An effective histogram-based approach to JPEG-100 forensics

被引:0
|
作者
Anh Thu Phan Ho [1 ]
Wang, Kai
Cayre, Francois
机构
[1] Univ Grenoble Alpes, GIPSA Lab, F-38000 Grenoble, France
关键词
JPEG-100; forensics; DCT histogram; generalized Gaussian distribution; histogram fitting; COMPRESSION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes an improved histogram-based approach to identifying whether an image is never compressed or has undergone JPEG compression with quality factor 100. The key idea is that the image's DCT (Discrete Cosine Transform) coefficients follow either of two families of parametric distributions, corresponding respectively to never compressed images and JPEG-100 compressed ones. This paper highlights that choosing the generalized Gaussian distribution (GGD) to model the DCT coefficients and constructing a DCT histogram with precision higher than integer create a prominent distinction between the DCT coefficients distribution of the two kinds of images. Experiments demonstrate that the proposed approach significantly outperforms existing histogram-based methods for the task of JPEG-100 forensics.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] OPTIMAL COUNTERFORENSICS FOR HISTOGRAM-BASED FORENSICS
    Comesana-Alfaro, Pedro
    Perez-Gonzalez, Fernando
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 3048 - 3052
  • [2] HISTOGRAM-BASED RETRIEVAL FOR ENCRYPTED JPEG IMAGES
    Zhang, Xinpeng
    Cheng, Hang
    [J]. 2014 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (CHINASIP), 2014, : 446 - 449
  • [3] A Universal Attack Against Histogram-Based Image Forensics
    Barni, Mauro
    Fontani, Marco
    Tondi, Benedetta
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2013, 5 (03) : 35 - 52
  • [4] Histogram-based Reversible Hiding for JPEG Compressed Images
    Chuang, Jun-Chou
    Cai, Yi-Fang
    Lin, Pei-Yu
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING (ITME 2014), 2014, : 85 - 89
  • [5] BLOCK CONVERGENCE IN REPEATED TRANSFORM CODING: JPEG-100 FORENSICS, CARBON DATING, AND TAMPER DETECTION
    Lai, ShiYue
    Boehme, Rainer
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 3028 - 3032
  • [6] AC-coefficient histogram-based retrieval for encrypted JPEG images
    Cheng, Hang
    Zhang, Xinpeng
    Yu, Jiang
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13791 - 13803
  • [7] AC-coefficient histogram-based retrieval for encrypted JPEG images
    Hang Cheng
    Xinpeng Zhang
    Jiang Yu
    [J]. Multimedia Tools and Applications, 2016, 75 : 13791 - 13803
  • [8] Histogram-Based Approach for Mass Segmentation in Mammograms
    Suhail, Zobia
    Zwiggelaar, Reyer
    [J]. 15TH INTERNATIONAL WORKSHOP ON BREAST IMAGING (IWBI2020), 2020, 11513
  • [9] Generalised category attack - Improving histogram-based attack on JPEG LSB embedding
    Lee, Kwangsoo
    Westfeld, Andreas
    Lee, Sangjin
    [J]. INFORMATION HIDING, 2007, 4567 : 378 - +
  • [10] CETLH: A NEW HISTOGRAM-BASED CARDINALITY ESTIMATE APPROACH
    Lin, Xudong
    Zeng, Xiaoning
    Pu, Xiaowei
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2015, 11 (01): : 123 - 135