A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
2017
IEEE Transactions on Information Forensics and Security
The goal of the paper is to propose an accurate method for estimating quantization steps from an image that has been previously JPEG-compressed and stored in lossless format. ...
The proposed method can also be exploited to estimate the secondary quantization table in a double-JPEG compressed image stored in lossless format, and detect the presence of JPEG compression. ...
Compared with passive forensics, active forensics that relies on extrinsic security measures such as digital watermarks [3] and digital signatures [4] is of limited application due to many strict constraints ...
doi:10.1109/tifs.2016.2604208
fatcat:ypi7g2pyc5dg7a5mk4hmlp7vjy
Image Compression Using Anti-Forensics Method
2013
International Journal of Computer Science Engineering and Applications
In this paper anti-forensics method for digital image compression has been proposed. This anti-forensics method is capable of removing the traces of image compression. ...
This method is targeted to remove the compression fingerprints of JPEG compression. ...
FORENSICS METHODS TO DETECT JPEG COMPRESSION JPEG image format is popularly used in most digital cameras and image processing software. ...
doi:10.5121/ijcsea.2013.3108
fatcat:4lktmzpouncqpgda4jauxwpnj4
Image compression using anti-forensics method
[article]
2013
arXiv
pre-print
In this paper anti-forensics method for digital image compression has been proposed. This anti-forensics method is capable of removing the traces of image compression. ...
This method is targeted to remove the compression fingerprints of JPEG compression. ...
FORENSICS METHODS TO DETECT JPEG COMPRESSION JPEG image format is popularly used in most digital cameras and image processing software. ...
arXiv:1303.2330v1
fatcat:yk7etmqmwrcfdjt66xg7lqajpm
Anti-forensics of digital image compression
2011
IEEE Transactions on Information Forensics and Security
As society has become increasingly reliant upon digital images to communicate visual information, a number of forensic techniques have been developed to verify the authenticity of digital images. ...
Furthermore, we show how these techniques can be used to render several forms of image tampering such as double JPEG compression, cut-and-paste image forgery, and image origin falsification undetectable ...
This technique detects previous applications of JPEG compression by using the DCT coefficient distributions to estimate the quantization step size used in each DCT subband during JPEG compression. ...
doi:10.1109/tifs.2011.2119314
fatcat:2m52cotd2za3tlnxadw57s2qhi
Undetectable image tampering through JPEG compression anti-forensics
2010
2010 IEEE International Conference on Image Processing
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting image forgeries. ...
in decoded images, determine an image's origin, detect double JPEG compression, and identify cut-and-paste image forgeries. ...
As was previously discussed, when an image undergoes its initial application of JPEG compression, each set of DCT coefficients are clustered around integer multiples of the quantization step size. ...
doi:10.1109/icip.2010.5652553
dblp:conf/icip/StammTLL10
fatcat:2yhjvdsixngqxiuwf4u6ejhdju
A Survey of Blind Forensics Techniques for JPEG Image Tampering
2019
Journal of Computer and Communications
Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. ...
Finally, the existing problems and future research trends were analyzed and prospected to provide further theoretical support for the research of JPEG image blind forensics technology. ...
The estimated quantization step obtained by Fridrich et al. was extracted by estimating DCT coefficient and quantization step compatibility [7] . ...
doi:10.4236/jcc.2019.710001
fatcat:uvwe6efzb5dgjmftakisbqfuni
JPEG Error Analysis and Its Applications to Digital Image Forensics
2010
IEEE Transactions on Information Forensics and Security
has previously been JPEG compressed, estimating the quantization steps of a JPEG image and detecting the quantization table of a JPEG image. ...
In this paper, we introduce JPEG error analysis to the study of image forensics. The main errors of JPEG include quantization, rounding and truncation errors. ...
ACKNOWLEDGMENT The authors would like to thank Dr. Dongdong Fu at New Jersey Institute of Technology, New Jersey, USA, and YuanGen Wang at Sun Yat-Sen Univ. ...
doi:10.1109/tifs.2010.2051426
fatcat:s374adiewfgpdfxfsd7p56qlka
A generalized Benford's law for JPEG coefficients and its applications in image forensics
2007
Security, Steganography, and Watermarking of Multimedia Contents IX
Furthermore, some potential applications of this model in image forensics are discussed in this paper, which include the detection of JPEG compression for images in bitmap format, the estimation of JPEG ...
In this paper, a novel statistical model based on Benford's law for the probability distributions of the first digits of the block-DCT and quantized JPEG coefficients is presented. ...
APPLICATIONS IN IMAGE FORENSICS We have shown in the above section that the distribution of the first digits of the JPEG coefficients of a JPEG compressed image follows a logarithmic law and its empirical ...
doi:10.1117/12.704723
dblp:conf/sswmc/FuSS07
fatcat:tsd37pymgng75dcyxjx7qbdbdi
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
2007
Multimedia and Expo, 2007 IEEE International Conference on
Given a digital image, we find that the blocking artifacts introduced during JPEG compression could be used as a "natural authentication code". ...
Digital images can be forged easily with today's widely available image processing software. ...
Manufacturers of digital cameras and image processing software typically use different JPEG quantization table to balance compression ratio and image quality. ...
doi:10.1109/icme.2007.4284574
dblp:conf/icmcs/YeSC07
fatcat:dxidfndo5vhd7a2puuiau5b7ba
A Novelty Approach on Forgery Digital Image Detection based Image Source Identification ANN
2015
International Journal on Computational Science & Applications
Hence, the image forgery detection technique plays an important role in verifying the integrity of digital image forensics for authentication. ...
Malicious and digital imaging (digital products) tamper detection is the subject of this article. ...
application IJG) quantization certain JPEG applications. ...
doi:10.5121/ijcsa.2015.5105
fatcat:mgn7yukgqjgxxatt2sk2zjievu
Estimating JPEG2000 compression for image forensics using Benford's Law
2010
Optics, Photonics, and Digital Technologies for Multimedia Applications
In this paper, we propose the novel use of Benford's Law for estimating JPEG2000 compression for image forensics applications. ...
More recently, Benford's Law has been further applied to image processing and image forensics. ...
ACKNOWLEDGEMENTS Ghulam Qadir would like to acknowledge the financial support of COMSATS Institute of Information Technology, Islamabad, Pakistan for the sponsorship of his PhD scholarship. ...
doi:10.1117/12.855085
fatcat:mtm4bogrg5ep3bw4dhkczqafwy
Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification
2010
IEEE Transactions on Information Forensics and Security
Index Terms-Digital image forensics, quantization artifacts, source encoder identification. ...
In this paper, we first analyze the properties of the quantized coefficients and present a simple yet effective way to detect the quantization artifacts, and then we propose an approach to identify the ...
His research interests include digital video watermarking and video compression, image copy detection, and digital forensics. ...
doi:10.1109/tifs.2010.2074195
fatcat:grr3p6akgnhkxk7y23snp6j7hq
Exposing Digital Forgeries From JPEG Ghosts
2009
IEEE Transactions on Information Forensics and Security
This approach is applicable to images of high and low quality and resolution. ...
When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person's head onto another person's body. ...
As such there is a need for forensic tools that are specifically applicable to detecting tampering in low quality images. ...
doi:10.1109/tifs.2008.2012215
fatcat:tjyqsf26lzcsplpeb47d3rlw4m
Digital image source coder forensics via intrinsic fingerprints
2009
IEEE Transactions on Information Forensics and Security
Source coding is a common step of natural image acquisition, so in this paper, we focus on the fundamental research on digital image source coder forensics via intrinsic fingerprints. ...
Therefore, there is great interest in developing forensic tools via intrinsic fingerprints to solve these problems. ...
Image forensics offers the ability to verify the credibility and validate the origin of digital images. ...
doi:10.1109/tifs.2009.2024715
fatcat:gp6atz45wbewxphswccy2qd45y
A Tailored Anti-forensic Technique for Digital Image Applications
2012
International Journal of Computer Applications
The existing methods for identification of bitmap compression history are JPEG detection and Quantizer estimation. The JPEG detection is used to find whether the image has been previously compressed. ...
Then it also explains how this can be used to perform unnoticeable forgeries on the bitmap images. It can be done by the estimation, examination and alteration in the transform coefficients of image. ...
Consider the case, if one wants to remove JPEG artifacts or for JPEG re-compression, the existing techniques show it can be detected through JPEG detection and Quantizer estimation [1]. ...
doi:10.5120/8448-2241
fatcat:7njdaeg3orecxou2m4f7x53kly
« Previous
Showing results 1 — 15 out of 627 results