A Statistical Modeling Framework for DCT Coefficients of Tampered JPEG images and Forgery Localization

被引:0
作者
Nhan Le [1 ]
Retraint, Florent [1 ]
机构
[1] Univ Technol Troyes, Comp Sci & Digital Soc Lab LIST3N, F-10004 Troyes, France
来源
IEEE ACCESS | 2022年 / 10卷
关键词
DCT coefficients analysis; EM algorithm; forgery localization; multiple JPEG compression; statistical image models; tampered JPEG images; QUANTIZATION STEP; DIGITAL IMAGES; DISTRIBUTIONS; COMPRESSION; STEGANALYSIS;
D O I
10.1109/ACCESS.2022.3188299
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various manipulations on JPEG images introduce single and multiple compression artifacts for forged and unmodified areas respectively. Based on the statistical analysis of JPEG compression cycle and on the finite mixture paradigm, we propose in this paper a modeling framework for AC DCT coefficients of such tampered JPEG images. Its accuracy is numerically assessed using the Kullback-Leibler divergence on the basis of a tampered JPEG image dataset built from six well-known uncompressed color image databases. To illustrate the framework utility, an application in image forgery localization is proposed. By formulating the localization as a clustering problem, we use the plug-in Bayes rule combined with a simple EM algorithm to distinguish between forged and unmodified areas. Numerous experiments show that, when the quality factor of final JPEG compression is high enough, the proposed modeling framework yields higher localization performances in terms of F-1-score than prior art regardless of divers local manipulations.
引用
收藏
页码:71143 / 71164
页数:22
相关论文
共 60 条
  • [1] Evaluation of copy-move forgery detection: datasets and evaluation metrics
    Al-Qershi, Osamah M.
    Khoo, Bee Ee
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (24) : 31807 - 31833
  • [2] [Anonymous], 2007, TABLE INTEGRALS SERI
  • [3] Aligned and non-aligned double JPEG detection using convolutional neural networks
    Barni, M.
    Bondi, L.
    Bonettini, N.
    Bestagini, P.
    Costanzo, A.
    Maggini, M.
    Tondi, B.
    Tubaro, S.
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2017, 49 : 153 - 163
  • [4] Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
    Bianchi, Tiziano
    Piva, Alessandro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1003 - 1017
  • [5] Bishop CM., 2006, PATTERN RECOGNITION, DOI [DOI 10.1007/978-0-387-45528-0, 10.1007/978-0-387-45528-0]
  • [6] Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models
    Briassouli, A
    Tsakalides, P
    Stouraitis, A
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2005, 7 (04) : 700 - 715
  • [7] Image probability distribution based on generalized gamma function
    Chang, JH
    Shin, JW
    Kim, NS
    Mitra, SK
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (04) : 325 - 328
  • [8] MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images
    Cohen, Aviad
    Nissim, Nir
    Elovici, Yuval
    [J]. IEEE ACCESS, 2020, 8 (08) : 19997 - 20011
  • [9] Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
    Conotter, Valentina
    Comesana, Pedro
    Perez-Gonzalez, Fernando
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2257 - 2269
  • [10] STATISTICAL DISTRIBUTIONS OF IMAGE DCT COEFFICIENTS
    EGGERTON, JD
    SRINATH, MD
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 1986, 12 (3-4) : 137 - 145