Identification of bitmap compression history: JPEG detection and quantizer estimation

نویسندگان

  • Zhigang Fan
  • Ricardo L. de Queiroz
چکیده

Sometimes image processing units inherit images in raster bitmap format only, so that processing is to be carried without knowledge of past operations that may compromise image quality (e.g., compression). To carry further processing, it is useful to not only know whether the image has been previously JPEG compressed, but to learn what quantization table was used. This is the case, for example, if one wants to remove JPEG artifacts or for JPEG re-compression. In this paper, a fast and efficient method is provided to determine whether an image has been previously JPEG compressed. After detecting a compression signature, we estimate compression parameters. Specifically, we developed a method for the maximum likelihood estimation of JPEG quantization steps. The quantizer estimation method is very robust so that only sporadically an estimated quantizer step size is off, and when so, it is by one value.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Maximum Likelihood Estimation of JPEG Quantization Table in the Identification of Bitmap Compression History

To process previously JPEG coded images the knowledge of the quantization table used in compression is sometimes required. This happens for example in JPEG artifact removal and in JPEG re-compression. However, the quantization table might not be known due to various reasons. In this paper, a method is presented for the maximum likelihood estimation (MLE) of the JPEG quantization tables. An effi...

متن کامل

A generalized Benford's law for JPEG coefficients and its applications in image forensics

In this paper, a novel statistical model based on Benford’s law for the probability distributions of the first digits of the block-DCT and quantized JPEG coefficients is presented. A parametric logarithmic law, i.e., the generalized Benford’s law, is formulated. Furthermore, some potential applications of this model in image forensics are discussed in this paper, which include the detection of ...

متن کامل

A Novel Watermarking Technique for Tampering Detection in Digital Images

A novel fragile watermarking technique is proposed for hiding logo information into an image by tuning block pixels based on a bitmap parity checking approach. A secure key and a random number generator are used to hide the logo information in a secret, undetectable, and unambiguous way. The characteristics of the mean gray value and the bitmap in a block are exploited for performing the embedd...

متن کامل

Learning Convolutional Networks for Content-weighted Image Compression

Lossy image compression is generally formulated as a joint rate-distortion optimization to learn encoder, quantizer, and decoder. However, the quantizer is nondifferentiable, and discrete entropy estimation usually is required for rate control. These make it very challenging to develop a convolutional network (CNN)-based image compression system. In this paper, motivated by that the local infor...

متن کامل

Surmounting the Effects of Lossy Compression on Steganography

Steganographic techniques can be used to hide data within digital images with little or no visible change in the perceived appearance of the image and can be exploited to export sensitive information. Since images are frequently compressed for storage or transmission, effective steganography must employ coding techniques to counter the errors caused by lossy compression algorithms. The Joint Ph...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE transactions on image processing : a publication of the IEEE Signal Processing Society

دوره 12 2  شماره 

صفحات  -

تاریخ انتشار 2003