Professional Documents
Culture Documents
Submission Information
Result Information
Similarity 24 %
1 10 20 30 40 50 60 70 80 90
Journal/ Ref/Bib
Publicatio 12.24%
n 22.74%
Exclude Information
Quotes Excluded
References/Bibliography Excluded
Sources: Less than 14 Words Similarity Not Excluded
Excluded Source 0%
Excluded Phrases Not Excluded
A-Satisfactory (0-10%)
B-Upgrade (11-40%)
24 8 B C-Poor (41-60%)
D-Unacceptable (61-100%)
SIMILARITY % MATCHED SOURCES GRADE
ABSTRACT
1
Double JPEG compression indicates that an image was originally a JPEG image and has been compressed by
JPEG once again, which is common nowadays. We present an efficient machine learning-based method for
differentiating between double and single JPEG compressed images. We employ several algorithms, including
the Markov random process and the thresholding technique. The Markov random process is then used to model
difference Two-Dimensional arrays in order to exploit second-order statistics. A thresholding technique is also
used to decrease the size of the transition probability matrices that characterise the Markov random processes.
7
All elements of these matrices are gathered as features for detecting double JPEG compression. This method can
also be used to detect forgery parts in a double-compressed image, which is useful for blind authentication. The
experimental outcomes display that the method can precisely locate the doctored part, and the experiment also
shows that the higher the second compression quality is, the better the method detects the tampered areas. The
detection efficiency is precise.
Keywords: Double JPEG compression, Image, Matrices, Detection, Thresholding, Transition
1.INTRODUCTION
Double JPEG compression denotes that an image was originally a JPEG image and has been compressed by
JPEG once again, as is common nowadays. The second jpeg compressed image has a different quality factor
1
than the first. This is mainly used for digital forensics. Double JPEG compression tells the story of an image. In
the literature, some methods for detecting double JPEG compression have been reported. In this study, we
identify double JPEG compressed images using an effective scheme based on a machine learning framework.
To generate features, the JPEG coefficient Two-Dimensional array of a given JPEG image is used here.
Difference JPEG Two-Dimensional arrays, which are the magnitude differences between the JPEG coefficient
Two-Dimensional array and its shifted versions in various directions. This is applied to extrude double JPEG
compression artefacts. To take advantage of the second-order statistics, the Markov random process is then used
to design these difference arrays. To significantly reduce the size of each transition probability matrix that
characterises the Markov process, a thresholding technique is used. These matrix components are gathered as
attributes for double JPEG compression detection. The support vector machine is utilised as a classifier.
2.OBJECTIVE
6
Double jpeg compression detection using machine learning used to decrease the size of image without
affecting the quality of image.
1
Detecting double JPEG compression is important in digital forensics.
Double JPEG compression tells the story of an image.
Detecting forgery parts in a double compressed image is critical work for blind authentication.
3.METHODOLOGY
Popescu's method and its effectiveness
It is designed to detect double JPEG compression. Assume a JPEG mode was double quantized as part of the
double JPEG compression operation. The letter b represents the first quantization step, and the letter a represents
the second. If a/b is not an integer, double quantization introduces periodic artefacts into the JPEG mode's
histogram.
Feature creation
A colour JPEG image has three components: Y, C b, and Cr. For the sake of simplicity, we only apply our
feature generation scheme to the Y component in this paper. Each component, as shown in Figure, can be used
to generate a subset of features using the similar procedure.
5.RESULTS
We are using a large number of uncompressed images. The image which is uncompressed is first compressed to
JPEG images using different quality factors it is Q1 in the Table l. The result is single JPEG compressed image.
And each single JPEG compressed image is again compressed using a different quality factor it is Q2 in the
Table l and the result is double JPEG compressed image. Q1 and Q2 are the quality factors. Table 2 indicates
detection of accuracy.
6.CONCLUSION
In this study we presented and demonstrated the usefulness of our developed double JPEG compression
detection scheme. Our paper is summarised as follows:
The first method is Popescu's method it is related on the "periodicity" pattern of histograms of JPEG
4
modes along with double JPEG compression .It is designed to detect double JPEG compression
Differential JPEG 2D arrays in opposite directions increase rounding the errors, which are artefacts of
double JPEG compression.
The Markov random process and its related transition probability matrix efficiently capture the
statistical artefacts.
The thresholding method decreases the cost related to computation.
REFERENCES
[1] Y. Q. Shi, C. Chen, W. Chen, and M. P. Kaundiny, "Effect of recompression on attacking JPEG
steganographic schemes ─ an experimental study", ISCAS07, New Orleans, LA, USA, May 27-30, 2007.
[2] A. C. Popescu, "Statistical tools for digital image forensics", PhD thesis, Dartmouth College, Hanover, NH,
USA, December 2004 (advised by H. Farid). http://www. cs.dartmouth.edu/farid/publications/apthesis05.pdf.
[3] J. Lukas and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images",
Digital Forensic Research Workshop, Cleveland, OH, USA, August 2003.
[4] D. Fu, Y. Q. Shi, and W. Su, "A generalized Benford's law for JPEG coefficients and its applications in
image forensics", SPIE Electronic Imaging, San Jose, CA, USA, 2007.
[5] A. Leon-Garcia, Probability and random processes for electrical engineering, 2nd Edition, Addison-Wesley
Publishing Company, 1994.
[6] C. C. Chang and C. J. Lin, "LIBSVM: a library for support vector machines", 2001. Available online at
http://www.csie.ntu.edu.tw/~cjlin/libsvm.
[7] http://vision.cs.aston.ac.uk/datasets/ucid/ucid.html.
[8] http://ist.sysu.edu.cn/en/index_en.asp.
[9] http://photogallery.nrcs.usda.gov/.