Skip to main content
Log in

A framework of generative adversarial networks with novel loss for JPEG restoration and anti-forensics

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Both JPEG restoration and anti-forensics remove the artifacts left by JPEG compression, and recover the JPEG compressed image. However, how to restore the high-frequency details of a JPEG compressed image for JPEG restoration and how to deceive the existing JPEG compression detectors without sacrificing visual quality in JPEG anti-forensics remain challenging. To address these issues, a framework of generative adversarial networks (GAN) with novel loss functions for JPEG restoration and anti-forensics (JRA-GAN) is proposed to allow a JPEG compressed image to be translated into a reconstructed one. Since JPEG compression causes impairment to high-frequency components, an alternating current (AC)-component loss function that measures the loss of AC components is proposed in JRA-GAN to recover these components. To prevent forensic detection, a calibration loss function is also introduced in JRA-GAN to mitigate the variance gap in the high-frequency subbands between a generated image and its calibrated version. Our experimental results demonstrate that the proposed JPEG restoration method outperforms existing methods in terms of image quality, and the JPEG anti-forensic scheme achieves better visual quality and anti-forensic performance that is comparable to the existing state-of-the-art anti-forensic methods. Our code is available in this page: https://github.com/wujianyuan/JRG-GAN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Pennebaker, B., Mitchell, L.: JPEG Still Image Data Compression Standard. Van Nostrand Reinhold, New York (1993)

    Google Scholar 

  2. Fan, Z., de Queiroz, R.: Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans. Image Process. 12(2), 230–235 (2003)

    Article  Google Scholar 

  3. Bianchi, T., Piva, A.: Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf. Forensics Secur. 7(2), 842–848 (2012)

    Article  Google Scholar 

  4. Fan, W., Wang, K., Cayre, F., Xiong, Z.: JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality. IEEE Trans. Inf. Forensics Secur. 9(8), 1211–1226 (2014)

    Article  Google Scholar 

  5. Foi, A., Katkovnik, V., Egiazarian, K.: Pointwise shape-adaptive dct for high-quality denoising and deblocking of grayscale and color images. IEEE Trans. Image Process. 16(5), 1395–1411 (2007)

    Article  MathSciNet  Google Scholar 

  6. Zhang, X., Xiong, R., Fan, X., Ma, S., Gao, W.: Compression artifact reduction by overlapped-block transform coefficient estimation with block similarity. IEEE Trans. Image Process. 22(12), 4613–4626 (2013)

    Article  MathSciNet  Google Scholar 

  7. Galteri, L., Seidenari, L., Bertini, M. Bimbo, A.D.: Deep generative adversarial compression artifact removal. In: IEEE International Conference on Computer Vision (ICCV), pp. 4836–4845 (2017)

  8. Svoboda, P., Hradis, M., Barina, D., Zemcik, P.: Compression artifacts removal using convolutional neural networks. J. WSCG 24(2), 63–72 (2016)

    Google Scholar 

  9. Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.J.R.: Anti-forensics of JPEG compression. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 1694–1697 (2010)

  10. Lai, S., Böhme, R.: Countering counter-forensics: the case of JPEG compression. In: 5th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), pp. 285–298 (2011)

  11. Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: International Conference on Pattern Recognition (ICPR), pp. 2366–2369 (2010)

  12. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: Neural Information Processing Systems (NIPS), pp. 2672–2680 (2014)

  13. Yu, K., Dong, C., Loy, C.C., Tang, X.: Deep convolution networks for compression artifacts reduction. arXiv:1608.02778 (2016)

  14. Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)

    Article  Google Scholar 

  15. Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. In: International Conference on Learning Representations (ICLR) (2016)

  16. Mirza, M., Osindero, S.: Conditional generative adversarial nets. arXiv:1411.1784 (2014)

  17. Brock, A., Donahue, J., Simonyan, K.: Large scale gan training for high fidelity natural image synthesis. In: International Conference on Learning Representations (ICLR) (2019)

  18. Isola, P., et al.: Image-to-image translation with conditional adversarial networks. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1125–1134 (2017)

  19. Kim, T., et al.: Learning to discover cross-domain relations with generative adversarial networks. In: 34th International Conference on Machine Learning (ICML), pp. 1857–1865 (2017)

  20. Ledig, C., Theis, L., Huszár, F., Caballero, J., Aitken, A., Tejani, A., Totz, J., Wang, Z., Shi, W.: Photo-realistic single image super-resolution using a generative adversarial network. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4681–4690 (2017)

