Primary quantization matrix estimation of double compressed JPEG images via CNN. IEEE Sig. Process. Lett. 27, 191–195 (2019)

    Article  Google Scholar 

  9. Park, J., Cho, D., Ahn, W., Lee, H.-K.: Double JPEG detection in mixed JPEG quality factors using deep convolutional neural network. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11209, pp. 656–672. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01228-1_39

    Chapter  Google Scholar 

  10. Peng, P., Sun, T., Jiang, X., Xu, K., Li, B., Shi, Y.: Detection of double JPEG compression with the same quantization matrix based on convolutional neural networks. In: 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 717–721. IEEE (2018)

    Google Scholar 

  11. Thai, T.H., Cogranne, R.: Estimation of primary quantization steps in double-compressed JPEG images using a statistical model of discrete cosine transform. IEEE Access 7, 76203–76216 (2019)

    Article  Google Scholar 

  12. Thai, T.H., Cogranne, R., Retraint, F., et al.: JPEG quantization step estimation and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 12(1), 123–133 (2016)

    Article  Google Scholar 

  13. Wallace, G.K.: The JPEG still picture compression standard. IEEE Trans. Consum. Electron. 38(1), xviii–xxxiv (1992)

    Google Scholar 

  14. Wang, J., Huang, W., Luo, X., Shi, Y.Q., Jha, S.K.: Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain. J. Real-Time Image Process. 17(1), 7–16 (2020). https://doi.org/10.1007/s11554-019-00929-z

    Article  Google Scholar 

  15. Wang, J., Wang, H., Li, J., Luo, X., Shi, Y.Q., Jha, S.K.: Detecting double JPEG compressed color images with the same quantization matrix in spherical coordinates. IEEE Trans. Circ. Syst. Video Technol. 30(8), 2736–2749 (2019)

    Article  Google Scholar 

  16. Wang, Z.F., Zhu, L., Min, Q.S., Zeng, C.Y.: Double compression detection based on feature fusion. In: 2017 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 2, pp. 379–384. IEEE (2017)

    Google Scholar 

  17. Yang, J., Xie, J., Zhu, G., Kwong, S., Shi, Y.Q.: An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Forensics Secur. 9(11), 1933–1942 (2014)

    Article  Google Scholar 

  18. Yang, J., Zhang, Y., Zhu, G., Kwong, S.: A clustering-based framework for improving the performance of JPEG quantization step estimation. IEEE Trans. Circ. Syst. Video Technol. 31(4), 1661–1672 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, H., Wang, J., Luo, X., Yin, Q., Ma, B., Sun, J. (2022). Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics. In: Zhao, X., Piva, A., Comesaña-Alfaro, P. (eds) Digital Forensics and Watermarking. IWDW 2021. Lecture Notes in Computer Science(), vol 13180. Springer, Cham. https://doi.org/10.1007/978-3-030-95398-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-95398-0_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-95397-3

  • Online ISBN: 978-3-030-95398-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics