Abstract
Detection of multiple JPEG compression of digital images has been attracting more and more interest in the field of multimedia forensics. On the other side, techniques to conceal the traces of multiple compression are being proposed as well. Motivated by a recent trend towards the adoption of universal approaches, we propose a counter-forensic technique that makes multiple compression undetectable for any forensic detector based on the analysis of the histograms of quantized DCT coefficients. Experimental results show the effectiveness of our approach in removing the artifacts of double and also triple compression, while maintaining a good quality of the image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Experiments show that using \( \chi ^2\) in place of \( \mathcal {D}\) in this phase lightens the computation without significantly affecting the results.
- 2.
Each contribution may be possibly weighted by some coefficients in order to give more importance to the low frequency coefficients.
- 3.
Performing the rounding for computing \(W_q\) may cause a slight violation of the JND constraint, but it is preferable for the remapping operation.
- 4.
In the transportation problem the objective function of the minimization problem would be the distortion (cost of the transportation), which in our formulation is instead a constraint.
- 5.
This avoids multiple substitutions of the same coefficients.
- 6.
- 7.
The expected histogram is obtained by estimating the histograms of unquantized coefficients (using calibration), then quantizing them according to the quantization factors available in the JPEG header of the file.
References
Barni, M., Tondi, B.: The source identification game: an information-theoretic perspective. IEEE Trans. Inf. Forensics Secur. 8(3), 450–463 (2013)
Barni, M., Fontani, M., Tondi, B.: A universal technique to hide traces of histogram-based image manipulations. In: Proceedings of MM&Sec 2012, 14th ACM workshop on Multimedia & Security, pp. 97–104. ACM, New York (2012)
Barni, M., Tondi, B.: Multiple-observation hypothesis testing under adversarial conditions. In: Proceedings of WIFS 2013, IEEE International Workshop on Information Forensics and Security, pp. 91–96, November 2013
Bonami, P., Kilinc, M., Linderoth, J., et al.: Algorithms and software for convex mixed integer nonlinear programs. Computer Sciences Department, University of Wisconsin-Madison. Techical report (2009)
Comesana-Alfaro, P., Perez-Gonzalez, F.: Optimal counterforensics for histogram-based forensics. In: Proceedings of ICASSP 2013, IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3048–3052, May 2013
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2008)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Kirchner, M., Böhme, R.: Tamper hiding: defeating image forensics. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 326–341. Springer, Heidelberg (2008)
Lam, E.Y., Goodman, J.W.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans. Image Process. 9(10), 1661–1666 (2000)
Li, B., Shi, Y., Huang, J.: Detecting doubly compressed JPEG images by using mode based first digit features. In: Proceedings of MMSP 2008, IEEE Workshop on Multimedia Signal Processing, pp. 730–735, October 2008
Milani, S., Tagliasacchi, M., Tubaro, S.: Discriminating multiple JPEG compression using first digit features. In: Proceedings of ICASSP 2012, IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2253–2256, March 2012
Milani, S., Tagliasacchi, M., Tubaro, S.: Antiforensics attacks to benford’s law for the detection of double compressed images. In: Proceedings of ICASSP 2013, IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3053–3057, May 2013
Pevný, T., Fridrich, J.: Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images. In: Proceedings of SPIE, vol. 6819, pp. 681911–681911-13 (2008). http://dx.doi.org/10.1117/12.759155
Popescu, A.C., Farid, H.: Statistical tools for digital forensics. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 128–147. Springer, Heidelberg (2004)
Rachev, S.T.: Mass Transportation Problems: Volume I: Theory. Springer, New York (1998)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Watson, A.B.: DCT quantization matrices visually optimized for individual images. In: Proceedings of IS&T/SPIE’s Symposium on Electronic Imaging: Science and Technology, pp. 202–216. International Society for Optics and Photonics (1993)
Acknowledgments
This work was partially supported by the European Office of Aerospace Research and Development under Grant FA8655-12-1- 2138: AMULET - A multi-clue approach to image forensics.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Barni, M., Fontani, M., Tondi, B. (2015). Universal Counterforensics of Multiple Compressed JPEG Images. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-19321-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19320-5
Online ISBN: 978-3-319-19321-2
eBook Packages: Computer ScienceComputer Science (R0)