skip to main content
research-article

Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature

Authors Info & Claims
Published:12 November 2021Publication History
Skip Abstract Section

Abstract

Due to the popularity of JPEG format images in recent years, JPEG images will inevitably involve image editing operation. Thus, some tramped images will leave tracks of Non-aligned double JPEG (NA-DJPEG) compression. By detecting the presence of NA-DJPEG compression, one can verify whether a given JPEG image has been tampered with. However, only few methods can identify NA-DJPEG compressed images in the case that the primary quality factor is greater than the secondary quality factor. To address this challenging task, this article proposes a novel feature extraction scheme based optimized pixel difference (OPD), which is a new measure for blocking artifacts. Firstly, three color channels (RGB) of a reconstructed image generated by decompressing a given JPEG color image are mapped into spherical coordinates to calculate amplitude and two angles (azimuth and zenith). Then, 16 histograms of OPD along the horizontal and vertical directions are calculated in the amplitude and two angles, respectively. Finally, a set of features formed by arranging the bin values of these histograms is used for binary classification. Experiments demonstrate the effectiveness of the proposed method, and the results show that it significantly outperforms the existing typical methods in the mentioned task.

REFERENCES

  1. [1] Barni M., Bondi L., Bonettini N., Bestagini P., Costanzo A., Maggini M., Tondi B., and Tubaro S.. 2019. Aligned and non-aligned double JPEG detection using convolutional neural networks. Journal of Visual Communication & Image Representation 49 (2019), 153163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Bianchi Tiziano and Piva Alessandro. 2012. Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Transactions on Information Forensics & Security 7, 2 (2012), 842848. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Chang Chih-Chung and Lin Chih-Jen. 2011. LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST) 2, 3 (2011), 27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Chen Y. L. and Hsu C. T.. 2011. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics & Security 6, 2 (2011), 396406. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Fan Zhigang and Queiroz Ricardo L. De. 2003. Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transactions on Image Processing 12, 2 (2003), 230235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Fischler M. A.. 1982. Recovering intrinsic scene characteristics from images. Southwest Research Inst. Report (1982).Google ScholarGoogle Scholar
  7. [7] Fu Dongdong, Shi Yun Q., and Wei Su. 2007. A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of the SPIE 6505 (2007), 65051L–65051L-11.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Hernandez-Cabronero Miguel, Marcellin Michael W., Blanes Ian, and Serra-Sagrista Joan. 2017. Lossless compression of color filter array mosaic images with visualization via JPEG 2000. IEEE Transactions on Multimedia 20, 2 (2017), 257270. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Huang Fangjun, Huang Jiwu, and Yun Qing Shi. 2010. Detecting Double JPEG Compression With the Same Quantization Matrix. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Kerr Douglas A.. 2012. Chrominance subsampling in digital images. The Pumpkin 2012, 3 (2012), 115.Google ScholarGoogle Scholar
  11. [11] Lai Shi Yue and Bohme Rainer. 2013. Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In IEEE International Conference on Acoustics.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Li Bin, Shi Yun Q., and Huang Jiwu. 2008. Detecting doubly compressed JPEG images by using mode based first digit features. In IEEE Workshop on Multimedia Signal Processing.Google ScholarGoogle Scholar
  13. [13] Luo Weiqi, Qu Zhenhua, Huang Jiwu, and Qiu Guoping. 2007. A novel method for detecting cropped and recompressed image block. In IEEE International Conference on Acoustics.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Mazaheri Ghazal, Mithun Niluthpol Chowdhury, Bappy Jawadul H., and Roy-Chowdhury Amit K.. 2019. A skip connection architecture for localization of image manipulations. In CVPR Workshops. 119129.Google ScholarGoogle Scholar
  15. [15] McDonnell John D., Shorten Robert N., and Fagan Anthony D.. 1994. An edge classification based approach to the post-processing of transform encoded images. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’94). IEEE, V–329.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Mileva Yana, Bruhn Andrés, and Weickert Joachim. 2007. Illumination-robust variational optical flow with photometric invariants. In DAGM Conference on Pattern Recognition. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Piva Alessandro. 2013. An overview on image forensics. ISRN Signal Processing 2013 (2013).Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Ramesh Neelamani, Ricardo De Queiroz, Zhigang Fan, Sanjeeb Dash, and Baraniuk Richard G.. 2006. JPEG compression history estimation for color images. IEEE Transactions on Image Processing 15, 6 (2006), 13651378. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Schaefer Gerald and Stich Michal. 2003. UCID: An uncompressed color image database. In Storage and Retrieval Methods and Applications for Multimedia 2004, Vol. 5307. International Society for Optics and Photonics, 472480.Google ScholarGoogle Scholar
  20. [20] Shafer Steven A.. 1985. Using color to separate reflection components. Color Research and Application 10, 4 (1985), 210218.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Syeda-Mahmood Tanveer Fathima. 1992. Data and model-driven selection using color regions. In European Conference on Computer Vision. Springer, 115123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Wallace Gregory K.. 1992. The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics 38, 1 (1992), xviii–xxxiv. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Weijer J. Van De and Gevers Th.. 2004. Robust optical flow from photometric invariants. In International Conference on Image Processing.Google ScholarGoogle Scholar
  24. [24] Wu Lanying, Kong Xiangwei, Wang Bo, and Shang Shize. 2013. Image tampering localization via estimating the non-aligned double JPEG compression. In IS&T/SPIE Electronic Imaging.Google ScholarGoogle Scholar
  25. [25] Yang Jianquan, Xie Jin, Zhu Guopu, Kwong Sam, and Shi Yun Qing. 2014. An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics & Security 9, 11 (2014), 19331942. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Yang Jianquan, Zhu Guopu, Wang Junlong, and Yun Qing Shi. 2013. Detecting non-aligned double JPEG compression based on refined intensity difference and calibration. In International Workshop on Digital Watermarking.Google ScholarGoogle Scholar
  27. [27] Zhu Shuyuan, Li Mingyu, Chen Chen, Liu Shuaicheng, and Zeng Bing. 2018. Cross-space distortion directed color image compression. IEEE Transactions on Multimedia 20, 3 (2018), 525–538. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 17, Issue 4
        November 2021
        529 pages
        ISSN:1551-6857
        EISSN:1551-6865
        DOI:10.1145/3492437
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 November 2021
        • Accepted: 1 May 2021
        • Revised: 1 January 2021
        • Received: 1 June 2020
        Published in tomm Volume 17, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!