计算机科学 ›› 2018, Vol. 45 ›› Issue (9): 20-29.doi: 10.11896/j.issn.1002-137X.2018.09.003

• 综述 • 上一篇    下一篇

数字图像重压缩检测研究综述

王志锋1, 朱琳1, 曾春艳2, 闵秋莎1, 夏丹1   

  1. 华中师范大学数字媒体技术系 武汉4300791
    湖北工业大学电气与电子工程学院 武汉4300682
  • 收稿日期:2017-07-03 出版日期:2018-09-20 发布日期:2018-10-10
  • 通讯作者: 曾春艳(1986-),女,博士,讲师,CCF会员,主要研究方向为信号处理、压缩感知理论与模式识别,E-mail:cyzeng@hbut.edu.cn
  • 作者简介:王志锋(1985-),男,博士,副教授,CCF会员,主要研究方向为信号处理、机器学习与数据挖掘,E-mail:zfwang@mail.ccnu.edu.cn;朱 琳(1993-),女,硕士生,主要研究方向为数字图像处理、数字图像取证;闵秋莎(1984-),女,博士,讲师,主要研究方向为数字图像处理、三维重建与模式识别;夏 丹(1985-),女,博士,讲师,主要研究方向为虚拟现实技术、数字图像处理。
  • 基金资助:
    本文受国家自然科学基金项目(61501199),湖北省自然科学基金(2017CFB683),国家科技支撑计划项目(2015BAK33B02)资助。

Survey on Recompression Detection for Digital Images

WANG Zhi-feng1, ZHU Lin1, ZENG Chun-yan2, MIN Qiu-sha1, XIA Dan1   

  1. Department of Digital Media Technology,Central China Normal University,Wuhan 430079,China1
    School of Electrical and Electronic Engineering,Hubei University of Technology,Wuhan 430068,China2
  • Received:2017-07-03 Online:2018-09-20 Published:2018-10-10

摘要: 随着数字图像处理技术的广泛应用,数字图像处理软件在给人们的工作和生活带来便利的同时,由恶意篡改图像所引发的一系列社会问题也亟待解决,因此能够对图像的真实性和完整性进行判断的数字图像取证技术显得尤其重要。篡改图像必然会经过重压缩这一步骤,因此数字图像重压缩检测能够为数字图像取证提供强有力的辅助依据。文中对数字图像重压缩检测研究进行了系统的梳理,提出了数字图像重压缩检测的技术框架,详细阐述了无损图像压缩历史检测、有损压缩图像双重压缩检测、有损压缩图像多重压缩检测以及其他格式的重压缩检测的取证算法和思路,对现有算法进行了性能分析和评价。然后,总结了图像重压缩检测的应用。最后,分析了数字图像重压缩检测目前存在的问题,并对未来的发展方向进行了展望。

关键词: 双压缩, 图像篡改, 图像取证, 压缩历史检测

Abstract: With the wide application of digital image processing technology,the softwares of digital image processing have brought more convienience in our work and daily life,but a series of social problems caused by malicious tampered images also need to be solved,so the digital image forensics technology,which can judge the authenticity and integrity of the image,is particularly important.Since tampered images are always accompanied with the process of recompression,recompression detection can provide strong supporting evidence for digital image forensics.This paper systematically analyzed the current research of recompression detection,proposed a general framework for recompression detection,and elaborated the history detection of lossless images compression,double compression detection of loss images,multiple compression detection of lossless images,and recompression detection of other formats.This paper also analyzed and evaluated the performance of the existing algorithms,and then summarized the application of image compression detection.Finally,this paper analyzed the existing problems of recompression detection,andprospected the future development directions.

Key words: Compression history detection, Double compression, Image forensics, Image tampering

中图分类号: 

  • TP391
[1]ZHOU L N.Study of Digital Forensics Based on Image Content.[D].Beijing:Beijing University of Posts and Telecommunications,2007.(in Chinese)
周琳娜.数字图像盲取证技术研究[D].北京:北京邮电大学,2007.
[2]GUO Y P.Compression History Analysis and Detection of Di-gital Image[D].Dalian:Dalian University of Technology,2009.(in Chinese)
郭一平.数字图像压缩历史的分析与检测[D].大连:大连理工大学,2009.
[3]YANG J,ZHU G,HUANG J,et al.Estimating JPEG compression history of bitmaps based on factor histogram[J].Digital Signal Processing,2015,41(C):90-97.
[4]HILL T P.A Statistical Derivation of the Significant-Digit Law[J].Statistical Science,1995,10(4):354-363.
[5]NEWCOMB S.Note on the Frequency of Use of the Different Digits in Natural Numbers[J].American Journal ofMathema-tics,2014,4(1):39-40.
[6]BENFORD F.The Law of Anomalous Numbers[J].Proceedings of the American Philosophical Society,1938,78(4):551-572.
[7]FU D,SHI Y Q,SU W.A generalized Benford’s law for JPEG coefficients and its applications in image forensics[J].Proc Spie,2007,6505(1):58-61.
[8]LUO W,HUANG J,QIU G.JPEG Error Analysis and Its Applications to Digital Image Forensics[J].IEEE Transactions on Information Forensics & Security,2010,5(3):480-491.
[9]FAN Z,DE QUEIROZ R L.Identification of bitmap compression history:JPEG detection and quantizer estimation[J].IEEE Transactionson Image Processing A Publication of the IEEE Signal Processing Society,2003,12(2):230-235.
[10]FAN Z,QUEIROZ R D.Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history[C]∥International Conference on Image Proces-sing.IEEE,2000:948-951.
[11]NEELAMANI R,QUEIROZ R D,FAN Z,et al.JPEG compression history estimation for color images[J].IEEE Transactions on Image Processing A Publication of the IEEE Signal Proces-sing Society,2006,15(6):1365-1378.
[12]POPESCU A C.Statistical Tools for Digital Image Forensics
[D].Hanover:Dartmouth College,2004.
[13]HAN X D,PING X J,ZHANG T.New Detection Algorithm of Double Compression in JPEG Image[J].Computer Engineering,2010,36(4):140-143.(in Chinese)
韩晓东,平西建,张涛.一种新的JPEG图像二次压缩检测算法[J].计算机工程,2010,36(4):140-143.
[14]WANG H M,YANG X Y.Detection Method for JPEG Image Based on the Difference of DCT Coefficient Histograms[J].Journal of Sichuan University(Engineering Science Edition),2014,46(1):41-46.(in Chinese)
王浩明,杨晓元.一种基于DCT系数直方图差异的JPEG图像篡改检测[J].四川大学学报(工程科学版),2014,46(1):41-46.
[15]WANG J W,LIU G J,DAI Y W,et al.A New Method for Estimating the Primary Quantization Step of JPEG Double-Compression[J].Journal of Electronics & Information Technology,2009,31(4):836-839.(in Chinese)
王俊文,刘光杰,戴跃伟,等.一种估计JPEG双重压缩原始量化步长的新方法[J].电子与信息学报,2009,31(4):836-839.
[16]DUAN X T,PENG T,LI F F,et al.Blind Separation of Tampered Images Based onJPEG Double Compression Properties [J].Journal of University of Jinan(Science and Technology),2017,31(2):87-96.(in Chinese)
段新涛,彭涛,李飞飞,等.基于JPEG重压缩特性的篡改图像盲分离[J].济南大学学报(自然科学版),2017,31(2):87-96.
[17]LI B,SHI Y Q,HUANG J.Detecting doubly compressed JPEG images by using Mode Based First Digit Features[C]∥IEEE Workshop on Multimedia Signal Processing,2008.IEEE,2008:730-735.
[18]DONG L,KONG X,WANG B,et al.Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients[C]∥Sixth International Conference on Image and Graphics.IEEE Computer Society,2011:234-237.
[19]CHEN C,SHI Y Q,SU W.A Machine Learning Based Scheme for Double JPEG Compression Detection[C]∥2008 19th International Conference on Pattern Recognition.IEEE,2008:1-4.
[20]ZHU X M,XUAN G R,YAO Q M,et al.Re-sampling detection in information forensics[J].Compuer Applications,2006,26(11):2596-2597.(in Chinese)
朱秀明,宣国荣,姚秋明,等.信息取证中图像重采样检测[J].计算机应用,2006,26(11):2596-2597.
[21]BIANCHI T,PIVA A.Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps[J].IEEE Transactions on Information Forensics & Security,2012,7(2):842-848.
[22]CHEN Y L,HSU C T.Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection[J].IEEE Transactions on Information Forensics & Security,2011,6(2):396-406.
[23]HUANG F,HUANG J,SHI Y Q.Detecting Double JPEG Compression With the Same Quantization Matrix[J].IEEE Transactions on Information Forensics & Security,2010,5(4):848-856.
[24]YANG J,XIE J,ZHU G,et al.An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix[J].IEEE Transactions on Information Forensics & Security,2014,9(11):1933-1942.
[25]LAI S Y,BÖHME R.Block convergence in repeated transform coding:JPEG-100 forensics,carbon dating,and tamper detection[C]∥IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2013:3028-3032.
[26]HAN H L,LI Y Z,NIU S Z,et al.Detecting Compression Traces in Multiple JPEG-Compressed Image[J].Journal of Applied Sciences-Electronics and Information Engineering,2014,32(6):596-604.(in Chinese)
韩洪立,李叶舟,牛少彰,等.多重JPEG压缩图像的压缩痕迹检测[J].应用科学学报,2014,32(6):596-604.
[27]FARID H.Exposing Digital Forgeries From JPEG Ghosts[J].IEEE Transactions on Information Forensics & Security,2009,4(1):154-160.
[28]PASQUINI C,BOATO G,PEREZ-GONZALEZ F.Multiple JPEG compression detection by means of Benford-Fourier coefficients[C]∥IEEE International Workshop on Information Forensics and Security.IEEE,2014:113-118.
[29]PENNEC E L,MALLAT S.Sparse geometric image representations with bandelets[M].New York,IEEE Press,2005.
[30]JIANG Y X,ZHONG Z F,WANG L W.A wavelet coding preprocessing algorithm based on Bayesian estimation for image compression[C]∥International Conference on Machine Lear-ning and Cybernetics.IEEE,2005:5467-5472.
[31]WAKIN M B,ROMBERG J K,CHOI H,et al.Wavelet-domain approximation and compression of piecewise smooth images[J].IEEE Transactions on Image Processing,2006,15(5):1071-1087.
[32]SONG T,GUO S X,LI W.JPEG2000 and Realization of Its Coding System Theory[J].Modern Electronics Technique,2005,28(9):47-49.(in Chinese)
宋涛,郭树旭,李伟.JPEG2000及其编码系统的实现[J].现代电子技术,2005,28(9):47-49.
[33]ZHANG D,ZHANG M,ZHANG J,et al.Novel algorithm for context-adaptive variable length coding[J].Journal of Zhejiang University(Engineering Science),2006,40(5):783-786.(in Chinese)
张丁,张明,张瑾,等.一种新的自适应变长码编码算法[J].浙江大学学报(工学版),2006,40(5):783-786.
[34]CHEN K F,LIAN C J,CHEN H H,et al.Analysis and architecture design of EBCOT for JPEG-2000[C]∥IEEE International Symposium on Circuits and Systems.IEEE,2001:765-768.
[35]孙延奎.小波分析及其应用(重点大学计算机教材)[M].北京:机械工业出版社,2005.
[36]TAUBMAN D.High Performance Scalable Image Compression with Ebcot[J].IEEE Transactions on Image Processing,2000,9(7):1158.
[37]WANG H Y.Detecrion Doctored Images Based on Double JPEG 2000 Compression[D].Tianjin:Tianjin University,2008.(in Chinese)
王海英.基于JPEG2000双压缩的图像篡改检测[D].天津:天津大学,2008.
[38]FAN Z.The Research of Forged Image Detection Aiming at Splicing and Double JPEG2000 Compression[D].Shanghai:Shanghai Jiao Tong University,2011.(in Chinese)
凡昭.面向拼接与JPEG2000双压缩的篡改图像检测研究[D].上海:上海交通大学,2011.
[39]ZHOU C,XU S S,HUANG Y L,et al.JPEG2000 Secondary-Compression Detection based on LOCP Feature[J].Information Security and Communications Privacy,2014,12(11):97-100.(in Chinese)
周超,徐赛赛,黄豫蕾,等.基于LOCP特征的JPEG2000二次压缩检测[J].信息安全与通信保密,2014,12(11):97-100.
[40]QU Z,LUO W,HUANG J.A convolutive mixing model for
shifted double JPEG compression with application to passive ima-ge authentication[C]∥IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2008:1661-1664.
[41]ZHAO J,GUO J C,ZHANG Y,et al.Automatic detection and localization of image forgery regions based on offset estimation of double JPEG compression[J].Journal of Image and Graphics,2015,20(10):1304-1312.(in Chinese)
赵洁,郭继昌,张艳,等.JPEG图像双重压缩偏移量估计的篡改区域自动检测定位[J].中国图象图形学报,2015,20(10):1304-1312.
[42]HE J,LIN Z,WANG L,et al.Detecting Doctored JPEG Images Via DCT Coefficient Analysis[C]∥European Conference on Computer Vision.Springer-Verlag,2006:423-435.
[43]LUKÁŠJ,FRIDRICH J.Estimation of primary quantization
matrix in double-compressed JPEG images[C]∥Proceedins of Digital Forensic Research Workshop.2003:5-8.
[44]FRIDRICH J,GOLJAN M,DU R.Steganalysis based on JPEG compatibility[J].Proc Spie,2001,4518:275-280.
[45]FARID H.Digital Image Ballistics from JPEG Quantization:TR 2006-583[R].Dartmouth College,2008.
[46]KORNBLUM J D.Using JPEG quantization tables to identify imagery processed by software[J].Digital Investigation,2008,5(Suppl):S21-S25.
[47]WESTFELD A.F5-A steganographic algorithm:High capacity
despite better steganalysis[J].Fourth Information Hiding Workshop,2001,2137(1):289-302.
[48]PROVOS N.Defending against statistical steganalysis[C]∥Conference on Usenix Security Symposium.USENIX Association,2001:24-24.
[49]DAI M,LIN J J,MAO J F.The Analysis and Detection of Doub le JPEG Compression[J].Journal of Image and Graphics,2006,11(11):2599-2602.(in Chinese)
戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):2599-2602.
[50]PEVNY T,FRIDRICH J.Determining the stego algorithm for JPEG images[J].Information Security IEE Proceedings,2006,153(3):77-86.
[51]LI X,ZHANG T,HE Z Y,et al.Multi-class Steganalyzer with Recompression Detection for JPEG Images[J].Journal of Applied Sciences,2013,31(2):190-196.(in Chinese)
李星,张涛,何赞园,等.结合重压缩检测的JPEG图像多类隐写分析[J].应用科学学报,2013,31(2):190-196.
[1] 董琳, 黄丽清, 叶锋, 黄添强, 翁彬, 徐超.
人脸伪造检测泛化性方法综述
Survey on Generalization Methods of Face Forgery Detection
计算机科学, 2022, 49(2): 12-30. https://doi.org/10.11896/jsjkx.210900146
[2] 田洋, 毕秀丽, 肖斌, 李伟生, 马建峰.
基于离散切比雪夫变换的图像接缝裁剪篡改检测
Image Seam Carving Tampering Detection by Discrete Tchebichef Transform
计算机科学, 2021, 48(6A): 43-50. https://doi.org/10.11896/jsjkx.200800020
[3] 淡州阳, 刘粉林, 巩道福.
基于差分直方图中尾部信息的平滑滤波检测算法
Smoothing Filter Detection Algorithm Based on Middle and Tail Information of Differential Histogram
计算机科学, 2021, 48(11): 234-241. https://doi.org/10.11896/jsjkx.200900121
[4] 尚进跃, 毕秀丽, 肖斌, 李伟生.
基于DCT系数哈希的图像篡改检测算法
Image Forgery Detection Based on DCT Coefficients Hashing
计算机科学, 2020, 47(6): 310-315. https://doi.org/10.11896/jsjkx.190600081
[5] 郑秋梅, 刘楠, 王风华.
基于复杂攻击的脆弱水印图像完整性认证算法
Complex Attack Based Fragile Watermarking for Image Integrity Authentication Algorithm
计算机科学, 2020, 47(10): 332-338. https://doi.org/10.11896/jsjkx.191000060
[6] 邢文博, 杜志淳.
数字图像复制粘贴篡改取证
Digital Image Forensics for Copy and Paste Tampering
计算机科学, 2019, 46(6A): 380-384.
[7] 罗霄阳,霍宏涛,王梦思,陈亚飞.
基于多残差马尔科夫模型的图像拼接检测
Passive Image-splicing Detection Based on Multi-residual Markov Model
计算机科学, 2018, 45(4): 173-177. https://doi.org/10.11896/j.issn.1002-137X.2018.04.029
[8] 刘丽娟,林小竹.
基于背景噪声的图像盲篡改检测
Image Forgery Detection Using Characteristics of Background Noise
计算机科学, 2014, 41(Z11): 136-138.
[9] 康晓兵,魏生民.
一种基于自适应闭值的图像伪造检测算法
Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery
计算机科学, 2011, 38(3): 295-299.
[10] 王鑫,鲁志波.
基于JPEG块效应差异的图像篡改区域自动定位
Locate Tampered Image Region Automatically Based on Inconsistency of ,JPEG Blocking Artifacts
计算机科学, 2010, 37(2): 269-273.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!