Anti-Forensics of Double JPEG Compression Detection

In this paper, a simple yet effective anti-forensic scheme capable of misleading double JPEG compression detection techniques is proposed. Based on image resizing with bilinear interpolation, the proposed operation aims at destroying JPEG grid structure while preserving reasonably good image quality. Given a doubly compressed image, our attack modifies the image by JPEG decompressing, shrinking and zooming the image with bilinear interpolation before JPEG compression with the same quality factor as used in the given image. The efficacy of the proposed scheme has been evaluated on two prominent double JPEG detection techniques and the outcome reveals that the proposed scheme is mostly effective, especially in the cases that the first quality factor is lower than the second quality factor.

[1]  Wei Su,et al.  A machine learning based scheme for double JPEG compression detection , 2008, 2008 19th International Conference on Pattern Recognition.

[2]  Bin Li,et al.  Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[3]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[4]  K. J. Ray Liu,et al.  Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[5]  Hong Zhao,et al.  Markovian Rake Transform for Digital Image Tampering Detection , 2011, Trans. Data Hiding Multim. Secur..

[6]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[7]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[8]  Wei Su,et al.  Rake transform and edge statistics for image forgery detection , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[9]  Jing Dong,et al.  New developments in color image tampering detection , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[10]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[11]  K. J. Ray Liu,et al.  Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.

[12]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[13]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.