An image forensic technique based on JPEG ghosts

被引:2
|
作者
Singh, Divakar [1 ]
Singh, Priyanka [2 ]
Jena, Riyanka [2 ]
Chakraborty, Rajat Subhra [3 ]
机构
[1] Indian Inst Technol Jammu, Jammu 181221, India
[2] Dhirubhai Ambani Inst Informat & Commun Technol, Gandhinagar 382004, Gujarat, India
[3] Indian Inst Technol Kharagpur, Kharagpur 721302, W Bengal, India
关键词
Forgery; JPEG compression; Quality; SSIM; EXPOSING DIGITAL FORGERIES;
D O I
10.1007/s11042-022-13699-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unprecedented growth in the easy availability of photo-editing tools has endangered the power of digital images. An image was supposed to be worth more than a thousand words, but now this can be said only if it can be authenticated or the integrity of the image can be proved to be intact. In this paper, we propose a digital image forensic technique for JPEG images. It can detect any forgery in the image if the forged portion called a ghost image is having a compression quality different from that of the cover image. It is based on resaving the JPEG image at different JPEG qualities, and the detection of the forged portion is maximum when it is saved at the same JPEG quality as the cover image. Also, we can precisely predict the JPEG quality of the cover image by analyzing the similarity using Structural Similarity Index Measure (SSIM) or the energy of the images. The first maxima in SSIM or the first minima in energy correspond to the cover image JPEG quality. We created a dataset for varying JPEG compression qualities of the ghost and the cover images and validated the scalability of the experimental results. We also, experimented with varied attack scenarios, e.g. high-quality ghost image embedded in low quality of cover image, low-quality ghost image embedded in high-quality of cover image, and ghost image and cover image both at the same quality. The proposed method is able to localize the tampered portions accurately even for forgeries as small as 10 x 10 sized pixel blocks. Our technique is also robust against other attack scenarios like copy-move forgery, inserting text into image, rescaling (zoom-out/zoom-in) ghost image and then pasting on cover image.
引用
收藏
页码:14153 / 14169
页数:17
相关论文
共 50 条
  • [21] A novel forensic image analysis tool for discovering double JPEG compression clues
    Ali Taimori
    Farbod Razzazi
    Alireza Behrad
    Ali Ahmadi
    Massoud Babaie-Zadeh
    Multimedia Tools and Applications, 2017, 76 : 7749 - 7783
  • [22] AI-BASED COMPRESSION: A NEW UNINTENDED COUNTER ATTACK ON JPEG-RELATED IMAGE FORENSIC DETECTORS?
    Berthet, Alexandre
    Dugelay, Jean-Luc
    2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 3426 - 3430
  • [23] Digital Forensic of JPEG Images
    Mire, Archana V.
    Dhok, S. B.
    Porey, P. D.
    Mistry, N. J.
    2014 FIFTH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING (ICSIP 2014), 2014, : 131 - 136
  • [24] Exposing Digital Forgeries From JPEG Ghosts
    Farid, Hany
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) : 154 - 160
  • [25] JPEG 2000 and Digital Watermarking Technique Using in Medical Image
    Lim, Sung-Jin
    Moon, Hae-Min
    Chae, Seung-Hoon
    Chung, Yongwha
    Pan, Sung Bum
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 413 - 416
  • [26] Quality improvement technique for JPEG images with fractal image coding
    Takezawa, M
    Sanada, H
    Watanabe, K
    Haseyama, M
    2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 6320 - 6323
  • [27] A robust image watermarking technique for JPEG images using QuadTrees
    Yoo, KS
    Kim, MA
    Lee, WH
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 2, PROCEEDINGS, 2004, 3332 : 34 - 41
  • [28] A Novel Image Enhancement Technique based on Statistical Analysis of DCT coefficients for JPEG Compressed Images
    Bhatia, Jaspreet
    Okade, Manish
    2016 TWENTY SECOND NATIONAL CONFERENCE ON COMMUNICATION (NCC), 2016,
  • [29] A robust image watermarking technique for JPEG images using QuadTrees
    Yoo, Kil-Sang
    Kim, Mi-Ae
    Lee, Won-Hyung
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3332 : 34 - 41
  • [30] A novel technique for JPEG image steganography and its performance evaluation
    Reddy, Velagalapalli Lokeswara
    Subramanyam, Arige
    Reddy, Pakanati Chenna
    International Journal of Advanced Media and Communication, 2014, 5 (2-3) : 211 - 224