Double JPEG compression detection based on block statistics

被引:14
|
作者
Li, Jixian [1 ]
Lu, Wei [1 ,2 ]
Weng, Jian [3 ]
Mao, Yijun [4 ]
Li, Guoqiang [5 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangdong Key Lab Informat Secur Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Guangdong, Peoples R China
[4] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Guangdong, Peoples R China
[5] Shanghai Jiao Tong Univ, Sch Software, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金;
关键词
Double JPEG compression detection; Block-DCT frequency; Markov transition probability Matrix; STEP;
D O I
10.1007/s11042-018-6175-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel method is proposed to detect the aligned double JPEG compression with different quantization matrix. The proposed method is based on the theory that the correlation among adjacent coefficients of frequency spectrum in DCT blocks is enhanced after DCT transformation, and the correlation among same locations in adjacent DCT blocks is strong. Classification features are divided into two types, the intra-block frequency domain features and the inter-block frequency domain features. The intra-block frequency domain features are used to catch the strong correlation among adjacent coefficients in DCT blocks, and the inter-block frequency domain features are used to catch the correlation among same locations of adjacent DCT blocks. Then the intra-block frequency domain features with inter-block frequency domain features are combined as the classification features. Finally, the classification features are used to train classifiers to detect double JPEG compression. The results of extensive experiments demonstrate the effectiveness of the proposed method.
引用
收藏
页码:31895 / 31910
页数:16
相关论文
共 50 条
  • [1] Double JPEG compression detection based on block statistics
    Jixian Li
    Wei Lu
    Jian Weng
    Yijun Mao
    Guoqiang Li
    [J]. Multimedia Tools and Applications, 2018, 77 : 31895 - 31910
  • [2] Resampling tamper detection based on JPEG double compression
    Zhu, Dan
    Zhou, Zhiping
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 914 - 918
  • [3] Resampling tamper detection based on JPEG double compression
    School of Internet of Things Engineering, Jiangnan University, Wuxi, China
    [J]. J. Inf. Comput. Sci, 1 (281-288): : 281 - 288
  • [4] Block-level double JPEG compression detection for image forgery localization
    Vinay Verma
    Deepak Singh
    Nitin Khanna
    [J]. Multimedia Tools and Applications, 2024, 83 : 9949 - 9971
  • [5] Block-level double JPEG compression detection for image forgery localization
    Verma, Vinay
    Singh, Deepak
    Khanna, Nitin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (04) : 9949 - 9971
  • [6] JPEG Synchronous Double Compression Detection Based on Decompression Module
    Wang, Jin-Wei
    Hu, Bing-Tao
    Zhang, Jia-Wei
    Ma, Bin
    Luo, Xiang-Yang
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (04): : 850 - 859
  • [7] A Machine Learning Based Scheme for Double JPEG Compression Detection
    Chen, Chunhua
    Shi, Yun Q.
    Su, Wei
    [J]. 19TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1-6, 2008, : 1814 - 1817
  • [8] Steganalysis Based on Double JPEG Compression
    Dai, Meng
    Liu, Yunxiang
    [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 3593 - +
  • [9] Steganalysis based on double JPEG compression
    Dai, Meng
    Lin, Jia-Jun
    Mao, Jia-Fa
    [J]. Huadong Ligong Daxue Xuebao /Journal of East China University of Science and Technology, 2007, 33 (05): : 722 - 725
  • [10] Doctored JPEG Image Detection Based On Double Compression Features Analysis
    Zhang Ting
    Wang Rangding
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II, 2009, : 76 - 80