Abstract
Since image processing software is widely used to tamper or embed data into JPEG images, the forensics of tampered JPEG images now plays a considerable important role. However, most existing forensics methods that use binary classification can hardly deal with multiclass image forensics problems properly under network environments. In this paper, we propose a hierarchical forensics scheme against multiple heterogeneous JPEG images. We introduce a compression identifier based on Markov model of DCT coefficients as the first hierarchical section and then develop a tampering detection and steganalyzer separately as the second phase. We conduct a series of experiments to testify the validity of the proposed method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alessandro P (2013) An overview on image forensics. ISRN Sig Proc
Farid H (2009) Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forensics Secur 4(1):154–160
Pevny T, Fridrich J (2008) Detection of double-compression in JPEG images for applications in steganography. IEEE Trans Inf Forensics Secur 3(2):247–258
Huang FJ, Huang JW, Shi YQ (2010) Detecting double JPEG compression with the same quantization matrix. IEEE Trans Inf Forensics Secur 5(4):848–856
Feng XY, Doerr G (2010) JPEG recompression detection. Proc SPIE 7541:75410J
Chen CH, Shi YQ, Su W (2008) A machine learning based scheme for double JPEG compression detection,” In: 19th international conference on pattern recognition, pp 1–4
Pevný T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings SPIE security, steganography, and watermarking of multimedia contents, San Jose, CA, vol 6505, pp 1–13
Fridrich J (2005) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich J (ed) Information hiding, 6th international workshop, volume 3200 of lecture notes in computer science, pp 67–81
Fu D, Shi YQ, Su W (2007) A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In: Proceedings of SPIE conference on electronic imaging, security and watermarking of multimedia contents, San Jose, USA
Li B, Shi YQ, Huang JW (2008) Detecting doubly compressed JPEG images by using mode based first digit features. In: IEEE international workshop on multimedia signal processing, pp 730–735
Chang CC, Lin CJ (2001) LIBSVM: a library for support vector machines, 2001. http://www.csie.ntu.edu.tw/~cjlin/libsvm
Provos N (2001) Defending against statistical steganalysis. In: 10th USENIX security symposium, Washington, D.C., pp 323–336
Westfeld A (2001) F5-a steganographic algorithm: high capacity despite better steganalysis. In: Proceedings of international workshop information hiding (IWIH), Pittsburgh, PA, pp 289–302
Chen YL, Hsu CT (2011) Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans Inf Forensics Secur 6(2):396–406
Holub V, Fridrich J (2014) Low complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–28
Acknowledgments
The work is supported by the Foundation for Innovative Research Groups of the NSFC(Grant No. 71421001), NSFC (Grant No. 61172109).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kong, X., Wang, B., Yang, M., Feng, Y. (2016). Multiple Heterogeneous JPEG Image Hierarchical Forensic. In: Park, J., Jin, H., Jeong, YS., Khan, M. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 393. Springer, Singapore. https://doi.org/10.1007/978-981-10-1536-6_66
Download citation
DOI: https://doi.org/10.1007/978-981-10-1536-6_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1535-9
Online ISBN: 978-981-10-1536-6
eBook Packages: Computer ScienceComputer Science (R0)