메뉴 건너뛰기




Volumn 8, Issue 2, 2013, Pages 335-349

Revealing the traces of JPEG compression anti-forensics

Author keywords

Anti forensics; digital image forensics; JPEG compression

Indexed keywords

ANTI-FORENSICS; COMPRESSED IMAGES; DCT DOMAIN; DIGITAL IMAGE FORENSICS; DISCRETE COSINE TRANSFORM COEFFICIENTS; FORENSIC ANALYST; JPEG COMPRESSION; LARGE IMAGES; LOSSLESS; LOSSY NATURE; NOISE SIGNALS; ORIGINAL IMAGES; PROCESSING CHAIN; QUANTIZATION MATRIX; TRANSFORM CODING;

EID: 84872328080     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2234117     Document Type: Article
Times cited : (68)

References (35)
  • 1
    • 80051643956 scopus 로고    scopus 로고
    • The cost of JPEG compression anti-forensics
    • Speech, and Signal Processing, Prague, Czech Republic, May 2011
    • G. Valenzise, M. Tagliasacchi, and S. Tubaro, "The cost of JPEG compression anti-forensics," in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, Prague, Czech Republic, May 2011.
    • Proc. Int. Conf. Acoustics
    • Valenzise, G.1    Tagliasacchi, M.2    Tubaro, S.3
  • 3
    • 85032768213 scopus 로고    scopus 로고
    • Image forgery detection
    • Mar
    • H. Farid, "Image forgery detection," IEEE Signal Process. Mag., vol. 26, no. 2, pp. 16-25, Mar. 2009.
    • (2009) IEEE Signal Process. Mag , vol.26 , Issue.2 , pp. 16-25
    • Farid, H.1
  • 6
    • 0038005383 scopus 로고    scopus 로고
    • Identification of bitmap compression history: JPEG detection and quantizer estimation
    • Feb
    • Z. Fan and R. L. de Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Trans. Image Process., vol. 12, no. 2, pp. 230-235, Feb. 2003.
    • (2003) IEEE Trans. Image Process , vol.12 , Issue.2 , pp. 230-235
    • Fan, Z.1    De Queiroz, R.L.2
  • 7
    • 69749097361 scopus 로고    scopus 로고
    • Digital image source coder forensics via intrinsic fingerprints
    • Sep
    • W. S. Lin, S. K. Tjoa, H. V. Zhao, and K. J. Liu, "Digital image source coder forensics via intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 460-475, Sep. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.3 , pp. 460-475
    • Lin, W.S.1    Tjoa, S.K.2    Zhao, H.V.3    Liu, K.J.4
  • 8
    • 13244251141 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting traces of resampling
    • DOI 10.1109/TSP.2004.839932
    • A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005. (Pubitemid 40181769)
    • (2005) IEEE Transactions on Signal Processing , vol.53 , Issue.2 , pp. 758-767
    • Popescu, A.C.1    Farid, H.2
  • 10
    • 77955707653 scopus 로고    scopus 로고
    • Forensic detection of image manipulation using statistical intrinsic fingerprints
    • Sep.
    • M. C. Stamm and K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492-506, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 492-506
    • Stamm, M.C.1    Liu, K.J.R.2
  • 12
    • 77955699524 scopus 로고    scopus 로고
    • A machine learning based scheme for double JPEG compression detection
    • C. Chen, Y. Q. Shi, and W. Su, "A machine learning based scheme for double JPEG compression detection," in Proc. Int. Conf. Pattern Recognition, 2008, pp. 1-4.
    • (2008) Proc. Int. Conf. Pattern Recognition , pp. 1-4
    • Chen, C.1    Shi, Y.Q.2    Su, W.3
  • 14
    • 78649396720 scopus 로고    scopus 로고
    • Detecting double JPEG compression with the same quantization matrix
    • Dec.
    • F. Huang, J. Huang, and Y. Q. Shi, "Detecting double JPEG compression with the same quantization matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 848-856, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 848-856
    • Huang, F.1    Huang, J.2    Shi, Y.Q.3
  • 19
    • 78651088596 scopus 로고    scopus 로고
    • Undetectable image tampering through JPEG compression anti-forensics
    • Hong Kong, Sep
    • M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, "Undetectable image tampering through JPEG compression anti-forensics," in Proc. Int. Conf. Image Process., Hong Kong, Sep. 2010, pp. 2109-2112.
