Abstract
Double JPEG compression detection plays an important role in digital image forensics. Recently, Huang et al. (IEEE Trans Inf Forensics Security 5(4):848–856, 2010) first pointed out that the number of different discrete cosine transform (DCT) coefficients would monotonically decrease when repeatedly compressing a JPEG image with the same quantization matrix, and a strategy based on random permutation was developed to expose such an operation successfully. In this paper, we propose an anti-forensic method to fool this method. The proposed method tries to slightly modify the DCT coefficients for confusing the traces introduced by double JPEG compression with the same quantization matrix. By investigating the relationship between the DCT coefficients of the first compression and those of the second one, we determine the quantity of modification by constructing a linear model. Furthermore, in order to improve the security of anti-forensics, the locations of modification are adaptively selected according to the complexity of the image texture. The extensive experiments evaluated on 10,000 natural images have shown that the proposed method can effectively confuse the detector proposed in Huang et al. (IEEE Trans Inf Forensics Security 5(4):848–856, 2010), while keeping higher visual quality and leaving fewer other detectable statistical artifacts.
Similar content being viewed by others
References
Bas P, Filler T, Pevný T (2011) Break our steganographic system: the ins and outs of organizing boss.In: Information hiding. Lecture notes in computer science, vol 6958, pp 59–70
Chen C, Shi Y (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceeding of IEEE international symposium circuits and systems, pp 3029–3032
Fan W, Wang K, Cayre F, Xiong Z (2013) A variational approach to JPEG anti-forensics.In: Proceeding of IEEE international conference on acoustics speech and signal processing, pp 3058–3062
Fan Z, de Queiroz R (2003) Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process 12(2):230–235
Farid H (2009) Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forensics Security 4(1):154–160
Feng C, Xu Z, Zheng X (2012) An anti-forensic algorithm of JPEG double compression based forgery detection.In: Proceeding of 4th international symposium on information science and engineering, pp 159–164
Gonzalez RC, Woods RE (2008) Digital image processing, 3rd edn. Prentice Hall
Huang F, Huang J, Shi YQ (2010) Detecting double JPEG compression with the same quantization matrix. IEEE Trans Inf Forensics Security 5(4):848–856
Huang F, Luo W, Huang J (2011) Steganalysis of JPEG steganography with complementary embedding strategy. IET Inf Secur 5(1):10–18
Kodovský J, Fridrich J (2009) Calibration revisited.In: Proceeding of 11th ACM workshop on multimedia and security. New York, NY, pp 63–74
Li B, Shi Y, Huang J (2008) Detecting doubly compressed JPEG images by using mode based first digit features.In: Proceeding of IEEE international workshop on multimedia signal processing, pp 730–735
Li H, Luo W, Huang J (2012) Countering anti-JPEG compression forensics.In: Proceeding of IEEE international conference on image processing, pp 241–244
Lukáš J, Fridrich J (2003) Estimation of primary quantization matrix in double compressed JPEG images.In: Proceeding of digital forensic research workshop, pp 5–8
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited.IEEE Trans Inf Forensics Security 5(2):201–214
Luo W, Huang F, Huang J (2011) A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools Appl 52(2–3):407–430
Luo W, Huang J, Qiu G (2010) JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forensics Security 5(3):480–491
Luo W, Qu Z, Huang J, Qiu G (2007) A novel method for detecting cropped and recompressed image block.In: Proceeding of IEEE international conference on acoustics, speech and signal processing, vol 2, pp 217–220
Milani S, Tagliasacchi M, Tubaro S (2013) Antiforensics attacks to benford’s law for the detection of double compressed images.In: Proceeding of IEEE international conference on acoustics speech and signal processing, pp 3053–3057
Pasquini C, Boato G (2013) JPEG compression anti-forensics based on first significant digit distribution.In: Proceeding of IEEE international workshop on multimedia signal processing, pp 500–505
Qian Z, Qiao T (2013) Simplified anti-forensics of JPEG compression. J Comput 8(10):2483–2488
Software: Statistical pattern recognition toolbox (2011). http://cmp.felk.cvut.cz/cmp/software/stprtool/
Stamm M, Liu K (2011) Anti-forensics of digital image compression. IEEE Trans Inf Forensics Security 6(3):1050–1065
Sutthiwan P, Shi YQ (2012) Anti-forensics of double JPEG compression detectionIn: Proceeding of 10th international workshop on digital-forensics and watermarking, vol 7128, pp 411–424
Valenzise G, Tagliasacchi M, Tubaro S (2013) Revealing the traces of JPEG compression anti-forensics. IEEE Trans Inf Forensics Security 8(2):335–349
Acknowledgements
This work is supported in part by National Science & Technology Pillar Program (No:2012BAK16B06), NSFC (U1135001, 61332012, 61272191), the funding of Zhujiang Science and Technology (2011J2200091) and the Guangdong NSF (S2013010012039). The authors would like to thank the reviewers for their valuable comments.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, H., Luo, W. & Huang, J. Anti-forensics of double JPEG compression with the same quantization matrix. Multimed Tools Appl 74, 6729–6744 (2015). https://doi.org/10.1007/s11042-014-1927-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-1927-0