Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The paper presents two methods of prior JPEG-compression detection. In the first method the histogram of chrominance is analysed. In JPEG-compressed images the histogram contains significantly more local maxima than in uncompressed files. The second method is based on neighbouring pixel Ø value difference. In JPEG-compressed image the distribution of these values is different than the distribution counted on the edges of compression 8x8 blocks. These differences are summed up to create a classifier that allows to assess if the image was compressed.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Strony
17--28
Opis fizyczny
Bibliogr. 14 poz., fig., tab.
Twórcy
autor
- Lublin University of Technology, Nadbystrzycka 38D, 20-618 Lublin
Bibliografia
- 1. Bianchi, T., Piva, A., & Perez-Gonzalez, F. (2013). Near optimal detection of quantized signals and application to JPEG forensics. IEEE International Workshop on Information Forensics and Security (WIFS), 168-173. doi: 10.1109/WIFS.2013.6707813
- 2. Fridrich, J. (2005). Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Information Hiding. 6th International Workshop, 3200, 67-81. doi: 10.1007/978-3-540-30114-1_6
- 3. Fridrich, J., Goljan, M., & Du, R. (2001). Steganalysis based on JPEG compatibility. In A. G. Tescher, B. Vasudev, & V. M. Bove (Eds.), Multimedia Systems and Applications Iv (vol. 4518, pp. 275-280). doi:10.1117/12.448213
- 4. Kodovsky, J., & Fridrich, J. (2013). JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts. Information Hiding. 14th International Conference, 7692, 78-93. doi: 10.1007/978-3-642-36373-3_6
- 5. Lin, G. S., Chang, M. K., & Chen, Y. L. (2011). A Passive-Blind Forgery Detection Scheme Based on Content-Adaptive Quantization Table Estimation. IEEE Transactions on Circuits and Systems for Video Technology, 21(4), 421-434. doi:10.1109/tcsvt.2011.2125370
- 6. Liu, S. Z., & Bovik, A. C. (2002). Efficient DCT-Domain blind measurement and reduction of blocking artifacts. IEEE Transactions on Circuits and Systems for Video Technology, 12(12), 1139-1149. doi:10.1109/tcsvt.2002.806819
- 7. Lukáš, J., & Fridrich, J. (2003). Estimation of primary quantization matrix in double com-pressed JPEG images. Proc. Digital Forensic Research Workshop, 2, 5-8.
- 8. Pevny, T., & Fridrich, J. (2008). Detection of double-compression in JPEG images for appli-cations in steganography. IEEE Transactions on Information Forensics and Security, 3(2), 247-258.
- 9. Piva, A. (2013). An overview on image forensics. ISRN Signal Process, 2013, Article ID 496701, 22 pages. doi:10.1155/2013/496701
- 10. Popescu, A.C., & Farid, H. (2005). Statistical tools for digital forensics. Information Hiding. 6th International Workshop, 3200, 128-147. doi:10.1007/978-3-540-30114-1_10
- 11. Przybyłowicz, P. (2008). Matematyczne podstawy kompresji JPEG. Centrum Modelowania Matematycznego Sigma
- 12. Triantafyllidis, G. A., Tzovaras, D., & Strintzis, M. G. (2002). Blocking artifact detection and reduction in compressed data. IEEE Transactions on Circuits and Systems for Video Technology, 12(10), 877-890. doi:10.1109/tcsvt.2002.804880
- 13. Yang, J. Q., Zhu, G. P., Huang, J. W., & Zhao, X. (2015). Estimating JPEG compression history of bitmaps based on factor histogram. Digital Signal Processing, 41, 90-97. doi:10.1016/j.dsp.2015.03.014
- 14. Ye, S., Sun, Q., & Chang, E. C. (2007). Detecting digital image forgeries by measuring inconsistencies of blocking artifact. IEEE International Conference on Multimedia and Expo, 12-15. doi: 10.1109/ICME.2007.4284574
Uwagi
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2d87e828-ca99-4ba0-8e12-e4a4c506216f