Articles

Detecting Shifted Double JPEG Compression Tampering Utilizing Both Intra-Block and Inter-Block Correlations

Expand
  • (a. Department of Electronic Engineering; b. School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, China)

Online published: 2013-03-19

Abstract

Copy-paste forgery is a very common type of forgery in JPEG images. The tampered patch has always suffered from JPEG compression twice with inconsistent block segmentation. This phenomenon in JPEG image forgeries is called the shifted double JPEG (SDJPEG) compression. Detection of SDJPEG compressed image patches can make crucial contribution to detect and locate the tampered region. However, the existing SDJPEG compression tampering detection methods cannot achieve satisfactory results especially when the tampered region is small. In this paper, an effective SDJPEG compression tampering detection method utilizing both intra-block and inter-block correlations is proposed. Statistical artifacts are left by the SDJPEG compression among the magnitudes of JPEG quantized discrete cosine transform (DCT) coefficients. Firstly, difference 2D arrays, which describe the differences between the magnitudes of neighboring JPEG quantized DCT coefficients on the intrablock and inter-block, are used to enhance the SDJPEG compression artifacts. Then, the thresholding technique is used to deal with these difference 2D arrays for reducing computational cost. After that, co-occurrence matrix is used to model these difference 2D arrays so as to take advantage of second-order statistics. All elements of these co-occurrence matrices are served as features for SDJPEG compression tampering detection. Finally, support vector machine (SVM) classifier is employed to distinguish the SDJPEG compressed image patches from the single JPEG compressed image patches using the developed feature set. Experimental results demonstrate the efficiency of the proposed method.

Cite this article

ZHANG Yu-jina (张玉金), LI Sheng-honga* (李生红), WANG Shi-linb (王士林) . Detecting Shifted Double JPEG Compression Tampering Utilizing Both Intra-Block and Inter-Block Correlations[J]. Journal of Shanghai Jiaotong University(Science), 2013 , 18(1) : 7 -16 . DOI: 10.1007/s12204-013-1362-9

References

[1] Comesa?na P, Merhav N, Barni M. Asymptotically optimum universal watermark embedding and detection in the high-SNR regime [J]. IEEE Transactions on Information Theory, 2010, 56(6): 2804-2815.
[2] Farid H. A survey of image forgery detection [J]. IEEE Signal Processing Magazine, 2009, 2: 16-25.
[3] Popescu A C. Statistical tools for digital image forensics [D]. Hanover, USA: Department of Computer Science, Dartmouth College, 2004.
[4] Li B, Shi Y Q, Huang J. Detecting doubly compressed JPEG images by using mode based first digit features [C]//IEEE Workshop on Multimedia Signal Processing (MMSP2008). Cairns, Australia: IEEE, 2008: 730-735.
[5] Chen C, Shi Y Q, Su W. A machine learning based scheme for double JPEG compression detection [C]//IEEE International Conference on Pattern Recognition (ICPR 2008). Tampa, USA: IEEE, 2008: 1-4.
[6] Luo W, Qu Z, Huang J, et al. A novel method for detecting cropped and recompressed image block [C]//IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP2007). Honolulu, USA: IEEE, 2007: 217-220.
[7] Qu Z, Luo W, Huang J. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication [C]//IEEE International Conference on Acoustic, Speech and Signal Processing. Las Vegas, USA: IEEE, 2008: 1661-1664.
[8] Wallace G K. The JPEG still picture compression standard [J]. IEEE Transactions on Consumer Electronics, 1992, 38(1): 1-17.
[9] Haralick R M, Shanmugan K, Dinstein I. Textural features for image classification [J]. IEEE Transactions on Systems, Man and Cybernetics, 1973, 3(6): 610-621.
[10] Chen C, Shi Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations [C]//IEEE International Symposium on Circuits and Systems (ISCAS2008). Seatle, USA: IEEE, 2008: 3029-3032.
[11] Huang F, Li B, Huang J. Universal JPEG steganalysis based on microscopic and macroscopic calibration [C]//IEEE International Conference on Image Processing (ICIP2008). San Diego, USA: IEEE, 2008:2068-2071.
[12] Chang C C, Lin C J. LIBSVM: A library for support vector machines [EB/OL]. (2011-10-12). http://www.csie.ntu.edu.tw/cjlin/libsvm.
[13] Sallee P. Matlab JPEG toolbox [DB/OL]. (2011-10-12). http://www.philsallee.com/jpegtbx/index.html.
[14] Schaefer G, Stich M. UCID: An uncompressed color image database [J]. Proc SPIE, 2004, 5307: 472-480.
Outlines

/