Skip to main content

Double JPEG Compression Detection Based on Fusion Features

  • Conference paper
  • First Online:
Machine Learning and Intelligent Communications (MLICOM 2017)

Abstract

Detection of double JPEG compression plays an increasingly important role in image forensics. This paper mainly focuses on the situation where the images are aligned double JPEG compressed with two different quantization tables. We propose a new detection method based on the fusion features of Benford features and likelihood probability ratio features in this paper. We believe that with the help of likelihood probability ratio features, our fusion features can expose more artifacts left by double JPEG compression, which lead to a better performance. Comparative experiments have been carried out in our paper, and experimental result shows our method outperforms the baseline methods, even when one of the quality factors is pretty high.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fu, D., Shi, Y.Q., Su, W.: A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In: Security, Steganography, and Watermarking of Multimedia Contents IX, pp. 65051L–65051L-11. SPIE, San Jose (2007)

    Google Scholar 

  2. Li, B., Shi, Y.Q., Huang, J.: Detecting doubly compressed JPEG images by using mode based first digit features. In: 10th Workshop on Multimedia Signal Processing, pp. 730–735. IEEE Press, New York (2008)

    Google Scholar 

  3. Feng, X., Doerr, G.: JPEG recompression detection. In: Media Forensics and Security II, pp. 75410J–75410J-12. SPIE, San Jose (2010)

    Google Scholar 

  4. Popescu, A.C., Farid, H.: Statistical tools for digital forensics. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 128–147. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30114-1_10

    Chapter  Google Scholar 

  5. Popescu, A.C.: Statistical tools for digital image forensics. Ph.D. theses, Department of Computer Science, Dartmouth College, NH (2004)

    Google Scholar 

  6. Prasad S., Ramakrishnan K.R.: On resampling detection and its application to detect image tampering. In: International Conference on Multimedia and Expo, pp. 1325–1328. IEEE Press, New York (2006)

    Google Scholar 

  7. Lukáŝ, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Digital Forensic Research Workshop, pp. 5–8, Cleveland (2003)

    Google Scholar 

  8. Chen, C., Shi, Y.Q., Su, W.: A machine learning based scheme for double JPEG compression detection. In: 19th International Conference on Pattern Recognition, pp. 1–4. IEEE Press, New York (2008)

    Google Scholar 

  9. Shang, S., Zhao, Y., Ni, R.: Double JPEG detection using high order statistic features. In: International Conference on Digital Signal Processing, pp. 550–554. IEEE Press, New York (2016)

    Google Scholar 

  10. Huang, F., Huang, J., Shi, Y.Q.: Detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Forens. Secur. 5(4), 848–856 (2010)

    Article  Google Scholar 

  11. Amerini, I., Becarelli, R., Caldelli, R., Andrea, D.M.: Splicing forgeries localization through the use of first digit features. In: International Workshop on Information Forensics and Security, pp. 143–148. IEEE Press, New York (2014)

    Google Scholar 

  12. Bianchi, T., Piva, A.: Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Forens. Secur. 7(3), 1003–1017 (2012)

    Article  Google Scholar 

  13. Bas, P., Filler, T., Pevný, T.: “Break our Steganographic System”: the Ins and Outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5

    Chapter  Google Scholar 

  14. Dong, L., Kong, X., Wang, B., You, X.: Double compression detection based on Markov model of the first digits of DCT coefficients. In: 6th International Conference on Image and Graphics, pp. 234–237. IEEE Press, New York (2011)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Science Foundation of China (No. 61502076) and the Scientific Research Project of Liaoning Provincial Education Department (No. L2015114).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, F., Li, Y., Chong, K., Wang, B. (2018). Double JPEG Compression Detection Based on Fusion Features. In: Gu, X., Liu, G., Li, B. (eds) Machine Learning and Intelligent Communications. MLICOM 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 226. Springer, Cham. https://doi.org/10.1007/978-3-319-73564-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73564-1_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73563-4

  • Online ISBN: 978-3-319-73564-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics