earticle

논문검색

Blind Separation of Tampered Image Based on JPEG Double Quantization Effect

초록

영어

The double quantization effect of JPEG provides important clue for detecting image tampering. Whenever an original JPEG image has undergone a localized tampering and saved in JPEG again, the DCT coefficients of the areas without tampering will be compressed for twice while the tampered areas only suffered once. The Alternating Current (AC) coefficient distribution accord with a Laplace probability density distribution described with parameter. This paper proposed a new double compression probability model of JPEG image to describe the change of DCT coefficients’ statistical properties after the double compression. According to Bayes’ theorem, using the posterior probability, the model can also show the eigenvalues of the double and single compressed block. We assign a dynamic adaptive threshold for the eigenvalues with the Particle Swarm Optimization Algorithm. Then the tampered region is detected and separated automatically by using the threshold. The experimental results show that the method can detect and separate the tamped area effectively and it outperforms other algorithms in terms of the detection result especially when the second compression factor is smaller than the first one. Compared with other traditional methods, the proposed approach could effectively separate the tampered regions from the tampered image without respect to the location, size and number of tampered images.

목차

Abstract
 1. Introduction
 2. JPEG Compression Principle
 3. The Mathematical Model of JPEG Tampered Image
 4. The Double Quantization Effect in JPEG Compression
 5. The Detection Algorithm Based on the Double Quantization Effect on DCT Coefficients
  5.1. Double Quantization in Tampered JPEG Images
  5.2. Extraction the Eigenvalues of the Tampered Block Based on Bayesian
  5.3. Adaptive Multi-Threshold Set by Particle Swarm Optimization (PSO) Algorithm Automatically Extracts the Tampered Regions
 6. Experimental Results and Analysis
 7. Concluding Remarks
 References

저자정보

  • Duan Xintao Institute College of Computer and Information Engineering, Henan Normal University, Xinxiang
  • Peng Tao Institute College of Computer and Information Engineering, Henan Normal University, Xinxiang
  • Huang Jingjing Departmen of Electronic Engineering , Henan Economic and Trade Vocational College, Zhengzhou
  • Li feifei Institute College of Computer and Information Engineering, Henan Normal University, Xinxiang
  • Wang Jingjuan Institute College of Computer and Information Engineering, Henan Normal University, Xinxiang

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.