posed solution performs precisely when the quantiza-
tion step used in the first compression is greater than
the double of the one used in the second compression.
We also propose a simple and fast solution for ex-
posing forgeries in compressed images. Given an im-
age, assuming that it is double-compressed, we try
to detect the quantization step used in the first com-
pression for all the DCT coefficients. Having the first
quantization step, we can create a model for the value
of the doubly quantized DCT coefficient. Blocks of
which the DCT coefficients do not follow the given
model are considered as forged. The proposed solu-
tion was tested on both simulated and real images.
Forged images created from JPEG images and re-
saved under high quality JPEG can be detected cor-
rectly, and forged region can be localized precisely
with the proposed method.
ACKNOWLEGDEMENT
This work was supported by ANR project DEFACTO
ANR-16-DEFA-0002.
REFERENCES
Bianchi, T. and Piva, A. (2012). Image forgery localization
via block-grained analysis of JPEG artifacts. IEEE
Transactions on Information Forensics and Security,
7(3):1003–1017.
Bunk, J., Bappy, J. H., Mohammed, T. M., Nataraj, L., Flen-
ner, A., Manjunath, B. S., Chandrasekaran, S., Roy-
Chowdhury, A. K., and Peterson, L. (2017). Detection
and localization of image forgeries using resampling
features and deep learning. arXiv:1707.00433 [cs].
D, R. P. and C, A. (2015). Image forgery detection using
SVM classifier. In 2015 International Conference on
Innovations in Information, Embedded and Commu-
nication Systems (ICIIECS), pages 1–5.
Dong, J., Wang, W., and Tan, T. CASIA image tampering
detection evaluation database. In 2013 IEEE China
Summit and International Conference on Signal and
Information Processing, pages 422–426.
Farid, H. (2009). Exposing digital forgeries from JPEG
ghosts. IEEE Transactions on Information Forensics
and Security, 4(1):154–160.
Gallagher, A. C. and Chen, T. (2008). Image authenti-
cation by detecting traces of demosaicing. In 2008
IEEE Computer Society Conference on Computer Vi-
sion and Pattern Recognition Workshops, pages 1–8.
Lin, Z., He, J., Tang, X., and Tang, C.-K. (2009). Fast,
automatic and fine-grained tampered JPEG image de-
tection via DCT coefficient analysis. Pattern Recog-
nition, 42(11):2492–2501.
Liu, B., Pun, C.-M., and Yuan, X.-C. (2014). Digital image
forgery detection using JPEG features and local noise
discrepancies. The Scientific World Journal, 2014.
Luo, W., Huang, J., and Qiu, G. (2010). JPEG error analysis
and its applications to digital image forensics. IEEE
Transactions on Information Forensics and Security,
5(3):480–491.
Mahdian, B. and Saic, S. (2008). Blind authentication
using periodic properties of interpolation. IEEE
Transactions on Information Forensics and Security,
3(3):529–538.
Mahdian, B. and Saic, S. (2009). Using noise inconsisten-
cies for blind image forensics. Image and Vision Com-
puting, 27(10):1497–1503.
Mohammed, T. M., Bunk, J., Nataraj, L., Bappy, J. H., Flen-
ner, A., Manjunath, B. S., Chandrasekaran, S., Roy-
Chowdhury, A. K., and Peterson, L. (2018). Boost-
ing image forgery detection using resampling detec-
tion and copy-move analysis. arXiv:1802.03154 [cs].
Pevny, T. and Fridrich, J. (2008). Detection of double-
compression in JPEG images for applications in
steganography. IEEE Transactions on Information
Forensics and Security, 3(2):247–258.
Popescu, A. C. and Farid, H. (2005). Exposing digital forg-
eries by detecting traces of resampling. IEEE Trans-
actions on Signal Processing, 53(2):758–767.
Thai, T. H., Cogranne, R., and Retraint, F. (2013). Ste-
ganalysis of jsteg algorithm based on a novel statis-
tical model of quantized DCT coefficients. In 2013
IEEE International Conference on Image Processing,
pages 4427–4431.
Thai, T. H., Cogranne, R., Retraint, F., and Doan, T.
N. C. (2017). JPEG quantization step estimation
and its applications to digital image forensics. IEEE
Transactions on Information Forensics and Security,
12(1):123–133.
Ting, Z. and Rangding, W. (2009). Doctored JPEG im-
age detection based on double compression features
analysis. In 2009 ISECS International Colloquium on
Computing, Communication, Control, and Manage-
ment, volume 2, pages 76–80.
Wang, W., Dong, J., and Tan, T. (2014). Exploring DCT
coefficient quantization effects for local tampering de-
tection. IEEE Transactions on Information Forensics
and Security, 9(10):1653–1666.
Yang, J., Xie, J., Zhu, G., Kwong, S., and Shi, Y. (2014).
An effective method for detecting double JPEG com-
pression with the same quantization matrix. IEEE
Transactions on Information Forensics and Security,
9(11):1933–1942.
Yang, Q., Peng, F., Li, J.-T., and Long, M. (2016). Im-
age tamper detection based on noise estimation and la-
cunarity texture. Multimedia Tools and Applications,
75(17):10201–10211.
Ye, S., Sun, Q., and Chang, E. (2007). Detecting digital im-
age forgeries by measuring inconsistencies of block-
ing artifact. In 2007 IEEE International Conference
on Multimedia and Expo, pages 12–15.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
494