Crop Detection through Blocking Artefacts Analysis

  • A. R. Bruna
  • G. Messina
  • S. Battiato
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6978)


In this paper we propose a new method to detect cropped images by analyzing the blocking artefacts produced by a previous block based compression techniques such as JPEG and MPEG family that are the most used compression standards for still images and video sequences. It is useful for image forgery detection, in particular when an image has been cropped. The proposed solution is very fast compared to the previous art and the experimental results show that it is quite reliable also when the compression ratio is low, i.e. the blocking artefact is not visible.


crop and paste technique DCT blocking artefacts analysis tampered images image forensic 


  1. 1.
    Li, W., Yu, N.I., Yuan, Y.: Doctored JPEG image detection. In: Proceedings of International Conference on Multimedia and Expo, IEEE ICME (2008)Google Scholar
  2. 2.
    Lie, W.N., Lin, G.S., Cheng, S.L.: Dual protection JPEG images based on informed embedding and two-stage watermark extraction techniques. IEEE Transactions on Information Forensics and Security 1, 330–341 (2006)CrossRefGoogle Scholar
  3. 3.
    Redi, J.A., Taktak, W., Dugelay, J.-L.: Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1) (January 2011)Google Scholar
  4. 4.
    Battiato, S., Mancuso, M., Bosco, A., Guarnera, M.: Psychovisual and Statistical Optimization of Quantization Tables for DCT Compression Engines. In: IEEE Proceedings of International Conference on Image Analysis and Processing, ICIAP 2001, Palermo, Italy, pp. 602–606 (September 2001)Google Scholar
  5. 5.
    Fan, Z., De Queiroz, R.L.: Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transactions on Image Processing, 230–235 (2003)Google Scholar
  6. 6.
    Huang, F., Huang, J., Shi, Y.Q.: Detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security 5(4), 848–856 (2010), art. no. 5560817CrossRefGoogle Scholar
  7. 7.
    Li, W., Yuan, Y., Yu, N.: Passive detection of doctored JPEG image via block artefact grid extraction. Signal Processing 89(9), 1821–1829 (2009)CrossRefzbMATHGoogle Scholar
  8. 8.
  9. 9.
  10. 10.
    Battiato, S., Messina, G.: Digital Forgery Estimation into DCT Domain - A Critical Analysis. In: Proceedings of ACM Multimedia 2009 – Workshop Multimedia in Forensics, Bejing (China) (October 2009)Google Scholar
  11. 11.
    Farid, H.: Digital Image Ballistics from JPEG Quantization, Technical Report, TR2006-583, Dartmouth College, Computer Science (2006)Google Scholar
  12. 12.
    cjpeg code can be found in,
  13. 13.
    Bruna, A., Mancuso, M., Capra, A., Curti, S.: Very Fast algorithm for Jpeg Compression Factor Control. In: Proceedings of SPIE Electronic Imaging 2002 - Sensors, Cameras, and Applications for Digital Photography IV, San José, CA, USA (January 2002)Google Scholar
  14. 14.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • A. R. Bruna
    • 1
  • G. Messina
    • 1
  • S. Battiato
    • 1
  1. 1.Image Processing Laboratory, Department of Mathematics and Computer ScienceUniversity of CataniaCataniaItalia

Personalised recommendations