Computer Science ›› 2018, Vol. 45 ›› Issue (9): 20-29.doi: 10.11896/j.issn.1002-137X.2018.09.003

• Surveys • Previous Articles     Next Articles

Survey on Recompression Detection for Digital Images

WANG Zhi-feng1, ZHU Lin1, ZENG Chun-yan2, MIN Qiu-sha1, XIA Dan1   

  1. Department of Digital Media Technology,Central China Normal University,Wuhan 430079,China1
    School of Electrical and Electronic Engineering,Hubei University of Technology,Wuhan 430068,China2
  • Received:2017-07-03 Online:2018-09-20 Published:2018-10-10

Abstract: With the wide application of digital image processing technology,the softwares of digital image processing have brought more convienience in our work and daily life,but a series of social problems caused by malicious tampered images also need to be solved,so the digital image forensics technology,which can judge the authenticity and integrity of the image,is particularly important.Since tampered images are always accompanied with the process of recompression,recompression detection can provide strong supporting evidence for digital image forensics.This paper systematically analyzed the current research of recompression detection,proposed a general framework for recompression detection,and elaborated the history detection of lossless images compression,double compression detection of loss images,multiple compression detection of lossless images,and recompression detection of other formats.This paper also analyzed and evaluated the performance of the existing algorithms,and then summarized the application of image compression detection.Finally,this paper analyzed the existing problems of recompression detection,andprospected the future development directions.

Key words: Image tampering, Image forensics, Double compression, Compression history detection

CLC Number: 

