Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








627 Hits in 4.3 sec

JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics

Thanh Hai Thai, Remi Cogranne, Florent Retraint, Thi-Ngoc-Canh Doan
2017 IEEE Transactions on Information Forensics and Security  
The goal of the paper is to propose an accurate method for estimating quantization steps from an image that has been previously JPEG-compressed and stored in lossless format.  ...  The proposed method can also be exploited to estimate the secondary quantization table in a double-JPEG compressed image stored in lossless format, and detect the presence of JPEG compression.  ...  Compared with passive forensics, active forensics that relies on extrinsic security measures such as digital watermarks [3] and digital signatures [4] is of limited application due to many strict constraints  ... 
doi:10.1109/tifs.2016.2604208 fatcat:ypi7g2pyc5dg7a5mk4hmlp7vjy

Image Compression Using Anti-Forensics Method

Sreelakshmi M.S, Venkataraman D
2013 International Journal of Computer Science Engineering and Applications  
In this paper anti-forensics method for digital image compression has been proposed. This anti-forensics method is capable of removing the traces of image compression.  ...  This method is targeted to remove the compression fingerprints of JPEG compression.  ...  FORENSICS METHODS TO DETECT JPEG COMPRESSION JPEG image format is popularly used in most digital cameras and image processing software.  ... 
doi:10.5121/ijcsea.2013.3108 fatcat:4lktmzpouncqpgda4jauxwpnj4

Image compression using anti-forensics method [article]

M.S.Sreelakshmi, D. Venkataraman
2013 arXiv   pre-print
In this paper anti-forensics method for digital image compression has been proposed. This anti-forensics method is capable of removing the traces of image compression.  ...  This method is targeted to remove the compression fingerprints of JPEG compression.  ...  FORENSICS METHODS TO DETECT JPEG COMPRESSION JPEG image format is popularly used in most digital cameras and image processing software.  ... 
arXiv:1303.2330v1 fatcat:yk7etmqmwrcfdjt66xg7lqajpm

Anti-forensics of digital image compression

Matthew C. Stamm, K.J. Ray Liu
2011 IEEE Transactions on Information Forensics and Security  
As society has become increasingly reliant upon digital images to communicate visual information, a number of forensic techniques have been developed to verify the authenticity of digital images.  ...  Furthermore, we show how these techniques can be used to render several forms of image tampering such as double JPEG compression, cut-and-paste image forgery, and image origin falsification undetectable  ...  This technique detects previous applications of JPEG compression by using the DCT coefficient distributions to estimate the quantization step size used in each DCT subband during JPEG compression.  ... 
doi:10.1109/tifs.2011.2119314 fatcat:2m52cotd2za3tlnxadw57s2qhi

Undetectable image tampering through JPEG compression anti-forensics

M C Stamm, S K Tjoa, W S Lin, K J R Liu
2010 2010 IEEE International Conference on Image Processing  
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting image forgeries.  ...  in decoded images, determine an image's origin, detect double JPEG compression, and identify cut-and-paste image forgeries.  ...  As was previously discussed, when an image undergoes its initial application of JPEG compression, each set of DCT coefficients are clustered around integer multiples of the quantization step size.  ... 
doi:10.1109/icip.2010.5652553 dblp:conf/icip/StammTLL10 fatcat:2yhjvdsixngqxiuwf4u6ejhdju

A Survey of Blind Forensics Techniques for JPEG Image Tampering

Xueling Chu, Haiming Li
2019 Journal of Computer and Communications  
Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security.  ...  Finally, the existing problems and future research trends were analyzed and prospected to provide further theoretical support for the research of JPEG image blind forensics technology.  ...  The estimated quantization step obtained by Fridrich et al. was extracted by estimating DCT coefficient and quantization step compatibility [7] .  ... 
doi:10.4236/jcc.2019.710001 fatcat:uvwe6efzb5dgjmftakisbqfuni

JPEG Error Analysis and Its Applications to Digital Image Forensics

Weiqi Luo, Jiwu Huang, Guoping Qiu
2010 IEEE Transactions on Information Forensics and Security  
has previously been JPEG compressed, estimating the quantization steps of a JPEG image and detecting the quantization table of a JPEG image.  ...  In this paper, we introduce JPEG error analysis to the study of image forensics. The main errors of JPEG include quantization, rounding and truncation errors.  ...  ACKNOWLEDGMENT The authors would like to thank Dr. Dongdong Fu at New Jersey Institute of Technology, New Jersey, USA, and YuanGen Wang at Sun Yat-Sen Univ.  ... 
doi:10.1109/tifs.2010.2051426 fatcat:s374adiewfgpdfxfsd7p56qlka

A generalized Benford's law for JPEG coefficients and its applications in image forensics

