Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation

Digital multimedia forensics is an emerging field that has important applications in law enforcement and protection of public safety and national security. In digital imaging, JPEG is the most popular lossy compression standard and JPEG images are ubiquitous. Today’s digital techniques make it easy to tamper JPEG images without leaving any visible clues. Furthermore, most image tampering involves JPEG double compression, it heightens the need for accurate analysis of JPEG double compression in image forensics.In this paper, to improve the detection of JPEG double compression, we transplant the neighboring joint density features, which were designed for JPEG steganalysis, and merge the joint density features with marginal density features in DCT domain as the detector for learning classifiers. Experimental results indicate that the proposed method improves the detection performance. We also study the relationship among compression factor, image complexity, and detection accuracy, which has not been comprehensively analyzed before. The results show that a complete evaluation of the detection performance of different algorithms should necessarily include image complexity as well as the double compression quality factor.In addition to JPEG double compression, the identification of image capture source is an interesting topic in image forensics. Mobile handsets are widely used for spontaneous photo capture because they are typically carried by their users at all times. In the imaging device market, smartphone adoption is currently exploding and megapixel smartphones pose a threat to the traditional digital cameras. While smartphone images are widely disseminated, the manipulation of images is also easily performed with various photo editing tools. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. Following the success of our previous work in JPEG double compression detection, we conducted a study to identify smartphone source and post-capture manipulation by utilizing marginal density and neighboring joint density features together. Experimental results show that our method is highly promising for identifying both smartphone source and manipulations.Finally, our study also indicates that applying unsupervised clustering and supervised classification together leads to improvement in identifying smartphone sources and manipulations and thus provides a means to address the complexity issue of the intentional post-capture manipulation on smartphone images.

[1]  Nasir D. Memon,et al.  Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[2]  Bülent Sankur,et al.  Blind Identification of Source Cell-Phone Model , 2008, IEEE Transactions on Information Forensics and Security.

[3]  H. Farid Image Forgery Detection -- A survey , 2009 .

[4]  Mohammad Mehdi Ebadzadeh,et al.  Three new fuzzy neural networks learning algorithms based on clustering, training error and genetic algorithm , 2011, Applied Intelligence.

[5]  Husrev T. Sencar,et al.  Source Camera Identification Based on Sensor Dust Characteristics , 2007 .

[6]  Min-Jen Tsai,et al.  USING Image Features to Identify Camera Sources , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[7]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[8]  Qingzhong Liu,et al.  Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..

[9]  Alberto Leon-Garcia,et al.  Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video , 1995, IEEE Trans. Circuits Syst. Video Technol..

[10]  Qingzhong Liu,et al.  Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[11]  Qingzhong Liu,et al.  Neighboring joint density-based JPEG steganalysis , 2011, TIST.

[12]  Min-Jen Tsai,et al.  Camera/Mobile Phone Source Identification for Digital Forensics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[13]  Witold Pedrycz,et al.  A new selective neural network ensemble with negative correlation , 2012, Applied Intelligence.

[14]  Chang-Tsun Li,et al.  Source Camera Identification Using Enhanced Sensor Pattern Noise , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Ismail Avcibas,et al.  Source cell phone camera identification based on singular value decomposition , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[16]  Edmund Y. Lam,et al.  Source camera identification using footprints from lens aberration , 2006, Electronic Imaging.

[17]  Qingzhong Liu,et al.  Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..

[18]  Zeno J M H Geradts,et al.  Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images * , 2009, Journal of forensic sciences.

[19]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[20]  Tien D. Bui,et al.  Multivariate statistical modeling for image denoising using wavelet transforms , 2005, Signal Process. Image Commun..

[21]  Qingzhong Liu,et al.  Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery , 2011, MiFor '11.

[22]  Qingzhong Liu,et al.  A new approach for JPEG resize and image splicing detection , 2009, MiFor '09.

[23]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[24]  Qingzhong Liu,et al.  A Method to Detect JPEG-Based Double Compression , 2011, ISNN.

[25]  Qingzhong Liu,et al.  Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images , 2007, IJCAI.

[26]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[27]  Laura Diosan,et al.  Improving classification performance of Support Vector Machine by genetically optimising kernel shape and hyper-parameters , 2010, Applied Intelligence.

[28]  Brian J. d'Auriol,et al.  A novel feature selection method based on normalized mutual information , 2011, Applied Intelligence.

[29]  Wei Su,et al.  A machine learning based scheme for double JPEG compression detection , 2008, 2008 19th International Conference on Pattern Recognition.

[30]  Qingzhong Liu,et al.  Improved detection and evaluation for JPEG steganalysis , 2009, ACM Multimedia.

[31]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.