Skip to main content

Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8389))

Abstract

The detection of non-aligned double JPEG (NA-DJPEG) compression is one of the most important topics in the forensics of JPEG image. In this paper, we propose a novel feature set to detect NA-DJPEG compression based on refined intensity difference (RID), a new measure for blocking artifacts. Refined intensity difference is essentially intensity difference with compensation, which takes the negative effect of image texture into consideration when measuring blocking artifacts. The extraction pipeline of the proposed feature set mainly includes two steps. Firstly, two groups of RID histograms (totally sixteen histograms) with respect to horizontal and vertical directions are computed to describe the possible blocking artifacts in each row and column, and the bin values of these histograms are arranged to form an RID feature vector. Then, in order to make the RID feature vector less dependent on image texture and more discriminative, we calibrate it by a reference feature vector to generate a calibrated RID (C-RID) feature vector for final binary classification. Experiments have been conducted to validate the effectiveness of the C-RID feature set, and the results have shown that it outperforms the compared feature sets in most cases.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Piva, A.: An overview on image forensics, ISRN Signal Process. 2013, Article ID 496701, 22 (2013)

    Google Scholar 

  2. Popescu, A.C., Farid, H.: Statistical tools for digital forensics. In: Proceedings of Information Hiding, pp. 128–147 (2005)

    Google Scholar 

  3. Fu, D., Shi, Y.Q., Su, W., et al.: A generalized benfords law for JPEG coefficients and its applications in image forensics. In: Proceedings of SPIE Electronic Imaging (2007)

    Google Scholar 

  4. Li, B., Shi, Y.Q., Huang, J.: Detecting doubly compressed JPEG images by using mode based first digit features. In: Proceedings of MMSP, pp. 730–735 (2008)

    Google Scholar 

  5. Pevny, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forensics Secur. 3(2), 247–258 (2008)

    Article  Google Scholar 

  6. Luo, W., Qu, Z., Huang, J., Qiu, G.: A novel method for detecting cropped and recompressed image block. In: Proceedings of ICASSP, vol. 2, pp. 217–220 (2007)

    Google Scholar 

  7. Chen, Y.L., Hsu, C.T.: Image tampering detection by blocking periodicity analysis in JPEG compressed images. In: Proceedings of MMSP, pp. 803–808 (2008)

    Google Scholar 

  8. Chen, Y.L., Hsu, C.T.: Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans. Inf. Forensics Secur. 6(2), 396–406 (2011)

    Article  MathSciNet  Google Scholar 

  9. Qu, Z., Luo, W., Huang, J.: A convolutive mixing model for shifted double JPEG compression with application to passive image authentication. In: Proceedings of ICASSP, pp. 1661–1664 (2008)

    Google Scholar 

  10. Bianchi, T., Piva, A.: Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf. Forensics Secur. 7(2), 842–848 (2012)

    Article  Google Scholar 

  11. Wu, L., Kong, X., Wang, B., Shang, S.: Image tampering localization via estimating the non-aligned double JPEG compression. In: Proceedings of IS&T/SPIE Electronic Imaging, pp. 86650R1–86650R7 (2013)

    Google Scholar 

  12. Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: breaking the f5 algorithm. In: Proceedings of Information Hiding, pp. 310–323 (2003)

    Google Scholar 

  13. Kodovskỳ, J., Fridrich, J.: Calibration revisited. In: Proceedings of 11th ACM Multimedia & Security Workshop, pp. 63–74 (2009)

    Google Scholar 

  14. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines, ACM Trans. Intell. Syst. Technol. 2, 27:1–27:27 (2011). http://www.csie.ntu.edu.tw/cjlin/libsvm

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers for their helpful comments. This work has been partially supported by NSFC (61003297, U1135001, 61202415), the NSF of Guangdong Province (S2013010011806), the Shenzhen Peacock Program (KQCX20120816160011790, KQC201109050097A), the Knowledge Innovation Program of Shenzhen (JCYJ20130401170306848), and the 863 Program (2011AA010503).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guopu Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, J., Zhu, G., Wang, J., Shi, Y.Q. (2014). Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43886-2_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43885-5

  • Online ISBN: 978-3-662-43886-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics