Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis

To identify whether an image has been JPEG compressed is an important issue in forensic practice. The state-of-the-art methods fail to identify high-quality compressed images, which are common on the Internet. In this paper, we provide a novel quantization noise-based solution to reveal the traces of JPEG compression. Based on the analysis of noises in multiple-cycle JPEG compression, we define a quantity called forward quantization noise. We analytically derive that a decompressed JPEG image has a lower variance of forward quantization noise than its uncompressed counterpart. With the conclusion, we develop a simple yet very effective detection algorithm to identify decompressed JPEG images. We show that our method outperforms the state-of-the-art methods by a large margin especially for high-quality compressed images through extensive experiments on various sources of images. We also demonstrate that the proposed method is robust to small image size and chroma subsampling. The proposed algorithm can be applied in some practical applications, such as Internet image classification and forgery detection.

[1]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[2]  Mauro Barni,et al.  A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Stefano Tubaro,et al.  Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[5]  Sanjeeb Dash,et al.  JPEG compression history estimation for color images , 2003, IEEE Transactions on Image Processing.

[6]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[7]  Avideh Zakhor,et al.  An optimization approach for removing blocking effects in transform coding , 1995, IEEE Trans. Circuits Syst. Video Technol..

[8]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1991, CACM.

[9]  A. Piva An Overview on Image Forensics , 2013 .

[10]  A. Sripad,et al.  A necessary and sufficient condition for quantization errors to be uniform and white , 1977 .

[11]  Teddy Furon,et al.  Broken Arrows , 2008, EURASIP J. Inf. Secur..

[12]  Jiwu Huang,et al.  A convolutive mixing model for shifted double JPEG compression with application to passive image authentication , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[13]  Y.-L. Chen,et al.  Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.

[14]  Qingzhong Liu,et al.  Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery , 2011, MiFor '11.

[15]  Zhang Xiong,et al.  JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.

[16]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[17]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[18]  Sebastiano Battiato,et al.  First Quantization Matrix Estimation From Double Compressed JPEG Images , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Mohammed Ghanbari,et al.  Blockiness detection for MPEG2-coded video , 2000, IEEE Signal Processing Letters.

[20]  Jiwu Huang,et al.  JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.

[21]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[22]  Jiwu Huang,et al.  A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[23]  Rainer Böhme,et al.  Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.

[24]  Jiwu Huang,et al.  Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.

[25]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[26]  Ee-Chien Chang,et al.  Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[27]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[28]  Fernando Pérez-González,et al.  Near optimal detection of quantized signals and application to JPEG forensics , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[29]  Thomas Gloe Demystifying histograms of multi-quantised DCT coefficients , 2011, 2011 IEEE International Conference on Multimedia and Expo.

[30]  Rainer Böhme,et al.  Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[31]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[32]  Guo-Shiang Lin,et al.  A Passive-Blind Forgery Detection Scheme Based on Content-Adaptive Quantization Table Estimation , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[33]  Bin Li,et al.  JPEG Noises beyond the First Compression Cycle , 2014, ArXiv.

[34]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[35]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[36]  Stefano Tubaro,et al.  The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[37]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[38]  Chiou-Ting Hsu,et al.  Detecting doubly compressed images based on quantization noise model and image restoration , 2009, 2009 IEEE International Workshop on Multimedia Signal Processing.