Downscaling Factor Estimation on Pre-JPEG Compressed Images

Resampling detection is one of the most important topics in image forensics, and the most widely used method in resampling detection is spectral analysis. Since JPEG is the most widely used image format, it is reasonable that the resampling operation is processed on JPEG images. JPEG block artifacts bring severe interference to spectrum-based methods and degrade the detection performance. In addition, the spectral characteristics of the downscaling scenarios are very weak. The detection of downscaling still presents a considerable challenge to forensic applications. In this paper, we propose a method to estimate the downscaling factors of pre-JPEG compressed images in the presence of image downscaling after JPEG compressions. We first analyze the spectrum of scaled images and give an exact formulation of how the scaling factors influence the appearance of periodic artifacts. The expected positions of the characteristic resampling peaks are analytically derived. For the downscaling scenario, the shifted JPEG block artifacts produce periodic peaks, which cause misdetection in the characteristic peak. We find that the interval between the adjacent extrema of difference images obeys the geometric distribution and the distribution has periodic peaks for JPEG images. Hence, we adopt the difference image extremum interval histogram and combine the spectral method to obtain the final estimation. The experimental results demonstrate that the proposed detection method outperforms some state-of-the-art methods.

[1]  Chun-Wei Wang,et al.  Effective Detection for Linear Up-Sampling by a Factor of Fraction , 2012, IEEE Transactions on Image Processing.

[2]  Jiangqun Ni,et al.  Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications , 2017, IEEE Transactions on Image Processing.

[3]  George Athanasopoulos,et al.  Forecasting: principles and practice , 2013 .

[4]  Babak Mahdian,et al.  Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .

[5]  Xinbo Gao,et al.  A learning-to-rank approach for image scaling factor estimation , 2016, Neurocomputing.

[6]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[7]  Anindya Sarkar,et al.  Adding Gaussian noise to “denoise” JPEG for detecting image resizing , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[8]  Matthias Kirchner,et al.  On resampling detection in re-compressed images , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[9]  F. Wilcoxon Individual Comparisons by Ranking Methods , 1945 .

[10]  Andrew C. Gallagher Detection of linear and cubic interpolation in JPEG compressed images , 2005, The 2nd Canadian Conference on Computer and Robot Vision (CRV'05).

[11]  David Vazquez-Padin,et al.  ML estimation of the resampling factor , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[12]  Nanning Zheng,et al.  Moment feature based forensic detection of resampled digital images , 2013, ACM Multimedia.

[13]  Ingemar J. Cox,et al.  Normalized Energy Density-Based Forensic Detection of Resampled Images , 2012, IEEE Transactions on Multimedia.

[14]  Jiangqun Ni,et al.  Effective Estimation of Image Rotation Angle Using Spectral Method , 2014, IEEE Signal Processing Letters.

[15]  Matthias Kirchner,et al.  Linear row and column predictors for the analysis of resized images , 2010, MM&Sec '10.

[16]  Matthias Kirchner,et al.  Spectral methods to determine the exact scaling factor of resampled digital images , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.

[17]  Matthias Kirchner,et al.  Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.

[18]  Stefan Katzenbeisser,et al.  Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine , 2013, Communications and Multimedia Security.

[19]  David Vazquez-Padin,et al.  An SVD approach to forensic image resampling detection , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).

[20]  David Vazquez-Padin,et al.  Two-dimensional statistical test for the presence of almost cyclostationarity on images , 2010, 2010 IEEE International Conference on Image Processing.

[21]  J. Wolfowitz,et al.  Optimum Character of the Sequential Probability Ratio Test , 1948 .

[22]  Rainer Böhme,et al.  Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity , 2017, IH&MMSec.

[23]  Fernando Pérez-González,et al.  On the role of differentiation for resampling detection , 2010, 2010 IEEE International Conference on Image Processing.

[24]  Fernando Pérez-González,et al.  A Random Matrix Approach to the Forensic Analysis of Upscaled Images , 2017, IEEE Transactions on Information Forensics and Security.

[25]  Alessandro Piva,et al.  Reverse engineering of double JPEG compression in the presence of image resizing , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[26]  Xinpeng Zhang,et al.  Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery , 2010, IEEE Transactions on Information Forensics and Security.

[27]  Ingemar J. Cox,et al.  An energy-based method for the forensic detection of Re-sampled images , 2011, 2011 IEEE International Conference on Multimedia and Expo.

[28]  V. Mankar,et al.  Blind method for rescaling detection and rescale factor estimation in digital images using periodic properties of interpolation , 2014 .

[29]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[30]  David Vazquez-Padin,et al.  Prefilter design for forensic resampling estimation , 2011, 2011 IEEE International Workshop on Information Forensics and Security.