“…In single and double compressed images, DCT coefficients can represent the intra-block and inter-block correlations [33]. The intra-block correlation is mainly reflected in the adjacent frequency coefficients in the DCT block, and the inter-block correlation is mainly reflected in the same frequency coefficient between the adjacent blocks.…”
Section: B Intra-block and Inter-block Correlations In Modelmentioning
Steganography is to embed secret information into digital media and minimize the distortion caused by data embedding. The JPEG is a widely used image compression format, and many JPEG images transmitted on the network are double compressed. Most of the existing steganography algorithms mainly use the single compressed images as the embedded carrier of secret information while rarely taking advantage of the double compressed images. However, the double compressed operation usually leads to changes in the statistical characteristics of images. Therefore, the minor changes caused by steganography can be confused by double compression operation to achieve the purpose of concealing embedding operation. This paper proposes a secure JPEG double compression (DC) steganographic scheme based on irregular discrete cosine transformation (DCT) and coefficients distribution (IDCD-JDS), which can obtain less statistical detectability. The minimum distortion function is designed according to the fact that the statistical distribution of the double compressed images has periodic peaks and valleys as well as multiple irregular intervals. By using the syndrome trellis coding (STC) to embed secret information, the modifications are limited to regions that are difficult to detect. The quality factors (QF) relationship between the first and second compression is further studied to explore the effective range for double compressed images so that the proposed algorithm can achieve better performance under different conditions. The experiments show that this scheme can reduce the embedding change by utilizing the inherent statistical distribution and irregular block complexity in double compressed images, and it performs better than the existing methods.
“…In single and double compressed images, DCT coefficients can represent the intra-block and inter-block correlations [33]. The intra-block correlation is mainly reflected in the adjacent frequency coefficients in the DCT block, and the inter-block correlation is mainly reflected in the same frequency coefficient between the adjacent blocks.…”
Section: B Intra-block and Inter-block Correlations In Modelmentioning
Steganography is to embed secret information into digital media and minimize the distortion caused by data embedding. The JPEG is a widely used image compression format, and many JPEG images transmitted on the network are double compressed. Most of the existing steganography algorithms mainly use the single compressed images as the embedded carrier of secret information while rarely taking advantage of the double compressed images. However, the double compressed operation usually leads to changes in the statistical characteristics of images. Therefore, the minor changes caused by steganography can be confused by double compression operation to achieve the purpose of concealing embedding operation. This paper proposes a secure JPEG double compression (DC) steganographic scheme based on irregular discrete cosine transformation (DCT) and coefficients distribution (IDCD-JDS), which can obtain less statistical detectability. The minimum distortion function is designed according to the fact that the statistical distribution of the double compressed images has periodic peaks and valleys as well as multiple irregular intervals. By using the syndrome trellis coding (STC) to embed secret information, the modifications are limited to regions that are difficult to detect. The quality factors (QF) relationship between the first and second compression is further studied to explore the effective range for double compressed images so that the proposed algorithm can achieve better performance under different conditions. The experiments show that this scheme can reduce the embedding change by utilizing the inherent statistical distribution and irregular block complexity in double compressed images, and it performs better than the existing methods.
“…A special filtering layer contains typically selected filtering kernels that can help the system to segregate the images more effectively. A technique is presented in [20] to detect the aligned double JPEG compression based on the fact that adjacent DCT coefficients correlation is enhanced due to DCT transform, and the correlation among same locations in adjacent DCT blocks is strong. The aim of the anti-forensic techniques is to create barriers in the forensic investigation process by hiding the JPEG compression artifacts.…”
Rapid advancement in digital image processing tools and software's has made it extremely simple to manipulate the digital images without leaving any footprints. It becomes a hot issue about the security and threat to society with increasing growth of social media. JPEG compression format has been widely used in most of the digital cameras. The investigation of JPEG compression footprints can play an important role in image tampering detection. In this paper, a novel method is proposed to detect the JPEG compression. The proposed forensic scheme comprises of two steps i.e. selection of target difference image and generation of second-order statistical features by evaluating the Markov Transition Probability Matrices (MTPMs) for both intra and inter-block DCT domain. Finally, the resultant feature is used to train the SVM classifier for classification purposes. The experiment results on UCID and BOSSBase datasets show that the proposed forensic technique based on MTPM is capable of detecting the JPEG compression traces even in the presence of anti-forensic attacks.
“…Multimedia forensics [38,61,78,80,81] is an important domain of information security [9,10,12,13,[19][20][21][22][23][24]39]. Both IoT and MBD [17,18,28,30,42,46,47,58,62,[65][66][67][68][69][70][71]75,77,79,83,85] have a lot of multimedia data.…”
Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be tampered easily. Therefore, the research of multimedia forensics is necessary. Copy-move is an important branch of multimedia forensics. In this paper, a novel copy-move forgery detection scheme using combined features and transitive matching is proposed. First, SIFT and LIOP are extracted as combined features from the input image. Second, transitive matching is used to improve the matching relationship. Third, a filtering approach using image segmentation is proposed to filter out false matches. Fourth, affine transformations are estimated between these image patches. Finally, duplicated regions are located based on those affine transformations. The experimental results demonstrate that the proposed scheme can achieve much better detection results on the public database under various attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.