Skip to main content

A Method to Detect JPEG-Based Double Compression

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6676))

Abstract

Digital multimedia forensics is an emerging field that has important applications in law enforcement, the protection of public safety, and notational security. As a popular image compression standard, the JPEG format is widely adopted; however, the tampering of JPEG images can be easily performed without leaving visible clues, and it is increasingly necessary to develop reliable methods to detect forgery in JPEG images. JPEG double compression is frequently used during image forgery, and it leaves a clue to the manipulation. To detect JPEG double compression, we propose in this paper to extract the neighboring joint density features and marginal density features on the DCT coefficients, and then to apply learning classifiers to the features for detection. Experimental results indicate that the proposed method delivers promising performance in uncovering JPEG-based double compression. In addition, we analyze the relationship among compression quality factor, image complexity, and the performance of our double compression detection algorithm, and demonstrate that a complete evaluation of the detection performance of different algorithms should necessarily include both the image complexity and double compression quality factor.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CBS News, http://www.cbsnews.com/8301-503543_162-20016679-503543.html

  2. CBS News, http://www.cbsnews.com/stories/2010/09/17/world/main6876519.shtml

  3. National Public Radio, http://www.npr.org/blogs/thetwo-way/2010/09/17/129938169/doctored-photograph-hosni-mubarak-al-ahram-white-house-obama-mideast-peace-talks

  4. Chen, C., Shi, Y., Su, W.: A Machine Learning Based Scheme for Double JPEG Compression Detection. In: Proc. of 19th ICPR, pp. 1–4 (2008)

    Google Scholar 

  5. Cho, D., Bui, T.: Multivariate Statistical Modeling for Image Denoising Using Wavelet Transforms. Signal Processing: Image Communication 20, 77–89 (2005)

    Google Scholar 

  6. Farid, H.: Image Forgery Detection, a Survey. IEEE Signal Processing Magazine, 16–25 (March 2009)

    Google Scholar 

  7. Liu, Q., Sung, A.H.: Feature Mining and Nuero-fuzzy Inference System for Steganalysis of LSB Matching Steganography in Grayscale Images. In: Proc. 20th IJCAI, pp. 2808–2813 (2007)

    Google Scholar 

  8. Liu, Q., Sung, A.H., Chen, H., Xu, J.: Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images. Pattern Recognition 41(1), 56–66 (2008)

    Article  MATH  Google Scholar 

  9. Liu, Q., Sung, A.H., Ribeiro, B.M., Wei, M., Chen, Z., Xu, J.: Image Complexity and Feature Mining for Steganalysis of Least Significant Bit Matching Steganography. Information Sciences 178(1), 21–36 (2008)

    Article  Google Scholar 

  10. Liu, Q., Sung, A.H., Qiao, M.: Novel Stream Mining for Audio Steganalysis. In: Proc. 17th ACM Multimedia, pp. 95–104 (2009)

    Google Scholar 

  11. Liu, Q., Sung, A.H., Qiao, M.: Derivative Based Audio Steganalysis. ACM Trans. Multimedia Computing, Communications and Applications (in press)

    Google Scholar 

  12. Liu, Q., Sung, A.H., Qiao, M.: Neighboring Joint Density Based JPEG Steganalysis. ACM Trans. Intelligent Systems and Technology 2(2), article 16 (2011), doi:10.1145/1899412.1899420

    Google Scholar 

  13. Ohm, J.R.: Multimedia Communication Technology, Representation, Transmission and Identification of Multimedia Signals. Springer, Berlin (2004)

    MATH  Google Scholar 

  14. Pevny, T., Fridrich, J.: Detection of Double-compression in JPEG Images for Applications in Steganography. IEEE Trans. Information Forensics and Security 3(2), 247–258 (2008)

    Article  Google Scholar 

  15. Sharifi, K., Leon-Garcia, A.: Estimation of Shape Parameter for Generalized Gaussian Distributions in Subband Decompositions of Video. IEEE Trans. Circuits Syst. Video Technol. 5, 52–56 (1995)

    Article  Google Scholar 

  16. Vapnik, V.: Statistical Learning Theory. John Wiley, Chichester (1998)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Q., Sung, A.H., Qiao, M. (2011). A Method to Detect JPEG-Based Double Compression. In: Liu, D., Zhang, H., Polycarpou, M., Alippi, C., He, H. (eds) Advances in Neural Networks – ISNN 2011. ISNN 2011. Lecture Notes in Computer Science, vol 6676. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21090-7_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21090-7_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21089-1

  • Online ISBN: 978-3-642-21090-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics