Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts

In this paper, we propose a forensic algorithm to discriminate between original and forged regions in JPEG images, under the hypothesis that the tampered image presents a double JPEG compression, either aligned (A-DJPG) or nonaligned (NA-DJPG). Unlike previous approaches, the proposed algorithm does not need to manually select a suspect region in order to test the presence or the absence of double compression artifacts. Based on an improved and unified statistical model characterizing the artifacts that appear in the presence of both A-DJPG or NA-DJPG, the proposed algorithm automatically computes a likelihood map indicating the probability for each 8 × 8 discrete cosine transform block of being doubly compressed. The validity of the proposed approach has been assessed by evaluating the performance of a detector based on thresholding the likelihood map, considering different forensic scenarios. The effectiveness of the proposed method is also confirmed by tests carried on realistic tampered images. An interesting property of the proposed Bayesian approach is that it can be easily extended to work with traces left by other kinds of processing.

[1]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[2]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1991, CACM.

[3]  F. Muller Distribution shape of two-dimensional DCT coefficients of natural images , 1993 .

[4]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[5]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[6]  E. Jaynes Probability theory : the logic of science , 2003 .

[7]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[8]  M. Tribus,et al.  Probability theory: the logic of science , 2003 .

[9]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[10]  J. Fridrich,et al.  Detection of double-compression for applications in steganography , 2007 .

[11]  Jiwu Huang,et al.  A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[12]  Jiwu Huang,et al.  A convolutive mixing model for shifted double JPEG compression with application to passive image authentication , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[13]  Chiou-Ting Hsu,et al.  Image tampering detection by blocking periodicity analysis in JPEG compressed images , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[14]  H. Farid A Survey of Image Forgery Detection , 2008 .

[15]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[16]  Bin Li,et al.  Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[17]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[18]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[19]  Chi-Keung Tang,et al.  Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..

[20]  Mauro Barni,et al.  Identification of cut & paste tampering by means of double-JPEG detection and image segmentation , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[21]  Gwenaël J. Doërr,et al.  JPEG recompression detection , 2010, Electronic Imaging.

[22]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[23]  Alessandro Piva,et al.  Improved DCT coefficient analysis for forgery localization in JPEG images , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[24]  Y.-L. Chen,et al.  Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.

[25]  Alessandro Piva,et al.  Detection of non-aligned double JPEG compression with estimation of primary compression parameters , 2011, 2011 18th IEEE International Conference on Image Processing.

[26]  Alessandro Piva,et al.  Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.