  • TP391
[1] ZHOU L N.Study of Digital Forensics Based on Image Content.[D].Beijing:Beijing University of Posts and Telecommunications,2007.(in Chinese)周琳娜.数字图像盲取证技术研究[D].北京:北京邮电大学,2007.
[2] GUO Y P.Compression History Analysis and Detection of Di-gital Image[D].Dalian:Dalian University of Technology,2009.(in Chinese)郭一平.数字图像压缩历史的分析与检测[D].大连:大连理工大学,2009.
[3] YANG J,ZHU G,HUANG J,et al.Estimating JPEG compression history of bitmaps based on factor histogram[J].Digital Signal Processing,2015,41(C):90-97.
[4] HILL T P.A Statistical Derivation of the Significant-Digit Law[J].Statistical Science,1995,10(4):354-363.
[5] NEWCOMB S.Note on the Frequency of Use of the Different Digits in Natural Numbers[J].American Journal ofMathema-tics,2014,4(1):39-40.
[6] BENFORD F.The Law of Anomalous Numbers[J].Proceedings of the American Philosophical Society,1938,78(4):551-572.
[7] FU D,SHI Y Q,SU W.A generalized Benford’s law for JPEG coefficients and its applications in image forensics[J].Proc Spie,2007,6505(1):58-61.
[8] LUO W,HUANG J,QIU G.JPEG Error Analysis and Its Applications to Digital Image Forensics[J].IEEE Transactions on Information Forensics & Security,2010,5(3):480-491.
[9] FAN Z,DE QUEIROZ R L.Identification of bitmap compression history:JPEG detection and quantizer estimation[J].IEEE Transactionson Image Processing A Publication of the IEEE Signal Processing Society,2003,12(2):230-235.
[10] FAN Z,QUEIROZ R D.Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history[C]∥International Conference on Image Proces-sing.IEEE,2000:948-951.
[11] NEELAMANI R,QUEIROZ R D,FAN Z,et al.JPEG compression history estimation for color images[J].IEEE Transactions on Image Processing A Publication of the IEEE Signal Proces-sing Society,2006,15(6):1365-1378.
[12] POPESCU A C.Statistical Tools for Digital Image Forensics[D].Hanover:Dartmouth College,2004.
[13] HAN X D,PING X J,ZHANG T.New Detection Algorithm of Double Compression in JPEG Image[J].Computer Engineering,2010,36(4):140-143.(in Chinese)韩晓东,平西建,张涛.一种新的JPEG图像二次压缩检测算法[J].计算机工程,2010,36(4):140-143.
[14] WANG H M,YANG X Y.Detection Method for JPEG Image Based on the Difference of DCT Coefficient Histograms[J].Journal of Sichuan University(Engineering Science Edition),2014,46(1):41-46.(in Chinese)王浩明,杨晓元.一种基于DCT系数直方图差异的JPEG图像篡改检测[J].四川大学学报(工程科学版),2014,46(1):41-46.
[15] WANG J W,LIU G J,DAI Y W,et al.A New Method for Estimating the Primary Quantization Step of JPEG Double-Compression[J].Journal of Electronics & Information Technology,2009,31(4):836-839.(in Chinese)王俊文,刘光杰,戴跃伟,等.一种估计JPEG双重压缩原始量化步长的新方法[J].电子与信息学报,2009,31(4):836-839.
[16] DUAN X T,PENG T,LI F F,et al.Blind Separation of Tampered Images Based onJPEG Double Compression Properties [J].Journal of University of Jinan(Science and Technology),2017,31(2):87-96.(in Chinese)段新涛,彭涛,李飞飞,等.基于JPEG重压缩特性的篡改图像盲分离[J].济南大学学报(自然科学版),2017,31(2):87-96.
[17] LI B,SHI Y Q,HUANG J.Detecting doubly compressed JPEG images by using Mode Based First Digit Features[C]∥IEEE Workshop on Multimedia Signal Processing,2008.IEEE,2008:730-735.
[18] DONG L,KONG X,WANG B,et al.Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients[C]∥Sixth International Conference on Image and Graphics.IEEE Computer Society,2011:234-237.
[19] CHEN C,SHI Y Q,SU W.A Machine Learning Based Scheme for Double JPEG Compression Detection[C]∥2008 19th International Conference on Pattern Recognition.IEEE,2008:1-4.
[20] ZHU X M,XUAN G R,YAO Q M,et al.Re-sampling detection in information forensics[J].Compuer Applications,2006,26(11):2596-2597.(in Chinese)朱秀明,宣国荣,姚秋明,等.信息取证中图像重采样检测[J].计算机应用,2006,26(11):2596-2597.
[21] BIANCHI T,PIVA A.Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps[J].IEEE Transactions on Information Forensics & Security,2012,7(2):842-848.
[22] CHEN Y L,HSU C T.Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection[J].IEEE Transactions on Information Forensics & Security,2011,6(2):396-406.
[23] HUANG F,HUANG J,SHI Y Q.Detecting Double JPEG Compression With the Same Quantization Matrix[J].IEEE Transactions on Information Forensics & Security,2010,5(4):848-856.
[24] YANG J,XIE J,ZHU G,et al.An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix[J].IEEE Transactions on Information Forensics & Security,2014,9(11):1933-1942.
[25] LAI S Y,BÖHME R.Block convergence in repeated transform coding:JPEG-100 forensics,carbon dating,and tamper detection[C]∥IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2013:3028-3032.
[26] HAN H L,LI Y Z,NIU S Z,et al.Detecting Compression Traces in Multiple JPEG-Compressed Image[J].Journal of Applied Sciences-Electronics and Information Engineering,2014,32(6):596-604.(in Chinese)韩洪立,李叶舟,牛少彰,等.多重JPEG压缩图像的压缩痕迹检测[J].应用科学学报,2014,32(6):596-604.
[27] FARID H.Exposing Digital Forgeries From JPEG Ghosts[J].IEEE Transactions on Information Forensics & Security,2009,4(1):154-160.
[28] PASQUINI C,BOATO G,PEREZ-GONZALEZ F.Multiple JPEG compression detection by means of Benford-Fourier coefficients[C]∥IEEE International Workshop on Information Forensics and Security.IEEE,2014:113-118.
