http://iet.metastore.ingenta.com
1887

Accurate estimation of primary quantisation table with applications to tampering detection

Accurate estimation of primary quantisation table with applications to tampering detection

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

There are many ways to accurately estimate the low-frequency region of the primary quantisation table in a double compressed JPEG image with different quality factors. However, they cannot accurately estimate the high-frequency region. An image compression model to describe the relationship between the primary compression and the second compression is used to present a simple approach to accurately estimate the whole primary quantisation table, and based on this, an efficient method for detection of image tampering involving JPEG recompression is proposed. The effectiveness of the proposed algorithms is tested by experiments and the experimental results are presented.

References

    1. 1)
      • A.C. Popescu , H. Farid .
        1. Popescu, A.C., Farid, H.: ‘Statistical tools for digital forensics’. Proc. 6th Int. Workshop on Information Hiding, Toronto, Canada, 2004.
        . Proc. 6th Int. Workshop on Information Hiding
    2. 2)
      • H. Farid .
        2. Farid, H.: ‘A survey of image forgery detection’, IEEE Signal Process., 2009, 2, (26), pp. 622645.
        . IEEE Signal Process. , 26 , 622 - 645
    3. 3)
      • W. Luo , J. Huang , G. Qiu .
        3. Luo, W., Huang, J., Qiu, G.: ‘JPEG error analysis and its applications to digital image forensics’, IEEE Trans. Inf. Forensics Sec., 2010, 5, (3), pp. 480491 (doi: 10.1109/TIFS.2010.2051426).
        . IEEE Trans. Inf. Forensics Sec. , 3 , 480 - 491
    4. 4)
      • J. Lukas , J. Fridrich .
        4. Lukas, J., Fridrich, J.: ‘Estimation of primary quantization matrix in double compressed JPEG images’. Digital Forensic Research Workshop, Cleveland, OH, USA, August 2003.
        . Digital Forensic Research Workshop
    5. 5)
      • T. Bianchi , A.D. Rosa , A. Piva .
        5. Bianchi, T., Rosa, A.D., Piva, A.: ‘Improved DCT coefficient analysis for forgery localization JPEG images’. Proc. ICSSSP 2011, Prague, Czech Republic, May 2011, pp. 24442447.
        . Proc. ICSSSP 2011 , 2444 - 2447
    6. 6)
      • S. Lin , M. Chang , Y. Chen .
        6. Lin, S., Chang, M., Chen, Y.: ‘A passive-blind forgery detection scheme based on content-adaptive quantization table estimation’, IEEE Trans. Circuits Syst. Video Technol., 2011, 21, (4), pp. 421434 (doi: 10.1109/TCSVT.2011.2125370).
        . IEEE Trans. Circuits Syst. Video Technol. , 4 , 421 - 434
    7. 7)
      • T. Bianchi , A. Piva .
        7. Bianchi, T., Piva, A.: ‘Image forgery localization via block-grained analysis of JPEG artifacts’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (3), pp. 10031017 (doi: 10.1109/TIFS.2012.2187516).
        . IEEE Trans. Inf. Forensics Sec. , 3 , 1003 - 1017
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2013.2218
Loading

Related content

content/journals/10.1049/el.2013.2218
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address