Dongdong Fu, Yun Q. Shi, Wei Su
2007 Security, Steganography, and Watermarking of Multimedia Contents IX  
Furthermore, some potential applications of this model in image forensics are discussed in this paper, which include the detection of JPEG compression for images in bitmap format, the estimation of JPEG  ...  In this paper, a novel statistical model based on Benford's law for the probability distributions of the first digits of the block-DCT and quantized JPEG coefficients is presented.  ...  APPLICATIONS IN IMAGE FORENSICS We have shown in the above section that the distribution of the first digits of the JPEG coefficients of a JPEG compressed image follows a logarithmic law and its empirical  ... 
doi:10.1117/12.704723 dblp:conf/sswmc/FuSS07 fatcat:tsd37pymgng75dcyxjx7qbdbdi

Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact

Shuiming Ye, Qibin Sun, Ee-Chien Chang
2007 Multimedia and Expo, 2007 IEEE International Conference on  
Given a digital image, we find that the blocking artifacts introduced during JPEG compression could be used as a "natural authentication code".  ...  Digital images can be forged easily with today's widely available image processing software.  ...  Manufacturers of digital cameras and image processing software typically use different JPEG quantization table to balance compression ratio and image quality.  ... 
doi:10.1109/icme.2007.4284574 dblp:conf/icmcs/YeSC07 fatcat:dxidfndo5vhd7a2puuiau5b7ba

A Novelty Approach on Forgery Digital Image Detection based Image Source Identification ANN

Muthu Kumar K
2015 International Journal on Computational Science & Applications  
Hence, the image forgery detection technique plays an important role in verifying the integrity of digital image forensics for authentication.  ...  Malicious and digital imaging (digital products) tamper detection is the subject of this article.  ...  application IJG) quantization certain JPEG applications.  ... 
doi:10.5121/ijcsa.2015.5105 fatcat:mgn7yukgqjgxxatt2sk2zjievu

Estimating JPEG2000 compression for image forensics using Benford's Law

Ghulam Qadir, Xi Zhao, Anthony T. S. Ho, Peter Schelkens, Touradj Ebrahimi, Gabriel Cristóbal, Frédéric Truchetet, Pasi Saarikko
2010 Optics, Photonics, and Digital Technologies for Multimedia Applications  
In this paper, we propose the novel use of Benford's Law for estimating JPEG2000 compression for image forensics applications.  ...  More recently, Benford's Law has been further applied to image processing and image forensics.  ...  ACKNOWLEDGEMENTS Ghulam Qadir would like to acknowledge the financial support of COMSATS Institute of Information Technology, Islamabad, Pakistan for the sponsorship of his PhD scholarship.  ... 
doi:10.1117/12.855085 fatcat:mtm4bogrg5ep3bw4dhkczqafwy

Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification

Weiqi Luo, Yuangen Wang, Jiwu Huang
2010 IEEE Transactions on Information Forensics and Security  
Index Terms-Digital image forensics, quantization artifacts, source encoder identification.  ...  In this paper, we first analyze the properties of the quantized coefficients and present a simple yet effective way to detect the quantization artifacts, and then we propose an approach to identify the  ...  His research interests include digital video watermarking and video compression, image copy detection, and digital forensics.  ... 
doi:10.1109/tifs.2010.2074195 fatcat:grr3p6akgnhkxk7y23snp6j7hq

Exposing Digital Forgeries From JPEG Ghosts

H. Farid
2009 IEEE Transactions on Information Forensics and Security  
This approach is applicable to images of high and low quality and resolution.  ...  When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person's head onto another person's body.  ...  As such there is a need for forensic tools that are specifically applicable to detecting tampering in low quality images.  ... 
doi:10.1109/tifs.2008.2012215 fatcat:tjyqsf26lzcsplpeb47d3rlw4m

Digital image source coder forensics via intrinsic fingerprints

W.S. Lin, S.K. Tjoa, H.V. Zhao, K.J.R. Liu
2009 IEEE Transactions on Information Forensics and Security  
Source coding is a common step of natural image acquisition, so in this paper, we focus on the fundamental research on digital image source coder forensics via intrinsic fingerprints.  ...  Therefore, there is great interest in developing forensic tools via intrinsic fingerprints to solve these problems.  ...  Image forensics offers the ability to verify the credibility and validate the origin of digital images.  ... 
doi:10.1109/tifs.2009.2024715 fatcat:gp6atz45wbewxphswccy2qd45y

A Tailored Anti-forensic Technique for Digital Image Applications

S. Manimurugan, Athira B. Kaimal
2012 International Journal of Computer Applications  
The existing methods for identification of bitmap compression history are JPEG detection and Quantizer estimation. The JPEG detection is used to find whether the image has been previously compressed.  ...  Then it also explains how this can be used to perform unnoticeable forgeries on the bitmap images. It can be done by the estimation, examination and alteration in the transform coefficients of image.  ...  Consider the case, if one wants to remove JPEG artifacts or for JPEG re-compression, the existing techniques show it can be detected through JPEG detection and Quantizer estimation [1].  ... 
doi:10.5120/8448-2241 fatcat:7njdaeg3orecxou2m4f7x53kly
« Previous Showing results 1 — 15 out of 627 results