A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2012 by IJETT Journal
Volume-3 Issue-2                          
Year of Publication : 2012
Authors :  S.Manimurugan, Boby Jose

MLA 

S.Manimurugan, Boby Jose . "A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix". International Journal of Engineering Trends and Technology (IJETT). V3(2):94-97 Mar-Apr 2012. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

The detection of JPEG compression plays an important role in digital forensics. The JPEG image can be compressed one, two, three or n times. But if the number of times of the compression of a same JPEG image increases, the process of detection of the JPEG compression will be difficult. If the compression is done using the same quantization matrix the detection is even more difficult. There are mainly two reasons why forensic experts give attention to the detection of JPEG compression. The first one is that due to image forgery compressed JPEG images often resulted. The second one is that some JPEG steganographic schemes such may generate doubly compressed images or triply compressed images if the input cover image is in JPEG format. Detection of JPEG compres sion ie, how many times a JPEG image is compressed can help to identify the steganographic algorithm or improve the detection accuracy ra te of the steganalytic schemes.

References

[1] J. Lukas and J. Fridrich , “Estimation of primary quantization matrix in double compressed JPEG images,” in Proc. Digital Forensic Research Workshop , Cleveland, OH, Aug. 2003.
[2] T. Pevný and J. Fridrich, “Detection of double - compression in JPEG images for applications in stegano graphy,” IEEE Trans. Inf. Forensics Security , vol. 3, no. 2, pp. 247 – 258, Jun. 2008.
[3] H. Farid, “Exposing digital forgeries from JPEG ghosts,” IEEE Trans. Inf. Forensics Security , vol. 4, no. 1, pp. 154 – 160, Mar. 2009.
[4] Z. Lin, J. He, X. Tang, and C. - K. Tang, “Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis,” Pattern Recognit. , vol. 42, pp. 2492 – 2501, 2009.
[5] A.Westfeld, “High capacity despite better steganalysis (F5 - A steganographic algorithm),” in Proc . 4th Int. Workshop Information Hiding , 2001, vol. 2137, pp. 289 – 302, Lecture Notes in Computer Science.
[6] N. Provos, “Defending against statistical steganalysis,” in Proc. 10 th USENIX Security Symp. , Washington, DC, 2001.
[7] R. Yang, Y. Q. Shi, and J. Huang, “Defeating fake - quality MP3,” in Porc. ACMMultimedia and Security’09 , Princeton, NJ, Sep. 7 – 8, 2009.
[8] W. Wang and H. Farid, “Exposing digital forgeris in video by detecting double MPEG compression,” in Porc. ACM Mul timedia and Security’06 , Geneva, Switzerland, Sep. 26 – 27, 2006.
[9] W. Wang and H. Farid, “Exposing digital forensics in video by detecting double quantization,” in Proc. ACM Multimedia and Security’ 09 , Princeton, NJ, Sep. 7 – 8, 2009.
[10] A. C. Popescu, “ Statistical Tools for Digital Image Forensics,” Ph. D., Department of Computer Science, Dartmouth College, Hanover, NH, 2004.
[11] A. C. Popescu and H. Farid, “Statistical tools for digital forensics,” in Proc. 6th Int. Workshop on Information Hiding , 2004 , vol. 3200, pp. 128 – 147, Lecture Notes in Computer Science.
[12] Fangjun Huang , and Yun Qing Shi, “Detecting Double JPEG Compression With the Same Quantization Matrix,” in IEEE Transactions On Information Forensics And Security , Vol. 5, No. 4, December 2010.
[13] D. Fu, Y. Q. Shi, and W. Su, “A generalized Benford’s law for JPEG coefficients and its applications in image forensics,” in Proc. SPIE, Security, Steganography and Watermarking of Multimedia Contents IX ,San Jose, CA, Jan. 2007.
[14] B. Li, Y. Q. Shi, and J. Huang, “Detecting double compressed JPEG images by using mode based first digit features,” in Proc. IEEE Int. Workshop on Multimedia Signal Processing (MMSP 2008) , Cairns,Queensland, Australia, Oct. 8 – 10, 2008.
[15] C. Chen, Y. Q. Sh i, and W. Su, “A marching learning based scheme for double JPEG compression detection,” in Proc. IEEE Int. Conf. Pattern Recognition , Tampa, FL, Dec. 8 – 11, 2008.
[16] G. K. Wallace, “The JPEG still picture compression standard,” IEEE Trans. Consumer Electr on. , vol. 38, no. 1, pp.17 - 34, Feb. 1992.

Keywords
Colour image, JPEG Compression, Extended Random Perturbation Strategy