Abstract
We present a method for automating the detection of the so-called JPEG ghost s. JPEG ghost s can be used for discriminating single- and double JPEG compression, which is a common cue for image manipulation detection. The JPEG ghost scheme is particularly well-suited for non-technical experts, but the manual search for such ghost s can be both tedious and error-prone. In this paper, we propose a method that automatically and efficiently discriminates single- and double-compressed regions based on the JPEG ghost principle. Experiments show that the detection results are highly competitive with state-of-the-art methods, for both, aligned and shifted JPEG grids in double-JPEG compression.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barni, M., Costanzo, A., Sabatini, L.: Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation. In: International Symposium on Circuits and Systems, pp. 1687–1690 (May 2010)
Battiato, S., Messina, G.: Digital Forgery Estimation into DCT Domain – A Critical Analysis. In: Multimedia in Forensics, Security and Intelligence, pp. 37–42 (October 2009)
Bayram, S., Sencar, H.T., Memon, N.: A survey of copy-move forgery detection techniques. In: IEEE Western New York Image Processing Workshop (2009)
Farid, H.: A Survey of Image Forgery Detection. Signal Processing Magazine 26(2), 16–25 (2009)
Farid, H.: Exposing Digital Forgeries from JPEG Ghosts. IEEE Transactions on Information Forensics and Security 1(4), 154–160 (2009)
Huang, F., Huang, J., Shi, Y.Q.: Detecting Double JPEG Compression With the Same Quantization Matrix. IEEE Transactions on Information Forensics and Security 5(4), 848–856 (2010)
Lin, Z., He, J., Tang, X., Tang, C.K.: Fast, Automatic and Fine-grained Tampered JPEG Image Detection via DCT Coefficient Analysis. Pattern Recognition 52(11), 2492–2501 (2009)
Qu, Z., Luo, W., Huang, J.: A Convolutive Mixing Model for Shifted Double JPEG Compression with Application to Passive Image Authentication. In: International Conference on Acoustics, Speech and Signal Processing, pp. 1661–1664 (March 2008)
Schaefer, G., Stich, M.: UCID - An Uncompressed Colour Image Database. In: SPIE Storage and Retrieval Methods and Applications for Multimedia, pp. 472–480 (January 2004)
Sencar, H., Memon, N.: Overview of State-of-the-art in Digital Image Forensics. In: Algorithms, Architectures and Information Systems Security, pp. 325–344 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zach, F., Riess, C., Angelopoulou, E. (2012). Automated Image Forgery Detection through Classification of JPEG Ghosts. In: Pinz, A., Pock, T., Bischof, H., Leberl, F. (eds) Pattern Recognition. DAGM/OAGM 2012. Lecture Notes in Computer Science, vol 7476. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32717-9_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-32717-9_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32716-2
Online ISBN: 978-3-642-32717-9
eBook Packages: Computer ScienceComputer Science (R0)