skip to main content
10.1145/2093698.2093874acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisabelConference Proceedingsconference-collections
research-article

Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment

Published: 26 October 2011 Publication History

Abstract

In this paper we analyze the synergy between forensic image head data consistency analysis and detection of doubles JPEG compression artifacts. We show that image head consistency testing is an effective method for detecting digital images that have been modified. On the other hand, when it is not combined with other forensic methods such as double JPEG detection, a high number of altered photos remained undetected. The same can also be claimed about double JPEG detection. When employed separately without conjunction with other methods, the majority of altered photos remained undetected. In this paper, a quantitative study on this topic is carried out. We show that combining various image forensic methods is a must.

References

[1]
B. Mahdian and S. Saic, "A bibliography on blind methods for identifying image forgery," Image Commun., vol. 25, no. 6, pp. 389--399, 2010.
[2]
H. T. Sencar, M. Ramkumar, and A. N. Akansu, Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia. Orlando, FL, USA: Academic Press, Inc., 2004.
[3]
M. Wu and B. Liu, Multimedia Data Hiding. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2002.
[4]
M. Schneider and S. F. Chang, "A robust content based digital signature for image authentication," in IEEE International Conference on Image Processing (ICIP'96), 1996. {Online}. Available: citeseer.ist.psu.edu/schneider96robust.html
[5]
C.-H. Tzeng and W.-H. Tsai, "A new technique for authentication of image/video for multimedia applications," in Proceedings of the 2001 workshop on Multimedia and security. New York, NY, USA: ACM Press, 2001, pp. 23--26.
[6]
M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection. Norwood, MA, USA: Artech House, Inc., 2003.
[7]
N. Nikolaidis and I. Pitas, "Robust image watermarking in the spatial domain," Signal Processing, vol. 66, no. 3, pp. 385--403, May 1998.
[8]
J. Fridrich and T. Pevny, "Detection of double--compression for applications in steganography," IEEE Transactions on Information Security and Forensics, vol. 3, no. 2, pp. 247--258, June 2008.
[9]
B. Mahdian and S. Saic, "Detecting double compressed jpeg images," in The 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP-09), London, UK, December 2009.
[10]
Y.-L. Chen and C.-T. Hsu, "Detecting doubly compressed images based on quantization noise model and image restoration," in IEEE Workshop on Multimedia Signal Processing, 2009.
[11]
Z. Fan and R. L. de Queiroz, "Identification of bitmap compression history: Jpeg detection and quantizer estimation," IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 230--235, 2003.
[12]
H. Farid, "Exposing digital forgeries from jpeg ghosts," IEEE Transactions on Information Forensics and Security, vol. 1, no. 4, pp. 154--160, 2009.
[13]
X. Feng and G. Doerr, "Jpeg recompression detection," in SPIE Conference on Media Forensics and Security, 2010.
[14]
J. Fridrich and J. Lukas, "Estimation of primary quantization matrix in double compressed jpeg images," in Proceedings of DFRWS, vol. 2, Cleveland, OH, USA, August 2003.
[15]
D. Fu, Y. Q. Shi, and W. Su, "A generalized benford's law for jpeg coefficients and its applications in image forensics," in SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, January 2007.
[16]
W. Luo, Z. Qu, J. Huang, and G. Qiu, "A novel method for detecting cropped and recompressed image block," in IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, Honolulu, HI, USA, April 2007, pp. 217--220.
[17]
R. Neelamani, R. L. de Queiroz, Z. Fan, S. Dash, and R. G. Baraniuk, "Jpeg compression history estimation for color images," IEEE Transactions on Image Processing, vol. 15, no. 6, pp. 1365--1378, 2006.
[18]
A. C. Popescu, "Statistical tools for digital image forensics," Ph.D. dissertation, Ph.D. dissertation. Department of Computer Science, Dartmouth College, Hanover, NH, 2005. {Online}. Available: www.cs.dartmouth.edu/farid/publications/apthesis05.html
[19]
Z. Qu, W. Luo, and J. Huang, "A convolutive mixing model for shifted double jpeg compression with application to passive image authentication," in IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, USA, April 2008, pp. 4244--1483.

Cited By

View all
  • (2020)Authentication and Tamper Localization of scanned Bill and Seal based on Block CorrelationProceedings of the 2020 2nd International Conference on Information Technology and Computer Communications10.1145/3417473.3417476(55-58)Online publication date: 12-Aug-2020
  • (2019)A Modern Approach for Image Forgery Detection using BRICH Clustering based on Normalised Mean and Standard Deviation2019 International Conference on Communication and Signal Processing (ICCSP)10.1109/ICCSP.2019.8697951(0441-0444)Online publication date: Apr-2019

Index Terms

  1. Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ISABEL '11: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
    October 2011
    949 pages
    ISBN:9781450309134
    DOI:10.1145/2093698
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Universitat Pompeu Fabra
    • IEEE
    • Technical University of Catalonia Spain: Technical University of Catalonia (UPC), Spain
    • River Publishers: River Publishers
    • CTTC: Technological Center for Telecommunications of Catalonia
    • CTIF: Kyranova Ltd, Center for TeleInFrastruktur

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 October 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. EXIF analysis
    2. JPEG forensics
    3. digital forensics
    4. double JPEG
    5. image retrieval
    6. tampering detection

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ISABEL '11
    Sponsor:
    • Technical University of Catalonia Spain
    • River Publishers
    • CTTC
    • CTIF

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Authentication and Tamper Localization of scanned Bill and Seal based on Block CorrelationProceedings of the 2020 2nd International Conference on Information Technology and Computer Communications10.1145/3417473.3417476(55-58)Online publication date: 12-Aug-2020
    • (2019)A Modern Approach for Image Forgery Detection using BRICH Clustering based on Normalised Mean and Standard Deviation2019 International Conference on Communication and Signal Processing (ICCSP)10.1109/ICCSP.2019.8697951(0441-0444)Online publication date: Apr-2019

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media