Skip to main content
Log in

Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Due to the widespread use of the JPEG format, non-aligned double JPEG (NA-DJPEG) compression is very common in image tampering. Therefore, non-aligned double JPEG compression detection has attracted significant attention in digital forensics in recent years. In most of the previous detection algorithms, grayscale images are used directly, or color images are first converted into grayscale images and then processed. However, it is worth noting that most tampered images are color images. To make full use of the color information in images, a detection algorithm, which uses color images directly, is put forward in this paper. The algorithm based on refined Markov in quaternion discrete cosine transform (QDCT) domain is proposed for NA-DJPEG compression detection. Firstly, color information of a given JPEG image is extracted from blocked images to construct quaternion, and then block image QDCT coefficient matrices, including amplitude and three angles (\(\psi \), \(\phi \), and \(\theta \)) can be obtained. Secondly, the refined Markov features are generated from the transition probability matrix in the corresponding refinement process. Our proposed refinement method not only reduces redundant features but also makes the acquired features more efficient in detection. Therefore, the refined Markov features can not only capture the intra-block correlation between block QDCT coefficients but also improve computing efficiency in real-time. Finally, support vector machine (SVM) method is employed for NA-DJPEG compression detection. The experiment results demonstrate that the proposed algorithm not only make use of color information of images, but also can achieve better detection performance with small size images (i.e., \(64 \times 64\)) outperforming state-of-the-art detection methods tested on the same dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Rocha, A., Scheirer, W., Boult, T., Goldenstein, S.: Vision of the unseen: Current trends and challenges in digital image and video forensics. ACM Comput. Surv. 1–42 (2011)

    Article  Google Scholar 

  2. Piva, A.: An overview on image forensics. ISRN Signal Processing 2013. 22 (2013)

  3. Qi, L., Wang, R., Li, S., He, Q., Xu, X., Hu, C.: Time-aware distributed service recommendation with privacy-preservation. Inf. Sci. 480, 354–364 (2019)

    Article  Google Scholar 

  4. Qi, L., Zhang, X., Dou, W., Hu, C., Yang, C., Chen, J.: A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Future Gen. Comput. Syst. 88, 636–643 (2018)

    Article  Google Scholar 

  5. Zhou, Z., Jonathan Wu, Q.M., Sun, X.: Multiple distances-based coding: toward scalable feature matching for large-scale web image search. IEEE Trans. Big Data. (2019). https://doi.org/10.1109/TBDATA.2019.2919570

  6. Zhou, Z., Mu, Y., Jonathan Wu, Q.M.: Coverless image steganography using partial-duplicate image rretrieval. Soft Comput. 23(13), 4927–4938 (2019)

    Article  Google Scholar 

  7. Jiang, X., He, P., Sun, T., Wang, R.: Detection of double compressed HEVC videos using GOP-Based PU type statistics. IEEE Access 7, 95364–95375 (2019)

    Article  Google Scholar 

  8. He, P., Li, H., Wang, H.: Detection of fake images via the ensemble of deep representations from multi color spaces. 2019 IEEE International Conference on Image Processing (ICIP). https://doi.org/10.1109/ICIP.2019.8803740

  9. Wang, J., Li, T., Shi, Y.Q., Lian, S., Ye, J.: Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimedia Tools Appl. 76(22), 23721–23737 (2017)

    Article  Google Scholar 

  10. Ma, Y., Luo, X., Li, X., Bao, Z., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set positive region reduction. IEEE Trans. Circuits Syst. Video Technol. 11(2), 99–102 (2018)

    Google Scholar 

  11. Zhang, Y., Qin, C., Zhang, W., Liu, F., Luo, X.: On the fault-tolerant per-formances for a class of roubust image steganography. IEEE Trans. Signal Process. 146(3), 1–132 (2018)

    Google Scholar 

  12. Pevny, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forensics Secur. (TIFS). 3, 247–258 (2008)

    Article  Google Scholar 

  13. Wang, J., Wang, H., Li, J., Luo, X., Shi, Y. Q., Jha, S. K.: Detecting double jpeg compressed color images with the same quantization matrix in spherical coordinates. IEEE Trans. Circuits Syst. Video Technol. https://doi.org/10.1109/TCSVT.2019.2922309

