Skip to main content
Log in

JPEG image classification in digital forensic via DCT coefficient analysis

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

From the digital forensics point of view, image forgery is considered as evidence that could provide a major breakthrough in the investigation process. Additionally, the development of storage device technologies has increased storage space significantly. Thus a digital investigator can be overwhelmed by the amount of data on storage devices that needs to be analysed. In this paper, we propose a model for classifying bulk JPEG images produced by the data carving process or other means into three different classes to solve the problem of identifying forgery quickly and effectively. The first class is JPEG images that contain errors or corrupted data, the second class is JPEG images that contain forged regions, and the third is JPEG images that have no signs of corruption or forgery. To test the proposed model, some experiments were conducted on our own dataset in addition to CASIA V2 image forgery dataset. The experiments covered different types of forgery technique. The results yielded around 88% accuracy rate in the classification process using five different machine learning methods on CASIA V2 dataset. It can be concluded that the proposed model can help investigators to automatically classify JPEG images, which reduce the time needed in the overall digital investigation process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Alherbawi N, Shukur Z, Sulaiman R (2013) Systematic literature review on data carving in digital forensic. Procedia Technol 11:86–92

    Article  Google Scholar 

  2. Alherbawi N, Shukur Z, Sulaiman R (2017) Current techniques in JPEG image authentication and forgery detection. J Eng Appl Sci 12(1):104–112. https://www.medwelljournals.com/abstract/?doi=jeasci.2017.104.112&keyword=forgery

    Google Scholar 

  3. Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans Inf Forensics Secur 7(3):1003–1017

    Article  Google Scholar 

  4. Bianchi T, Rosa AD, Piva A (2011) Improved DCT coefficient analysis for forgery localization in JPEG images. Acoustics, Speech and Signal … pp 2444–2447

  5. Chen Y, Thing VL (2013) Image content analysis for sector-wise JPEG fragment classification. J Vis Commun Image Represent 24(7):857–866

    Article  Google Scholar 

  6. Garfinkel S (2007) Carving contiguous and fragmented files with fast object validation. Digit Investig 4:2–12

    Article  Google Scholar 

  7. Garfinkel SL (2006) Forensic feature extraction and cross-drive analysis. Digital investigation 3, Supplement:71 – 81, the proceedings of the 6th annual digital forensic research workshop (DFRWS ’06)

  8. Garfinkel SL (2010) Digital forensics research: the next 10 years. Digital investigation 7, Supplement:S64 – S73. doi:10.1016/j.diin.2010.05.009, http://www.sciencedirect.com/science/article/pii/S1742287610000368, the proceedings of the tenth annual {DFRWS} conference

  9. Garfinkel SL (2013) Digital media triage with bulk data analysis and bulk-extractor. Comput Secur 32:56–72

    Article  Google Scholar 

  10. Haines R F, Chuang s L (1992) The effects of video compression on acceptability of images for monitoring life science experiments. Tech. rep., NASA Technical Documents

  11. He J, Lin Z, Wang L, Tang X (2006) Detecting doctored JPEG images via DCT coefficient analysis. Computer Vision ECCV 2006:423–435

    Google Scholar 

  12. Lin Z, He J, Tang X, Tang CK (2009) Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn 42 (11):2492–2501

    Article  MATH  Google Scholar 

  13. Miano J (1999) Compressed image file formats: JPEG, PNG, GIF, XBM, BMP. ACM Press/Addison-Wesley Publishing Co., New York

    Google Scholar 

  14. Pan X, Yan B, Niu K (2010) Multiclass detect of current steganographic methods for jpeg format based re-stegnography. In: 2010 2nd international conference on advanced computer control, vol 4, pp 79–82, doi:10.1109/ICACC.2010.5486869

    Google Scholar 

  15. Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Dartmouth College pp 1–11

  16. Popescu AC, Farid H (2005) Statistical tools for digital forensics. Springer, Berlin, Heidelberg, pp 128–147

    Google Scholar 

  17. Richard G, Roussev V, Marziale L (2007) In-Place File carving. Springer, New York, pp 217–230

    Google Scholar 

  18. Sahani A, Srilatha K (2014) Image forgery detection using svm classifier. In: IEEE sponsored 2nd international conference on innovations in information embedded and communication system, pp 7551–7556

    Google Scholar 

  19. Vaida F (2005) Parameter convergence for EM and MM algorithms. Stat Sin 15:831–840

    MathSciNet  MATH  Google Scholar 

  20. Wang Y, Liu J, Zhang W, Lian S (2010) Reliable JPEG steganalysis based on multi-directional correlations. Signal Process Image Commun 25(8):577–587

    Article  Google Scholar 

Download references

Acknowledgements

Credits for the use of the CASIA Image Tempering Detection Evaluation Database (CAISA TIDE) V2.0 are given to the National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Science, Corel Image Database and the photographers. http://forensics.idealtest.org

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadeem Alherbawi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alherbawi, N., Shukur, Z. & Sulaiman, R. JPEG image classification in digital forensic via DCT coefficient analysis. Multimed Tools Appl 77, 12805–12835 (2018). https://doi.org/10.1007/s11042-017-4915-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4915-3

Keywords

Navigation