Skip to main content
Log in

Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Digital multimedia forensics is an emerging field that has important applications in law enforcement and protection of public safety and national security. In digital imaging, JPEG is the most popular lossy compression standard and JPEG images are ubiquitous. Today’s digital techniques make it easy to tamper JPEG images without leaving any visible clues. Furthermore, most image tampering involves JPEG double compression, it heightens the need for accurate analysis of JPEG double compression in image forensics.

In this paper, to improve the detection of JPEG double compression, we transplant the neighboring joint density features, which were designed for JPEG steganalysis, and merge the joint density features with marginal density features in DCT domain as the detector for learning classifiers. Experimental results indicate that the proposed method improves the detection performance. We also study the relationship among compression factor, image complexity, and detection accuracy, which has not been comprehensively analyzed before. The results show that a complete evaluation of the detection performance of different algorithms should necessarily include image complexity as well as the double compression quality factor.

In addition to JPEG double compression, the identification of image capture source is an interesting topic in image forensics. Mobile handsets are widely used for spontaneous photo capture because they are typically carried by their users at all times. In the imaging device market, smartphone adoption is currently exploding and megapixel smartphones pose a threat to the traditional digital cameras. While smartphone images are widely disseminated, the manipulation of images is also easily performed with various photo editing tools. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. Following the success of our previous work in JPEG double compression detection, we conducted a study to identify smartphone source and post-capture manipulation by utilizing marginal density and neighboring joint density features together. Experimental results show that our method is highly promising for identifying both smartphone source and manipulations.

Finally, our study also indicates that applying unsupervised clustering and supervised classification together leads to improvement in identifying smartphone sources and manipulations and thus provides a means to address the complexity issue of the intentional post-capture manipulation on smartphone images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. http://www.theblaze.com/stories/nkorea-caught-doctoring-photo-of-kim-jong-ils-funeral-can-you-spot-the-difference/

  2. http://www.cbsnews.com/stories/2010/09/17/world/main6876519.shtml

  3. http://latimesblogs.latimes.com/babylonbeyond/2008/07/iran-doctored-m/comments/page/2/

  4. http://www.cbsnews.com/8301-503543_162-20016679-503543.html

  5. Alles EJ, Geradts JMH, Veenman CJ (2009) Source camera identification for heavily JPEG compressed low resolution still images. J Forensic Sci 54(3):628–638

    Article  Google Scholar 

  6. Celiktutan O, Sankur B, Avcibas I (2008) Blind identification of source cell-phone model. IEEE Trans Inf Forensics Secur 3(3):553–566

    Article  Google Scholar 

  7. Chang CC, Lin CJ (2001) LIBSVM: a library for support vector machines 2001. Software is available and can be free downloaded at http://www.csie.ntu.edu.tw/~cjlin/libsvm

  8. Chen C, Shi Y (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proc 2008 IEEE international symposium on circuits and systems, pp 3029–3032

    Chapter  Google Scholar 

  9. Chen C, Shi Y, Su W (2008) A machine learning based scheme for double JPEG compression detection. In: Proc of 19th ICPR, pp 1–4

    Google Scholar 

  10. Cho D, Bui T (2005) Multivariate statistical modeling for image denoising using wavelet transforms. Signal Process Image Commun 20:77–89

    Article  Google Scholar 

  11. Choi KS, Lam EY, Wong KKY (2006) Source camera identification using footprints from lens aberration. Proc SPIE Int Soc Opt Eng 6069:172–179

    Google Scholar 

  12. Diosan L, Rogozan A, Pecuchet J-P (2012) Improving classification performance of support vector machine by genetically optimising kernel shape and hyper-parameters. Appl Intell 36(2):280–294

    Article  Google Scholar 

  13. Dirik AE, Sencar HT, Memon N (2007) Source camera identification based on sensor dust characteristics. In: Proc IEEE workshop on signal processing applications for public security and forensics, pp 1–6

    Google Scholar 

  14. Farid H (2009) Image forgery detection, a survey. IEEE Signal Process Mag March:16–25

    Article  Google Scholar 

  15. Gul G, Avcibas I (2009) Source cell phone camera identification based on singular value decomposition. In: Proc 1st IEEE international workshop on information forensics and security, pp 171–175