  14. Wallace, G.K.: The JPEG still picture compression standard. Commun. ACM. 34(4), 30–44 (1991)

    Article  Google Scholar 

  15. Li, B., Shi, Y., Huang, J.: Detecting doubly compressed JPEG images by using mode based first digit features. In: IEEE workshop on multimedia signal processing (MMSP) (2008)

  16. Korus, P., Huang, J.: Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans. Image Process. 25(3), 1312–1326 (2016)

    Article  MathSciNet  Google Scholar 

  17. Taimori, A., Razzazi, F., Behrad, A., Ahmadi, A., Babaie-Zadeh, M.: Quantization-unaware double jpeg compression detection. J. Math. Imaging Vis. 54(3), 269–286 (2016)

    Article  MathSciNet  Google Scholar 

  18. Pasquini, C., Boato, G., Perez-Gonzalez, F.: Multiple jpeg compression detection by means of benford-fourier coefficients. In: Information Forensics and Security (WIFS), 2014 IEEE International Workshop on IEEE, pp. 113–118 (2014)

  19. Pasquini, C., Schöttle, P., Böhme, R., Boato, G., Pèrez-Gonzàlez, F.: Forensics of high quality and nearly identical jpeg image recompression. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, ACM, 11–21 (2016)

  20. Yang, J., Xie, J., Zhu, G., Kwong, S., Shi, Y.Q.: An effective method for detecting double jpeg compression with the same quantization matrix. IEEE Trans. Inf. Forensics Secur. 9(11), 1933–1942 (2014)

    Article  Google Scholar 

  21. Lin, Z., He, J., Tang, X., Tang, C.-K.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit. 42(11), 2492–2501 (2009)

    Article  Google Scholar 

  22. Bianchi, T., De Rosa, A., Piva, A.: Improved DCT coefficient analysis for forgery localization in JPEG images. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2011)

  23. Chen, Y.-L., Hsu, C.-T.: Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans. Inf. Forensics Secur. 6(2), 396–406 (2011)

    Article  Google Scholar 

  24. Bianchi, T., Piva, A.: Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf. Forensics Secur. 7(2), 842–848 (2012)

    Article  Google Scholar 

  25. Bianchi, T., Piva, A.: Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans. Inf. Forensics Secur. 7(3), 1003–1017 (2012)

    Article  Google Scholar 

  26. Yang, J., Zhu, G., Wang, J., Shi, Y.Q.: Detecting non-aligned double JPEG compression based on refined intensity difference and calibration. IWDW 2013(8389), 167–179 (2014)

    Google Scholar 

  27. Barni, M., Bondi, L., Bonettini, N., Bestagini, P., Costanzo, A., Maggini, M., Tondi, B., Tubaro, S.: Aligned and non-aligned double JPEG detection using convolutional neural networks. J. Vis. Commun. Image Represent. 49, 153–163 (2017)

    Article  Google Scholar 

  28. Leon-Garcia, A.: Probability and Random Processes for Electrical Engineering, 2nd Edition, Addison-Wesley Publishing Company. 33(3), 372-373 (1994)

  29. Wei, Feng, Bo, Hu: Quaternion discrete cosine transform and its application in color template matching. IEEE Congr. Image Signal Process. 5(2), 252–256 (2008)

    Google Scholar 

  30. Schaefer, G., Stich, M.: UCID—an uncompressed colour image database. Proc. SPIE. Speech, Signal Process. 5307, 472–480 (2004)

    Google Scholar 

  31. Chang, C.-C., Lin, C.-J.: Libsvm: a library for support vector machines. ACM Trans. Intelligent Systems and Technology (TIST) (2011)

Download references

Acknowledgements

This work was supported in part by the Natural Science Foundation of China under Grants (Nos. 61702235, 61772281, U1636117, U1636219, 61502241, 61272421, 61232016, 61402235, 61572258 and 61702235), in part by the National Key R&D Program of China (Grant No. 2016YFB0801303 and 2016QY01W0105), in part by the plan for Scientific Talent of Henan Province (Grant No. 2018J R0018), in part by the Natural Science Foundation of Jiangsu Province, China under Grant BK20141006, and the PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, J., Huang, W., Luo, X. et al. Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain. J Real-Time Image Proc 17, 7–16 (2020). https://doi.org/10.1007/s11554-019-00929-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-019-00929-z

Keywords

Navigation