Multiple Heterogeneous JPEG Image Hierarchical Forensic

  • Xiangwei KongEmail author
  • Bo Wang
  • Mingliang Yang
  • Yue Feng
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 393)


Since image processing software is widely used to tamper or embed data into JPEG images, the forensics of tampered JPEG images now plays a considerable important role. However, most existing forensics methods that use binary classification can hardly deal with multiclass image forensics problems properly under network environments. In this paper, we propose a hierarchical forensics scheme against multiple heterogeneous JPEG images. We introduce a compression identifier based on Markov model of DCT coefficients as the first hierarchical section and then develop a tampering detection and steganalyzer separately as the second phase. We conduct a series of experiments to testify the validity of the proposed method.


Image forensics Heterogeneous images Classification 



The work is supported by the Foundation for Innovative Research Groups of the NSFC(Grant No. 71421001), NSFC (Grant No. 61172109).


  1. 1.
    Alessandro P (2013) An overview on image forensics. ISRN Sig ProcGoogle Scholar
  2. 2.
    Farid H (2009) Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forensics Secur 4(1):154–160CrossRefGoogle Scholar
  3. 3.
    Pevny T, Fridrich J (2008) Detection of double-compression in JPEG images for applications in steganography. IEEE Trans Inf Forensics Secur 3(2):247–258CrossRefGoogle Scholar
  4. 4.
    Huang FJ, Huang JW, Shi YQ (2010) Detecting double JPEG compression with the same quantization matrix. IEEE Trans Inf Forensics Secur 5(4):848–856CrossRefGoogle Scholar
  5. 5.
    Feng XY, Doerr G (2010) JPEG recompression detection. Proc SPIE 7541:75410JCrossRefGoogle Scholar
  6. 6.
    Chen CH, Shi YQ, Su W (2008) A machine learning based scheme for double JPEG compression detection,” In: 19th international conference on pattern recognition, pp 1–4Google Scholar
  7. 7.
    Pevný T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings SPIE security, steganography, and watermarking of multimedia contents, San Jose, CA, vol 6505, pp 1–13Google Scholar
  8. 8.
    Fridrich J (2005) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich J (ed) Information hiding, 6th international workshop, volume 3200 of lecture notes in computer science, pp 67–81Google Scholar
  9. 9.
    Fu D, Shi YQ, Su W (2007) A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In: Proceedings of SPIE conference on electronic imaging, security and watermarking of multimedia contents, San Jose, USAGoogle Scholar
  10. 10.
    Li B, Shi YQ, Huang JW (2008) Detecting doubly compressed JPEG images by using mode based first digit features. In: IEEE international workshop on multimedia signal processing, pp 730–735Google Scholar
  11. 11.
    Chang CC, Lin CJ (2001) LIBSVM: a library for support vector machines, 2001.
  12. 12.
    Provos N (2001) Defending against statistical steganalysis. In: 10th USENIX security symposium, Washington, D.C., pp 323–336Google Scholar
  13. 13.
    Westfeld A (2001) F5-a steganographic algorithm: high capacity despite better steganalysis. In: Proceedings of international workshop information hiding (IWIH), Pittsburgh, PA, pp 289–302Google Scholar
  14. 14.
    Chen YL, Hsu CT (2011) Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans Inf Forensics Secur 6(2):396–406MathSciNetCrossRefGoogle Scholar
  15. 15.
    Holub V, Fridrich J (2014) Low complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–28Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2016

Authors and Affiliations

  • Xiangwei Kong
    • 1
    Email author
  • Bo Wang
    • 1
  • Mingliang Yang
    • 1
  • Yue Feng
    • 1
  1. 1.School of Information and Communication EngineeringDalian University of TechnologyDalianPeople’s Republic of China

Personalised recommendations