Skip to main content

JPEG Quantization Tables Forensics: A Statistical Approach

  • Conference paper
Computational Forensics (IWCF 2010)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 6540))

Included in the following conference series:

Abstract

Many digital image forensics techniques using various fingerprints which identify the image source are dependent on data on digital images from an unknown environment. As often software modifications leave no appropriate traces in image metadata, critical miscalculations of fingerprints arise. This is the problem addressed in this paper. Modeling information noise, we introduce a statistical approach for noise-removal in databases consisted of “unguaranteed” images. In this paper, employed fingerprints are based on JPEG quantization tables.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mahdian, B., Saic, S.: A bibliography on blind methods for identifying image forgery. Signal Processing: Image Communication 25, 389–399 (2010)

    Google Scholar 

  2. Farid, H.: A survey of image forgery detection. IEEE Signal Processing Magazine 2(26), 16–25 (2009)

    Article  Google Scholar 

  3. Kornblum, J.D.: Using jpeg quantization tables to identify imagery processed by software. In: Proceedings of the Digital Forensic Workshop, August 2008, pp. 21–25 (2008)

    Google Scholar 

  4. Farid, H.: Digital image ballistics from JPEG quantization, Tech. Rep. TR2006-583, Department of Computer Science, Dartmouth College (2006)

    Google Scholar 

  5. Fridrich, J., Lukas, J.: Estimation of primary quantization matrix in double compressed jpeg images. In: Proceedings of DFRWS, Cleveland, OH, USA, August 2003, vol. 2 (2003)

    Google Scholar 

  6. Fridrich, J., Pevny, T.: Detection of double–compression for applications in steganography. IEEE Transactions on Information Security and Forensics 3(2), 247–258 (2008)

    Article  Google Scholar 

  7. Fu, D., Shi, Y.Q., Su, W.: A generalized benford’s law for jpeg coefficients and its applications in image forensics. In: SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA (January 2007)

    Google Scholar 

  8. Luo, W., Qu, Z., Huang, J., Qiu, G.: A novel method for detecting cropped and recompressed image block. In: IEEE International Conference on Acoustics, Speech and Signal Processing, Honolulu, HI, USA, vol. 2, pp. 217–220 (April 2007)

    Google Scholar 

  9. Mahdian, B., Saic, S.: Detecting double compressed jpeg images. In: The 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP 2009), London, UK (December 2009)

    Google Scholar 

  10. Popescu, A.C.: Statistical Tools for Digital Image Forensics, Ph.D. thesis, Ph.D. dissertation. Department of Computer Science, Dartmouth College, Hanover, NH (2005)

    Google Scholar 

  11. Qu, Z., Luo, W., Huang, J.: A convolutive mixing model for shifted double jpeg compression with application to passive image authentication. In: IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, USA, April 2008, pp. 4244–1483 (2008)

    Google Scholar 

  12. Kihara, M., Fujiyoshi, M., Wan, Q.T., Kiya, H.: Image tamper detection using mathematical morphology. In: ICIP, vol. (6), pp. 101–104 (2007)

    Google Scholar 

  13. Farid, H.: Digital image ballistics from JPEG quantization: A followup study, Tech. Rep. TR2008-638, Department of Computer Science, Dartmouth College (2008)

    Google Scholar 

  14. Pennebaker, W.B., Mitchell, J.L.: JPEG Still Image Data Compression Standard. Kluwer Academic Publishers, Norwell (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mahdian, B., Saic, S., Nedbal, R. (2011). JPEG Quantization Tables Forensics: A Statistical Approach. In: Sako, H., Franke, K.Y., Saitoh, S. (eds) Computational Forensics. IWCF 2010. Lecture Notes in Computer Science, vol 6540. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19376-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19376-7_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19375-0

  • Online ISBN: 978-3-642-19376-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics