메뉴 건너뛰기




Volumn 9, Issue 11, 2014, Pages 1933-1942

An effective method for detecting double JPEG compression with the same quantization matrix

Author keywords

Digital forensics; double JPEG compression; rounding error; truncation error

Indexed keywords

DIGITAL FORENSIC; DOUBLE JPEG COMPRESSIONS; QUANTIZATION MATRIX; ROUNDING ERRORS; TRUNCATION ERRORS;

EID: 84908040919     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2359368     Document Type: Article
Times cited : (121)

References (24)
  • 1
    • 0026142897 scopus 로고
    • The JPEG still picture compression standard
    • Apr.
    • G. K. Wallace, "The JPEG still picture compression standard," Commun. ACM, vol. 34, no. 4, pp. 30-44, Apr. 1991.
    • (1991) Commun ACM , vol.34 , Issue.4 , pp. 30-44
    • Wallace, G.K.1
  • 2
    • 0038005383 scopus 로고    scopus 로고
    • Identification of bitmap compression history: JPEG detection and quantizer estimation
    • Feb.
    • Z. Fan and R. L. de Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Trans. Image Process., vol. 12, no. 2, pp. 230-235, Feb. 2003.
    • (2003) IEEE Trans. Image Process. , vol.12 , Issue.2 , pp. 230-235
    • Fan, Z.1    De Queiroz, R.L.2
  • 4
    • 77955676537 scopus 로고    scopus 로고
    • JPEG error analysis and its applications to digital image forensics
    • Sep.
    • W. Luo, J. Huang, and G. Qiu, "JPEG error analysis and its applications to digital image forensics," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 480-491, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 480-491
    • Luo, W.1    Huang, J.2    Qiu, G.3
  • 5
    • 84861122288 scopus 로고    scopus 로고
    • Image forgery localization via block-grained analysis of JPEG artifacts
    • Jun.
    • T. Bianchi and A. Piva, "Image forgery localization via block-grained analysis of JPEG artifacts," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1003-1017, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 1003-1017
    • Bianchi, T.1    Piva, A.2
  • 6
    • 60449117421 scopus 로고    scopus 로고
    • Exposing digital forgeries from JPEG ghosts
    • Mar.
    • H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 154-160
    • Farid, H.1
  • 7
    • 67649410199 scopus 로고    scopus 로고
    • Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
    • Nov.
    • Z. Lin, J. He, X. Tang, and C.-K. Tang, "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognit., vol. 42, no. 11, pp. 2492-2501, Nov. 2009.
    • (2009) Pattern Recognit. , vol.42 , Issue.11 , pp. 2492-2501
    • Lin, Z.1    He, J.2    Tang, X.3    Tang, C.-K.4
  • 8
    • 33847714243 scopus 로고    scopus 로고
    • Estimation of primary quantization matrix in double compressed JPEG images
    • J. Lukás and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," in Proc. Digit. Forensic Res. Workshop, 2003, pp. 5-8.
    • (2003) Proc. Digit. Forensic Res. Workshop , pp. 5-8
    • Lukás, J.1    Fridrich, J.2
  • 10
    • 34250355507 scopus 로고    scopus 로고
    • A generalized Benford's law for JPEG coefficients and its applications in image forensics
    • Feb.
    • D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," Proc. SPIE, vol. 6505, p. 65051L, Feb. 2007.
    • (2007) Proc. SPIE , vol.6505 , pp. 65051L
    • Fu, D.1    Shi, Y.Q.2    Su, W.3
  • 11
    • 58049107658 scopus 로고    scopus 로고
    • Detecting doubly compressed JPEG images by using mode based first digit features
    • Oct.
    • B. Li, Y. Q. Shi, and J. Huang, "Detecting doubly compressed JPEG images by using mode based first digit features," in Proc. IEEE Int. Workshop Multimedia Signal Process., Oct. 2008, pp. 730-735.
    • (2008) Proc IEEE Int. Workshop Multimedia Signal Process. , pp. 730-735
    • Li, B.1    Shi, Y.Q.2    Huang, J.3
  • 12
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression in JPEG images for applications in steganography
    • Jun.
    • T. Pevný and J. Fridrich, "Detection of double-compression in JPEG images for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.2 , pp. 247-258
    • Pevný, T.1    Fridrich, J.2
  • 13
    • 77955699524 scopus 로고    scopus 로고
    • A machine learning based scheme for double JPEG compression detection
    • Dec.
    • C. Chen, Y. Q. Shi, and W. Su, "A machine learning based scheme for double JPEG compression detection," in Proc. 19th Int. Conf. Pattern Recognit., Dec. 2008, pp. 1-4.
    • (2008) Proc. 19th Int. Conf. Pattern Recognit , pp. 1-4
    • Chen, C.1    Shi, Y.Q.2    Su, W.3
  • 14
    • 84937814312 scopus 로고    scopus 로고
    • F5-A steganographic algorithm: High capacity despite better steganalysis
    • A. Westfeld, "F5-A steganographic algorithm: High capacity despite better steganalysis," in Proc. 4th Int. Workshop Inf. Hiding, 2001, pp. 289-302.
    • (2001) Proc. 4th Int. Workshop Inf. Hiding , pp. 289-302
    • Westfeld, A.1
  • 15
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Aug.
    • N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX Secur. Symp., Aug. 2001, pp. 323-336.
    • (2001) Proc. 10th USENIX Secur. Symp , pp. 323-336
    • Provos, N.1
  • 16
    • 78649396720 scopus 로고    scopus 로고
    • Detecting double JPEG compression with the same quantization matrix
    • Dec.
    • F. Huang, J. Huang, and Y. Q. Shi, "Detecting double JPEG compression with the same quantization matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 848-856, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 848-856
    • Huang, F.1    Huang, J.2    Shi, Y.Q.3
  • 17
    • 84890509559 scopus 로고    scopus 로고
    • Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection
    • May
    • S. Lai and R. Böhme, "Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., May 2013, pp. 3028-3032.
    • (2013) Proc IEEE Int. Conf. Acoust., Speech, Signal Process. , pp. 3028-3032
    • Lai, S.1    Böhme, R.2
  • 18
    • 79957470147 scopus 로고    scopus 로고
    • Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
    • Jun.
    • Y.-L. Chen and C.-T. Hsu, "Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 396-406, Jun. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.2 , pp. 396-406
    • Chen, Y.-L.1    Hsu, C.-T.2
  • 19
    • 84858394859 scopus 로고    scopus 로고
    • Detection of nonaligned double JPEG compression based on integer periodicity maps
    • Apr.
    • T. Bianchi and A. Piva, "Detection of nonaligned double JPEG compression based on integer periodicity maps," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 842-848, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 842-848
    • Bianchi, T.1    Piva, A.2
  • 20
    • 34547529764 scopus 로고    scopus 로고
    • A novel method for detecting cropped and recompressed image block
    • Apr.
    • W. Luo, Z. Qu, J. Huang, and G. Qiu, "A novel method for detecting cropped and recompressed image block," in Proc. IEEE ICASSP, vol. 2. Apr. 2007, pp. 217-220.
    • (2007) Proc IEEE ICASSP , vol.2 , pp. 217-220
    • Luo, W.1    Qu, Z.2    Huang, J.3    Qiu, G.4
  • 21
    • 84878464981 scopus 로고    scopus 로고
    • Image tampering localization via estimating the non-aligned double JPEG compression
    • Mar.
    • L. Wu, X. Kong, B. Wang, and S. Shang, "Image tampering localization via estimating the non-aligned double JPEG compression," Proc. SPIE, vol. 8665, p. 86650R, Mar. 2013.
    • (2013) Proc. SPIE , vol.8665 , pp. 86650R
    • Wu, L.1    Kong, X.2    Wang, B.3    Shang, S.4
  • 23
    • 8844280843 scopus 로고    scopus 로고
    • UCID-An uncompressed colour image database
    • Jan.
    • G. Schaefer and M. Stich, "UCID-An uncompressed colour image database," Proc. SPIE, pp. 472-480, Jan. 2004.
    • (2004) Proc. SPIE , pp. 472-480
    • Schaefer, G.1    Stich, M.2
  • 24
    • 84908038808 scopus 로고    scopus 로고
    • NRCS Photo Gallery[Online]. Available accessed Sep. 1, 2012
    • NRCS Photo Gallery.[Online]. Available: http://photogallery.nrcs. usda.gov, accessed Sep. 1, 2012.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.