    • (2010) Proc. Int. Conf. Image Process , pp. 2109-2112
    • Stamm, M.C.1    Tjoa, S.K.2    Lin, W.S.3    Liu, K.J.R.4
  • 20
    • 78650003881 scopus 로고    scopus 로고
    • Security analysis on spatial 1 steganography for JPEG decompressed images
    • Jan.
    • W. Luo, Y. Wang, and J. Huang, "Security analysis on spatial 1 steganography for JPEG decompressed images," IEEE Signal Process. Lett., vol. 18, no. 1, pp. 39-42, Jan. 2011.
    • (2011) IEEE Signal Process. Lett , vol.18 , Issue.1 , pp. 39-42
    • Luo, W.1    Wang, Y.2    Huang, J.3
  • 21
    • 60449117421 scopus 로고    scopus 로고
    • Exposing digital forgeries from JPEG ghosts
    • Mar
    • H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 154-160
    • Farid, H.1
  • 23
    • 80053033238 scopus 로고    scopus 로고
    • Countering counter-forensics: The case of JPEG compression
    • New York: Springer
    • S. Y. Lai and R. Böhme, "Countering counter-forensics: The case of JPEG compression," in Information Hiding. New York: Springer, 2011, pp. 285-298.
    • (2011) Information Hiding , pp. 285-298
    • Lai, S.Y.1    Böhme, R.2
  • 25
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Jun.
    • T. Pevny, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevny, T.1    Bas, P.2    Fridrich, J.3
  • 26
    • 84861122288 scopus 로고    scopus 로고
    • Image forgery localization via block-grained analysis of JPEG artifacts
    • Jun.
    • T. Bianchi and A. Piva, "Image forgery localization via block-grained analysis of JPEG artifacts," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1003-1017, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 1003-1017
    • Bianchi, T.1    Piva, A.2
  • 28
    • 84872317275 scopus 로고    scopus 로고
    • The Independent JPEG Group [Online] Available:
    • The Independent JPEG Group [Online]. Available: http://www.ijg.org/
  • 29
    • 84872329785 scopus 로고
    • Recommendation T.81: Digital Compression and Coding of Continuous-Tone Still Images ISO/IEC 10918-1, ITU-T
    • Recommendation T.81: Digital Compression and Coding of Continuous-Tone Still Images, ISO/IEC 10918-1, ITU-T, 1991.
    • (1991)
  • 30
    • 0034298708 scopus 로고    scopus 로고
    • A mathematical analysis of the DCT coefficient distributions for images
    • Oct
    • E. Y. Lam and J. W. Goodman, "A mathematical analysis of the DCT coefficient distributions for images," IEEE Trans. Image Process., vol. 9, no. 10, pp. 1661-1666, Oct. 2000.
    • (2000) IEEE Trans. Image Process , vol.9 , Issue.10 , pp. 1661-1666
    • Lam, E.Y.1    Goodman, J.W.2
  • 31
    • 0033357462 scopus 로고    scopus 로고
    • Biased reconstruction for JPEG decoding
    • DOI 10.1109/97.803427
    • J. R. Price and M. Rabbani, "Biased reconstruction for JPEG decoding," IEEE Signal Process. Lett., vol. 6, no. 12, pp. 297-299, Dec. 1999. (Pubitemid 30519148)
    • (1999) IEEE Signal Processing Letters , vol.6 , Issue.12 , pp. 297-299
    • Price, J.R.1    Rabbani, M.2
  • 33
    • 44049111982 scopus 로고
    • Nonlinear total variation based noise removal algorithms
    • L. I. Rudin, S. Osher, and E. Fatemi, "Nonlinear total variation based noise removal algorithms," Physica D: Nonlinear Phenomena, vol. 60, no. 1-4, pp. 259-268, 1992.
    • (1992) Physica D: Nonlinear Phenomena , vol.60 , Issue.1-4 , pp. 259-268
    • Rudin, L.I.1    Osher, S.2    Fatemi, E.3
  • 34
    • 25144471298 scopus 로고    scopus 로고
    • Score normalization in multimodal biometric systems
    • DOI 10.1016/j.patcog.2005.01.012, PII S0031320305000592
    • A. K. Jain, K. Nandakumar, and A. Ross, "Score normalization in multimodal biometric systems," Pattern Recognit., vol. 38, no. 12, pp. 2270-2285, 2005. (Pubitemid 41336698)
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2270-2285
    • Jain, A.1    Nandakumar, K.2    Ross, A.3
  • 35
    • 84872281737 scopus 로고    scopus 로고
    • NRCS Photo Gallery [Online] Available:
    • NRCS Photo Gallery [Online]. Available: http://photogallery.nrcs. usda.gov/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.