Abstract
The current double JPEG compression detection techniques identify whether or not an JPEG image file has undergone the compression twice, by knowing its embedded quantization table. This paper addresses another forensic scenario in which the quantization table of a JPEG file is not explicitly or reliably known, which may compel the forensic analyst to blindly reveal the recompression clues. To do this, we first statistically analyze the theory behind quantized alternating current (AC) modes in JPEG compression and show that the number of quantized AC modes required to detect double compression is a function of both the image’s block texture and the compression’s quality level in a fresh formulation. Consequently, a new double compression detection algorithm is proposed that exploits footprints introduced by all non-zero and zero AC modes based on Benford’s law in a low-dimensional representation via PCA. Then, some evaluation frameworks are constructed to assess the robustness and generalization of the proposed method on various textured images belonging to three standard databases as well as different compression quality level settings. The average \(F_{1}\text {-measure}\) score on all tested databases in the proposed method is about 74 % much better than the state-of-the-art performance of 67.7 %. The proposed algorithm is also applicable to detect double compression from a JPEG file and localize tampered regions in actual image forgery scenarios. An implementation of our algorithms and used databases are available upon request to fellow researchers.
Similar content being viewed by others
Notes
RCID database is publicly available to fellow academic researchers. To access it, please contact behrad@shahed.ac.ir.
References
Berger, A., Hill, T.P.: A basic theory of Benford’s law. Probab. Surv. 8, 1–126 (2011)
Bianchi, T., Piva, A.: Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf. Forensics Secur. 7(2), 842–848 (2012)
Bianchi, T., Piva, A.: Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Forensics Secur. 7(3), 1003–1017 (2012)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27 (2011)
Chen, C., Shi, Y.Q., Su, W.: A machine learning based scheme for double JPEG compression detection. In: IEEE 19th international conference on pattern recognition (ICPR), pp. 1–4 (2008)
Dong, L., Kong, X., Wang, B., You, X.: Double compression detection based on Markov model of the first digits of DCT coefficients. In: IEEE 6th international conference on image and graphics (ICIG), pp. 234–237 (2011)
Fan, Z., de Queiroz, R.L.: Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans. Image Process. 12(2), 230–235 (2003)
Farid, H.: Digital image ballistics from JPEG quantization. Technical Report TR2006-583, Department of Computer Science, Dartmouth College (2006)
Farid, H.: Exposing digital forgeries from JPEG ghosts. IEEE Trans. Inform. Forensics. Secur. 4(1), 154–160 (2009)
Farid, H.: Image forgery detection. IEEE Signal Process. Mag. 26(2), 16–25 (2009)
Haralick, R.M., Shanmugam, K., Dinstein, I.H.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. SMC–3(6), 610–621 (1973)
Hasimoto-Beltrán, R., Baqai, S., Khokhar, A.: Transform domain inter-block interleaving schemes for robust image and video transmission in ATM networks. J. Vis. Commun. Image Represent. 15(4), 522–547 (2004)
He, H., Garcia, E.A.: Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21(9), 1263–1284 (2009)
Huang, F., Huang, J., Shi, Y.Q.: Detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inform. Forensics Secur. 5(4), 848–856 (2010)
Jain, R., Kasturi, R., Schunck, B.G.: Machine Vision. McGraw-Hill, Inc., New York (1995)
Jolliffe, I.T.: Principal Component Analysis, 2nd edn. Springer Series in Statistics, Springer (2002)
Kornblum, J.D.: Using JPEG quantization tables to identify imagery processed by software. The 8th digital forensic research workshop. Digit. Investig. 5, S21–S25 (2008)
Lai, S., Böhme, R.: Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In: IEEE 38th international conference on acoustics, speech and signal processing (ICASSP), pp. 3028–3032. IEEE (2013)
Li, B., Ng, T.T., Li, X., Tan, S., Huang, J.: Revealing the trace of high-quality JPEG compression through quantization noise analysis. IEEE Trans. Inf. Forensics Secur. 10(3), 558–573 (2015)
Li, B., Shi, Y.Q., Huang, J.: Detecting doubly compressed JPEG images by using mode based first digit features. In: IEEE 10th workshop on multimedia signal processing, pp. 730–735 (2008)
Lin, X.H., Zhao, Y.Q., Huang, J.: Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP J. Adv. Signal. Process. 2012, 1–10 (2012)
Lin, Z., He, J., Tang, X., Tang, C.K.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit. 42(11), 2492–2501 (2009)
Liu, Q., Sung, A.H., Qiao, M.: A method to detect JPEG-based double compression. In: The 8th international conference on advances in neural networks, lecture notes in computer science, Part II, pp. 466–476 (2011)
Liu, Q., Sung, A.H., Qiao, M.: Neighboring joint density-based JPEG steganalysis. ACM Trans. Intell. Syst. Technol. 2(2), 16 (2011)
Luo, W., Huang, J., Qiu, G.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3), 480–491 (2010)
Mahdian, B., Saic, S.: Detecting double compressed JPEG images. In: IEEE 3rd international conference on crime detection and prevention, pp. 1–6 (2009)
Milani, S., Tagliasacchi, M., Tubaro, S.: Discriminating multiple JPEG compression using first digit features. In: IEEE 37th international conference on acoustics, speech and signal processing (ICASSP), pp. 2253–2256 (2012)
Narayanan, G., Shi, Y.Q.: A statistical model for quantized AC block DCT coefficients in JPEG compression and its application to detecting potential compression history in bitmap images. In: The 9th international workshop on digital watermarking, lecture notes in computer science, vol. 6526, pp. 75–89 (2011)
Olmos, A., Kingdom, F.A.A.: A biologically inspired algorithm for the recovery of shading and reflectance images. Perception 33(12), 1463–1473 (2004)
Pérez-González, F., Heileman, G.L., Abdallah, C.T.: Benford’s law in image processing. In: IEEE international conference on image processing (ICIP), vol. 1, pp. I-405–I-408 (2007)
Pevný, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forensics Secur. 3(2), 247–258 (2008)
Piva, A.: An overview on image forensics. ISRN Signal Processing p. article ID 496701 (2013)
Popescu, A.C., Farid, H.: Statistical Tools for Digital Forensics. In: The 6th international workshop on information hiding, lecture notes in computer science, vol. 3200, pp. 128–147 (2005)
Schaefer, G., Stich, M.: UCID: an uncompressed color image database. Storage Retr. Methods Appl. Multimed. 5307, 472–480 (2004)
Sencar, H.T., Memon, N.: Identification and recovery of JPEG files with missing fragments. Digit. Investig. 6, S88–S98 (2009)
Taimori, A., Razzazi, F., Behrad, A., Ahmadi, A., Babaie-Zadeh, M.: A proper transform for satisfying Benford’s law and its application to double JPEG image forensics. In: IEEE international symposium on signal processing and information technology (ISSPIT), pp. 000240–000244 (2012)
Wallace, G.K.: The JPEG still picture compression standard. IEEE Trans. Consum. Electronics 38(1), 30–44 (1992)
Zach, F., Riess, C., Angelopoulou, E.: Automated image forgery detection through classification of JPEG ghosts. In: Proceedings of joint 34th DAGM and 36th OAGM symposium, lecture notes in computer science, vol. 7476, pp. 185–194 (2012)
Acknowledgments
The authors would like to thank S. Sabouri for her valuable comments which help us to improve the quality of this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Taimori, A., Razzazi, F., Behrad, A. et al. Quantization-Unaware Double JPEG Compression Detection. J Math Imaging Vis 54, 269–286 (2016). https://doi.org/10.1007/s10851-015-0602-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10851-015-0602-z