  21. Zhang, Y., Tian, Y., Kong, Y, Zhong, B., Fu, Y.: Residual dense network for image super-resolution. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2472–2481 (2018)

  22. Nair, V., Hinton, G.E.: Rectified linear units improve restricted boltzmann machines. In: 27th International Conference on Machine Learning (ICML), pp. 807–814 (2010)

  23. Ba, J.L., Kiros, J.R., Hinton, G.E.: Layer normalization. arXiv:1607.06450 (2016)

  24. Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. arXiv:1502.0316 (2015)

  25. Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.: Improved training of wasserstein GAN. In: Neural Information Processing Systems (NIPS), pp. 5767–5777 (2017)

  26. Zhao, H., Gallo, O., Frosio, I., Kautz, J.: Loss functions for image restoration with neural networks. IEEE Trans. Comput. Imaging 3(1), 47–57 (2017)

    Article  Google Scholar 

  27. Luo, Y., Zi, H., Zhang, Q., Kang, X.: Anti-forensics of JPEG compression using generative adversarial networks. In: European Signal Processing Conference (EUSIPCO), pp. 957–961 (2018)

  28. Lam, E.Y., Goodman, J.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans. Image Process. 9(10), 1661–1666 (2000)

    Article  Google Scholar 

  29. Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., Isard, M., et al.: TensorFlow: a system for large-scale machine learning. In:12th USENIX Conference on Operating Systems Design and Implementation (OSDI), pp. 265–283 (2016)

  30. Bas, P., Filler, T., Pevny, T.: Break our steganographic system—the ins and outs of organizing BOSS. In: 13th International Conference on Information Hiding (IH), pp. 59–70 (2011)

  31. Bas, P., Furon, T.: BOWS-2 contest (break our watermarking system). Organized between the 17th of July 2007 and the 17th of April 2008 (2008)

  32. Schaefer, G., Stich, M.: UCID—an uncompressed colour image database, In: Society of Photo-Optical Instrumentation Engineers (SPIE), pp. 472–480 (2004)

  33. Kingma, D., Ba, J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (ICLR) (2015)

  34. Luo, W., Huang, J., Qiu, G.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3), 480–491 (2010)

    Article  Google Scholar 

  35. Fan, W., Wang, K., Cayre, F., Xiong, Z.: A variational approach to JPEG anti-forensics. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 3058–3062 (2013)

  36. Valenzise, G., Tagliasacchi, M., Tubaro, S.: Revealing the traces of JPEG compression anti-forensics. IEEE Trans. Inf. Forensics Secur. 8(2), 335–349 (2013)

    Article  Google Scholar 

  37. Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13(11), 2691–2706 (2018)

    Article  Google Scholar 

  38. Li, H., Luo, W., Qiu, X., Huang, J.: Identification of various image operations using residual-based features. IEEE Trans. Circuits Syst. Video Technol. 28(1), 31–45 (2016)

    Article  Google Scholar 

  39. Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2011)

    Article  Google Scholar 

  40. Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(27), 1–27 (2011)

    Article  Google Scholar 

  41. Kim, D., Jang, H.U., Mun, S.M., Choi, S., Lee, H.K.: Median filtered image restoration and anti-forensics using adversarial networks. IEEE Signal Process. Lett. 25(2), 278–282 (2018)

    Article  Google Scholar 

  42. Zheng, B., Sun, R., Tian, X., Chen, Y.: S-net: a scalable convolutional neural network for jpeg compression artifact reduction. J. Electron. Imaging 27(4), 043037 (2018)

    Google Scholar 

  43. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: International Conference on Learning Representations (ICLR) (2015)

  44. Zhang, H., Goodfellow, I., Metaxas, D., Odena, A.: Self-attention generative adversarial networks. arXiv:1805.08318 (2018)

  45. Tang, W., Tan, S., Li, B., Huang, J.: Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process. Lett. 24(10), 1547–1551 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by NSFC under Grant 62072484, 61772571 and Chinese national key research and development project under Grant 2019QY2203. This work was also supported by China Postdoctoral Science Foundation (Grant no. 2020M683051) and the Fundamental Research Funds for the Central Universities, Sun Yat-sen University (Grant no. 67000-31610131).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiangui Kang or Jianhua Yang.

Additional information

Communicated by J. Dittmann.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, J., Kang, X., Yang, J. et al. A framework of generative adversarial networks with novel loss for JPEG restoration and anti-forensics. Multimedia Systems 27, 1075–1089 (2021). https://doi.org/10.1007/s00530-021-00778-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-021-00778-6

Keywords

Navigation