Detection of Shifted Double JPEG Compression using Markovian Transition Probability Matrix

نویسندگان

  • Yujin Zhang
  • Shenghong Li
  • Shilin Wang
چکیده

Copy-paste forgery is a very common type of forgery in JPEG images. The tampered patch has always suffered from JPEG compression twice with inconsistent block segmentation. This phenomenon in JPEG image forgeries is called the shifted double JPEG (SD-JPEG) compression. Detection of SD-JPEG compressed blocks can make crucial contribution to detect and locate the tampered region. However, the existing SD-JPEG compression detection methods cannot achieve satisfactory results especially when the image block size is small. In this paper, an effective SD-JPEG compression detection method based on Markovian transition probability matrix is proposed. Statistical artifacts are left by the SD-JPEG compression among the elements of the JPEG 2-D arrays. Difference JPEG 2-D arrays generated along four directions (i.e. horizontal, vertical, main diagonal and minor diagonal) are utilized to enhance them and then thresholded by a predefined threshold for reducing computational cost. Markovian transition probability matrix is used to model the difference JPEG 2-D arrays in order to utilize the second order statistics. All the elements of these transition probability matrices are served as features for SD-JPEG compression detection. Support Vector Machine (SVM) is employed as the classifier. Experimental results demonstrate the efficiency of the proposed method.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tamper Detection and Identification of Cropped Blocks in JPEG Images

In this paper a detailed study regarding Digital Image Forgery on Jpeg images is provided. Here, copy-paste block detection on a special case of double Jpeg compression Shifted Double Jpeg Compression, is identified based on the characteristics of Double Jpeg compression. In certain cases the tampered image will be cropped, the paper uses properties of Block Artifacting method to identify such ...

متن کامل

Automated Image Forgery Detection through Classification of JPEG Ghosts

We present a method for automating the detection of the socalled JPEG ghosts. JPEG ghosts can be used for discriminating singleand double JPEG compression, which is a common cue for image manipulation detection. The JPEG ghost scheme is particularly well-suited for non-technical experts, but the manual search for such ghosts can be both tedious and error-prone. In this paper, we propose a metho...

متن کامل

Estimation of Primary Quantization Matrix in Double Compressed JPEG Images

In this report, we present a method for estimation of primary quantization matrix from a double compressed JPEG image. We first identify characteristic features that occur in DCT histograms of individual coefficients due to double compression. Then, we present 3 different approaches that estimate the original quantization matrix from double compressed images. Finally, most successful of them Ne...

متن کامل

Detection of shifted double JPEG compression by an adaptive DCT coefficient model

In many JPEG image splicing forgeries, the tampered image patch has been JPEG-compressed twice with different block alignments. Such phenomenon in JPEG image forgeries is called the shifted double JPEG (SDJPEG) compression effect. Detection of SDJPEG-compressed patches could help in detecting and locating the tampered region. However, the current SDJPEG detection methods do not provide satisfac...

متن کامل

Synchronization criteria for T-S fuzzy singular complex dynamical networks with Markovian jumping parameters and mixed time-varying delays using pinning control

In this paper, we are discuss about the issue of synchronization for singular complex dynamical networks with Markovian jumping parameters and additive time-varying delays through pinning control by Takagi-Sugeno (T-S) fuzzy theory.The complex dynamical systems consist of m nodes and the systems switch from one mode to another, a Markovian chain with glorious transition probabili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011