    Google Scholar 

  16. Kharrazi M, Sencar HT, Memon N (2004) Blind source camera identification. In: Proc ICIP’04, Singapore, 24–27 October 2004

    Google Scholar 

  17. Lee H, Kim E, Pedrycz W (2012) A new selective neural network ensemble with negative correlation. Appl Intell 37(4):488–489

    Article  Google Scholar 

  18. Li CT (2010) Source camera identification using enhanced sensor pattern noise. IEEE Trans Inf Forensics Secur 5(2):280–287

    Article  Google Scholar 

  19. Liu Q (2011) Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery. In: Proc 3rd ACM workshop on multimedia in forensics and intelligence, pp 25–30

    Chapter  Google Scholar 

  20. Liu Q, Sung AH (2007) Feature mining and neuro-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. In: Proc 20th IJCAI, pp 2808–2813

    Google Scholar 

  21. Liu Q, Sung AH (2009) A new approach for JPEG resize and image splicing detection. In: Proc 1st ACM workshop on multimedia in forensics, pp 43–48

    Google Scholar 

  22. Liu Q, Sung AH, Xu J, Ribeiro BM (2006) Image complexity and feature extraction for steganalysis of LSB matching steganography. In: Proc 18th international conference on pattern recognition, vol 2, pp 267–270

    Google Scholar 

  23. Liu Q, Sung AH, Chen H, Xu J (2008) Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognit 41(1):56–66

    Article  MATH  Google Scholar 

  24. Liu Q, Sung AH, Ribeiro BM, Wei M, Chen Z, Xu J (2008) Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci 178(1):21–36

    Article  Google Scholar 

  25. Liu Q, Sung AH, Qiao M (2009) Improved detection and evaluation for JPEG steganalysis. In: Proc ACM multimedia MM, pp 873–876

    Google Scholar 

  26. Liu Q, Sung AH, Qiao M (2011) Neighboring joint density-based JPEG steganalysis. ACM Trans Intell Syst Technol 2(2):article16

    Article  Google Scholar 

  27. Liu Q, Sung AH, Qiao M (2011) A method to detect JPEG-based double compressions. In: Proc ISNN, vol 2, pp 466–476

    Google Scholar 

  28. Lukas J, Fridrich J, GoLjan M (2006) Digital camera identification from sensor noise. IEEE Trans Inf Forensics Secur 1:205–214

    Article  Google Scholar 

  29. Malek H, Ebadzadeh MM, Rahmati M (2012) Three new fuzzy neural networks learning algorithms based on clustering, training error and genetic algorithm. Appl Intell 37(2):280–289

    Article  Google Scholar 

  30. Pevny T, Fridrich J (2008) Detection of double-compression in JPEG images for applications in steganography. IEEE Trans Inf Forensics Secur 3(2):247–258

    Article  Google Scholar 

  31. Sharifi K, Leon-Garcia A (1995) Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video. IEEE Trans Circuits Syst Video Technol 5:52–56

    Article  Google Scholar 

  32. Tsai MJ, Wu GH (2006) Using image features to identify camera sources. In: Proc IEEE ICASSP, 14–19 May 2006

    Google Scholar 

  33. Tsai MJ, Lai CL, Liu J (2007) Camera/mobile phone source identification for digital forensics. In: Proc ICASSP II-221-II-224, 15–20 April 2007

    Google Scholar 

  34. Vinh LT, Lee S, Park Y-T, d’Auriol BJ (2012) A novel feature selection method based on normalized mutual information. Appl Intell 37(1):100–120

    Article  Google Scholar 

Download references

Acknowledgements

This project was supported in part by Award No. 2010-DN-BX-K223 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this publication/program/exhibition are those of the authors and do not necessarily reflect those of the Department of Justice. Partial support from the Research and Sponsored Program at Sam Houston State University under 2011 and 2012 Enhancement Research Grants and from the Institute for Complex Additive Systems Analysis at New Mexico Tech is greatly appreciated. We are also very grateful to Xiaodong Li for his assistance in our study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingzhong Liu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, Q., Cooper, P.A., Chen, L. et al. Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation. Appl Intell 39, 705–726 (2013). https://doi.org/10.1007/s10489-013-0430-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-013-0430-z

Keywords

Navigation