A Novel Method for Detecting Double Compressed Facebook JPEG Images

  • Allan NG
  • Lei Pan
  • Yang Xiang
Part of the Communications in Computer and Information Science book series (CCIS, volume 490)

Abstract

Images published on online social sites such as Facebook are increasingly prone to be misused for malicious purposes. However, existing image forensic research assumes that the investigator can confiscate every piece of evidence and hence overlooks the fact that the original image is difficult to obtain. Because Facebook applies a Discrete Cosine Transform (DCT)-based compression on uploaded images, we are able to detect the modified images which are re-uploaded to Facebook. Specifically, we propose a novel method to effectively detect the presence of double compression via the spatial domain of the image: We select small image patches from a given image, define a distance metric to measure the differences between compressed images, and propose an algorithm to infer whether the given image is double compressed without referring to the original image. To demonstrate the correctness of our algorithm, we correctly predict the number of compressions being applied to a Facebook image.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ardizzone, E., Bruno, A., Mazzola, G.: Copy-Move Forgery Detection via Texture Description. In: Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence (2010)Google Scholar
  2. 2.
    Bianchi, T., Piva, A.: Analysis of Non-Aligned Double JPEG Artifacts for the Localization of Image Forgeries. In: Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6 (2011)Google Scholar
  3. 3.
    Fei, P., Xi-lan, W.: Digital Image Forgery Forensics by Using Blur Estimation and Abnormal Hue Detection. In: Proceedings of the Symposium on Photonics and Optoelectronic (SOPO), pp. 1–4 (2010)Google Scholar
  4. 4.
    Hou, W., Ji, Z., Jin, X., Li, X.: Double JPEG Compression Detection Base on Extended First Digit Features of DCT Coefficients. International Journal of Information and Education Technology 3(5), 512–515 (2013)Google Scholar
  5. 5.
    Huang, F., Huang, J., Shi, Y.: Detecting Double Compression with the Same Quantization Matrix. IEEE Transactions on Information Forensics and Security 5(4), 848–856 (2010)CrossRefGoogle Scholar
  6. 6.
    Khan, S., Kulkarni, A.: Robust Method for Detection of Copy-Move Forgery in Digital Images. In: Proceedings of the International Conference on Signal and Image Processing (ICSIP), pp. 69–73 (2010)Google Scholar
  7. 7.
    Liu, Q., Li, X., Cooper, P., Hu, X.: Shift-Recompression-Based Feature Mining for Detecting Content-Aware Scaled Forgery in JPEG Images. In: Proceedings of the 12th International Workshop on Multimedia Data Mining (MDMKDD), pp. 10–16 (2012)Google Scholar
  8. 8.
    Lukàš, J., Fridrich, J.: Estimation of Primary Quantization Matrix in Double Compressed JPEG Images. In: Proceedings of the Digital Forensic Research Workshop (2003)Google Scholar
  9. 9.
    Popescu, A.: Statistical Tools for Digital Image Forensics. Ph.D. thesis, Department of Computer Science, Dartmouth College, Hanover, PhD thesis (2005)Google Scholar
  10. 10.
    Qu, Z., Luo, W., Huang, J.: Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics. In: Hu, S.-M., Martin, R.R. (eds.) CVM 2012. LNCS, vol. 7633, pp. 1–8. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  11. 11.
    Sencar, H., Memon, N.: Overview of State-of-the-art in Digital Image Forensics. Statistical Science and Interdisciplinary Research, pp. 1–19 (2008)Google Scholar
  12. 12.
    Thing, V., Chen, Y., Cheh, C.: An Improved Double Compression Detection Method for JPEG Image Forensics. In: Proceedings of the IEEE International Symposium on Multimedia, pp. 290–297 (2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Allan NG
    • 1
  • Lei Pan
    • 1
  • Yang Xiang
    • 1
  1. 1.School of ITDeakin UniversityMelbourneAustralia

Personalised recommendations