A Method for Detecting JPEG Anti-forensics

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 841)


In this paper, a new approach is proposed for the detection of JPEG anti-forensic operations. It is based on the fact that when a JPEG anti-forensic operation is applied, the values of DCT coefficients are changed. This change decreases, especially in high frequency subbands, if we apply anti-forensic operation again. Hence, we propose to calculate a normalized difference between absolute values of DCT coefficients in 28 high frequency AC-subbands of the test image and its anti-forensically modified version. Based on this normalized feature, it is possible to differentiate between uncompressed and anti-forensically modified images. Experimental results show the effectiveness of the proposed method.


  1. 1.
    Farid, H.: Image forgery detection. IEEE Sig. Process. Mag. 26(2), 16–25 (2009)CrossRefGoogle Scholar
  2. 2.
    Huang, F., Huang, J., Shi, Y.Q.: Detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Forensics Secur. 5(4), 848–856 (2010)CrossRefGoogle Scholar
  3. 3.
    Chen, Y.L., Hsu, C.T.: Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans. Inf. Forensics Secur. 6(2), 396–406 (2011)CrossRefGoogle Scholar
  4. 4.
    Bianchi, T., Piva, A.: Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Forensics Secur. 7(3), 1003–1017 (2012)CrossRefGoogle Scholar
  5. 5.
    Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.J.R.: Anti-forensics of JPEG compression. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1694–1697, March 2010Google Scholar
  6. 6.
    Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)CrossRefGoogle Scholar
  7. 7.
    Fan, W., Wang, K., Cayre, F., Xiong, Z.: JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality. IEEE Trans. Inf. Forensics Secur. 9(8), 1211–1226 (2014)CrossRefGoogle Scholar
  8. 8.
    Valenzise, G., Tagliasacchi, M., Tubaro, S.: Revealing the traces of JPEG compression anti-forensics. IEEE Trans. Inf. Forensics Secur. 8(2), 335–349 (2013)CrossRefGoogle Scholar
  9. 9.
    Lai, S., Böhme, R.: Countering counter-forensics: the case of JPEG compression. In: Proceedings of International Conference on Information Hiding, pp. 285–298 (2011)CrossRefGoogle Scholar
  10. 10.
    Li, H., Luo, W., Qiu, X., Huang, J.: Identification of various image operations using residual-based features. IEEE Trans. Circ. Syst. Video Technol. PP(99), 1 (2016)Google Scholar
  11. 11.
    Lam, E.Y., Goodman, J.W.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans. Image Process. 9(10), 1661–1666 (2000)CrossRefGoogle Scholar
  12. 12.
    Schaefer, G., Stich, M.: UCID - an uncompressed colour image database. In: Proceedings of SPIE, pp. 472–480, March 2004Google Scholar
  13. 13.
    Gloe, T., Bhme, R.: The ‘Dresden Image Database’ for benchmarking digital image forensics. In: Proceedings of the 25th Symposium on Applied Computing (ACM SAC 2010), vol. 2, pp. 1585–1591 (2010)Google Scholar
  14. 14.
    Bas, P., Filler, T., Pevný, T.: Break our steganographic system: the ins and outs of organizing boss. In: Proceedings of 13th International Conference on Information Hiding, pp. 59–70 (2011)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Electronics and Communication EngineeringIndian Institute of Technology RoorkeeRoorkeeIndia

Personalised recommendations