First Quantization Coefficient Extraction from Double Compressed JPEG Images
In the forensics domain can be useful to recover image history, and in particular whether or not it has been doubly compressed. Clarify this point allows to assess if, in addition to the compression at the time of shooting, the picture was decompressed and then resaved. This is not a clear indication of forgery, but it can justify further investigations. In this paper we propose a novel technique able to retrieve the coefficients of the first compression in a double compressed JPEG image when the second compression is lighter than the first one. The proposed approach exploits the effects of successive quantizations followed by dequantization to recover the original compression parameters. Experimental results and comparisons with a state of the art method confirm the effectiveness of the proposed approach.
KeywordsDouble JPEG Compression Forgery Identification
Unable to display preview. Download preview PDF.
- 1.Dataset Eastman Kodak Company: PhotoCD PCD0992, http://r0k.us/graphics/kodak/
- 3.Battiato, S., Mancuso, M., Bosco, A., Guarnera, M.: Psychovisual and statistical optimization of quantization tables for DCT compression engines. In: Proceedings of the 11th International Conference on Image Analysis and Processing (ICIAP), pp. 602–606 (2001)Google Scholar
- 4.Battiato, S., Messina, G.: Digital forgery estimation into DCT domain: a critical analysis. In: Proceedings of the First ACM Workshop on Multimedia in Forensics (MiFor), pp. 37–42 (2009)Google Scholar
- 7.Farid, H.: Digital image ballistics from JPEG quantization: A followup study. Tech. Rep. TR2008-638, Department of Computer Science, Dartmouth College (2008)Google Scholar
- 10.Lukas, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Proceedings of Digital Forensic Research Workshop, DFRWS (2003)Google Scholar
- 14.Wang, W., Dong, J., Tan, T.: Exploring DCT coefficient quantization effect for image tampering localization. In: Proceedings of Workshop on Information Forensics and Security (2011)Google Scholar