Detecting shifted double JPEG compression tampering utilizing both intra-block and inter-block correlations

  • Yu-jin Zhang (张玉金)
  • Sheng-hong Li (李生红)
  • Shi-lin Wang (王士林)
Article

Abstract

Copy-paste forgery is a very common type of forgery in JPEG images. The tampered patch has always suffered from JPEG compression twice with inconsistent block segmentation. This phenomenon in JPEG image forgeries is called the shifted double JPEG (SDJPEG) compression. Detection of SDJPEG compressed image patches can make crucial contribution to detect and locate the tampered region. However, the existing SDJPEG compression tampering detection methods cannot achieve satisfactory results especially when the tampered region is small. In this paper, an effective SDJPEG compression tampering detection method utilizing both intra-block and inter-block correlations is proposed. Statistical artifacts are left by the SDJPEG compression among the magnitudes of JPEG quantized discrete cosine transform (DCT) coefficients. Firstly, difference 2D arrays, which describe the differences between the magnitudes of neighboring JPEG quantized DCT coefficients on the intrablock and inter-block, are used to enhance the SDJPEG compression artifacts. Then, the thresholding technique is used to deal with these difference 2D arrays for reducing computational cost. After that, co-occurrence matrix is used to model these difference 2D arrays so as to take advantage of second-order statistics. All elements of these co-occurrence matrices are served as features for SDJPEG compression tampering detection. Finally, support vector machine (SVM) classifier is employed to distinguish the SDJPEG compressed image patches from the single JPEG compressed image patches using the developed feature set. Experimental results demonstrate the efficiency of the proposed method.

Key words

passive image forensics copy-paste forgery shifted double JPEG (SDJPEG) compression co-occurrence matrix support vector machine (SVM) 

CLC number

TP 391.4 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Comesaña P, Merhav N, Barni M. Asymptotically optimum universal watermark embedding and detection in the high-SNR regime [J]. IEEE Transactions on Information Theory, 2010, 56(6): 2804–2815.CrossRefGoogle Scholar
  2. [2]
    Farid H. A survey of image forgery detection [J]. IEEE Signal Processing Magazine, 2009, 2: 16–25.CrossRefGoogle Scholar
  3. [3]
    Popescu A C. Statistical tools for digital image forensics [D]. Hanover, USA: Department of Computer Science, Dartmouth College, 2004.Google Scholar
  4. [4]
    Li B, Shi Y Q, Huang J. Detecting doubly compressed JPEG images by using mode based first digit features [C]//IEEE Workshop on Multimedia Signal Processing (MMSP2008). Cairns, Australia: IEEE, 2008: 730–735.Google Scholar
  5. [5]
    Chen C, Shi Y Q, Su W. A machine learning based scheme for double JPEG compression detection [C]//IEEE International Conference on Pattern Recognition (ICPR 2008). Tampa, USA: IEEE, 2008: 1–4.CrossRefGoogle Scholar
  6. [6]
    Luo W, Qu Z, Huang J, et al. A novel method for detecting cropped and recompressed image block [C]//IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP2007). Honolulu, USA: IEEE, 2007: 217–220.Google Scholar
  7. [7]
    Qu Z, Luo W, Huang J. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication [C]//IEEE International Conference on Acoustic, Speech and Signal Processing. Las Vegas, USA: IEEE, 2008: 1661–1664.Google Scholar
  8. [8]
    Wallace G K. The JPEG still picture compression standard [J]. IEEE Transactions on Consumer Electronics, 1992, 38(1): 1–17.CrossRefGoogle Scholar
  9. [9]
    Haralick R M, Shanmugan K, Dinstein I. Textural features for image classification [J]. IEEE Transactions on Systems, Man and Cybernetics, 1973, 3(6): 610–621.CrossRefGoogle Scholar
  10. [10]
    Chen C, Shi Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations [C]//IEEE International Symposium on Circuits and Systems (ISCAS2008). Seatle, USA: IEEE, 2008: 3029–3032.CrossRefGoogle Scholar
  11. [11]
    Huang F, Li B, Huang J. Universal JPEG steganalysis based on microscopic and macroscopic calibration [C]//IEEE International Conference on Image Processing (ICIP2008). San Diego, USA: IEEE, 2008: 2068–2071.CrossRefGoogle Scholar
  12. [12]
    Chang C C, Lin C J. LIBSVM: A library for support vector machines [EB/OL]. (2011-10-12). http://www.csie.ntu.edu.tw/cjlin/libsvm.
  13. [13]
    Sallee P. Matlab JPEG toolbox [DB/OL]. (2011-10-12). http://www.philsallee.com/jpegtbx/index.html.
  14. [14]
    Schaefer G, Stich M. UCID: An uncompressed color image database [J]. Proc SPIE, 2004, 5307: 472–480.CrossRefGoogle Scholar

Copyright information

© Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Yu-jin Zhang (张玉金)
    • 1
  • Sheng-hong Li (李生红)
    • 1
  • Shi-lin Wang (王士林)
    • 2
  1. 1.Department of Electronic EngineeringShanghai Jiaotong UniversityShanghaiChina
  2. 2.School of Information Security EngineeringShanghai Jiaotong UniversityShanghaiChina

Personalised recommendations