Block-level double JPEG compression detection for image forgery localization

被引:0
作者
Vinay Verma
Deepak Singh
Nitin Khanna
机构
[1] Electrical Engineering,Multimedia Analysis and Security (MANAS) Lab
[2] Indian Institute of Technology Gandhinagar (IITGN),Multimedia Analysis and Security (MANAS) Lab
[3] Mathematics,Multimedia Analysis and Security (MANAS) Lab, Electrical Engineering and Computer Science (EECS)
[4] Indian Institute of Technology Gandhinagar (IITGN),undefined
[5] Indian Institute of Technology Bhilai (IITBh),undefined
来源
Multimedia Tools and Applications | 2024年 / 83卷
关键词
Image forensics; Compression artifacts; Quantization matrix; DenseNet; Unseen compression;
D O I
暂无
中图分类号
学科分类号
摘要
Forged images in JPEG format have a ubiquitous presence in today’s world due to the ease of availability of image manipulation tools. This paper presents a deep learning-based system that utilizes the inherent relationship between histograms of quantized DCT coefficients and corresponding quantization step sizes to distinguish between original and forged regions in a JPEG image, based on detecting single and double compressed blocks, without fully decompressing the JPEG image. In this direction, we propose a novel combination of raw histograms of the quantized DCT coefficients and corresponding quantization step sizes and use it as input to the counterpart standard CNN architectures designed to handle the proposed input representation for single vs. double JPEG compression detection. The proposed input is shown to have a minimal effect on performance with various standard CNN architectures that are designed to handle the proposed input for the task at hand. Specifically, we have utilized DenseNet to extract the compression-specific artifacts from the proposed input for additional experiments reported in this work. We considered a publicly available dataset generated with a diverse set of 1,120 quantization matrices. Using the proposed input to learn the compression artifacts outperforms the baseline methods for the blocks of sizes 256×256\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$256 \times 256$$\end{document}, 128×128\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$128 \times 128$$\end{document}, and 64×64\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$64 \times 64$$\end{document}. Furthermore, in the case of test blocks compressed with completely different quantization matrices than matrices used in training, the proposed method outperforms the baseline methods. Consequently, improved forgery localization performances are obtained for forged JPEG images.
引用
收藏
页码:9949 / 9971
页数:22
相关论文
共 48 条
[1]  
Barni M(2017)Aligned and non-aligned double JPEG detection using convolutional neural networks Journal of Visual Communication and Image Representation 49 153-163
[2]  
Bondi L(2011)Detecting recompression of jpeg images via periodicity analysis of compression artifacts for tampering detection IEEE Transactions on Information Forensics and Security 6 396-406
[3]  
Bonettini N(2009)Exposing digital forgeries from jpeg ghosts IEEE transactions on information forensics and security 4 154-160
[4]  
Bestagini P(2010)The dresden image database for benchmarking digital image forensics Journal of Digital Forensic Practice 3 150-159
[5]  
Costanzo A(2017)Digital image integrity-a survey of protection and verification techniques Digital Signal Processing 71 1-26
[6]  
Maggini M(2019)Detecting Double JPEG Compression and Its Related Anti-Forensic Operations with CNN Multimedia Tools and Applications 78 8577-8601
[7]  
Tondi B(2009)Passive detection of doctored JPEG image via block artifact grid extraction Signal Processing 89 1821-1829
[8]  
Tubaro S(2009)Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis Pattern Recognition 42 2492-2501
[9]  
Chen YL(2011)Digital image forensics: a booklet for beginners Multimedia Tools and Applications 51 133-162
[10]  
Hsu CT(2013)Information forensics: An overview of the first decade IEEE access 1 167-200