[29] PENNEC E L,MALLAT S.Sparse geometric image representations with bandelets[M].New York,IEEE Press,2005.
[30] JIANG Y X,ZHONG Z F,WANG L W.A wavelet coding preprocessing algorithm based on Bayesian estimation for image compression[C]∥International Conference on Machine Lear-ning and Cybernetics.IEEE,2005:5467-5472.
[31] WAKIN M B,ROMBERG J K,CHOI H,et al.Wavelet-domain approximation and compression of piecewise smooth images[J].IEEE Transactions on Image Processing,2006,15(5):1071-1087.
[32] SONG T,GUO S X,LI W.JPEG2000 and Realization of Its Coding System Theory[J].Modern Electronics Technique,2005,28(9):47-49.(in Chinese)宋涛,郭树旭,李伟.JPEG2000及其编码系统的实现[J].现代电子技术,2005,28(9):47-49.
[33] ZHANG D,ZHANG M,ZHANG J,et al.Novel algorithm for context-adaptive variable length coding[J].Journal of Zhejiang University(Engineering Science),2006,40(5):783-786.(in Chinese)张丁,张明,张瑾,等.一种新的自适应变长码编码算法[J].浙江大学学报(工学版),2006,40(5):783-786.
[34] CHEN K F,LIAN C J,CHEN H H,et al.Analysis and architecture design of EBCOT for JPEG-2000[C]∥IEEE International Symposium on Circuits and Systems.IEEE,2001:765-768.
[35] 孙延奎.小波分析及其应用(重点大学计算机教材)[M].北京:机械工业出版社,2005.
[36] TAUBMAN D.High Performance Scalable Image Compression with Ebcot[J].IEEE Transactions on Image Processing,2000,9(7):1158.
[37] WANG H Y.Detecrion Doctored Images Based on Double JPEG 2000 Compression[D].Tianjin:Tianjin University,2008.(in Chinese)王海英.基于JPEG2000双压缩的图像篡改检测[D].天津:天津大学,2008.
[38] FAN Z.The Research of Forged Image Detection Aiming at Splicing and Double JPEG2000 Compression[D].Shanghai:Shanghai Jiao Tong University,2011.(in Chinese)凡昭.面向拼接与JPEG2000双压缩的篡改图像检测研究[D].上海:上海交通大学,2011.
[39] ZHOU C,XU S S,HUANG Y L,et al.JPEG2000 Secondary-Compression Detection based on LOCP Feature[J].Information Security and Communications Privacy,2014,12(11):97-100.(in Chinese)周超,徐赛赛,黄豫蕾,等.基于LOCP特征的JPEG2000二次压缩检测[J].信息安全与通信保密,2014,12(11):97-100.
[40] QU Z,LUO W,HUANG J.A convolutive mixing model forshifted double JPEG compression with application to passive ima-ge authentication[C]∥IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2008:1661-1664.
[41] ZHAO J,GUO J C,ZHANG Y,et al.Automatic detection and localization of image forgery regions based on offset estimation of double JPEG compression[J].Journal of Image and Graphics,2015,20(10):1304-1312.(in Chinese)赵洁,郭继昌,张艳,等.JPEG图像双重压缩偏移量估计的篡改区域自动检测定位[J].中国图象图形学报,2015,20(10):1304-1312.
[42] HE J,LIN Z,WANG L,et al.Detecting Doctored JPEG Images Via DCT Coefficient Analysis[C]∥European Conference on Computer Vision.Springer-Verlag,2006:423-435.
[43] LUKÁŠJ,FRIDRICH J.Estimation of primary quantizationmatrix in double-compressed JPEG images[C]∥Proceedins of Digital Forensic Research Workshop.2003:5-8.
[44] FRIDRICH J,GOLJAN M,DU R.Steganalysis based on JPEG compatibility[J].Proc Spie,2001,4518:275-280.
[45] FARID H.Digital Image Ballistics from JPEG Quantization:TR 2006-583[R].Dartmouth College,2008.
[46] KORNBLUM J D.Using JPEG quantization tables to identify imagery processed by software[J].Digital Investigation,2008,5(Suppl):S21-S25.
[47] WESTFELD A.F5-A steganographic algorithm:High capacitydespite better steganalysis[J].Fourth Information Hiding Workshop,2001,2137(1):289-302.
[48] PROVOS N.Defending against statistical steganalysis[C]∥Conference on Usenix Security Symposium.USENIX Association,2001:24-24.
[49] DAI M,LIN J J,MAO J F.The Analysis and Detection of Doub le JPEG Compression[J].Journal of Image and Graphics,2006,11(11):2599-2602.(in Chinese)戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):2599-2602.
[50] PEVNY T,FRIDRICH J.Determining the stego algorithm for JPEG images[J].Information Security IEE Proceedings,2006,153(3):77-86.
[51] LI X,ZHANG T,HE Z Y,et al.Multi-class Steganalyzer with Recompression Detection for JPEG Images[J].Journal of Applied Sciences,2013,31(2):190-196.(in Chinese)李星,张涛,何赞园,等.结合重压缩检测的JPEG图像多类隐写分析[J].应用科学学报,2013,31(2):190-196.
[1] XING Wen-bo, DU Zhi-chun. JPEG Image File Header Forensics [J]. Computer Science, 2019, 46(6A): 353-357.
[2] XING Wen-bo, DU Zhi-chun. Digital Image Forensics for Copy and Paste Tampering [J]. Computer Science, 2019, 46(6A): 380-384.
[3] LUO Xiao-yang, HUO Hong-tao, WANG Meng-si and CHEN Ya-fei. Passive Image-splicing Detection Based on Multi-residual Markov Model [J]. Computer Science, 2018, 45(4): 173-177.
[4] LIU Li-juan and LIN Xiao-zhu. Image Forgery Detection Using Characteristics of Background Noise [J]. Computer Science, 2014, 41(Z11): 136-138.
[5] LE De-guang,JIANG Nan,ZHENG Li-xin and LI Xiao-chao. Image Region Cloning Authentication Algorithm Based on Local Invariant Feature and Outlier Detection [J]. Computer Science, 2014, 41(12): 118-124.
[6] KANG Xiao-bing,WEI Sheng-min. Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery [J]. Computer Science, 2011, 38(3): 295-299.
[7] WANG Xin,LU Zhi-bo. Locate Tampered Image Region Automatically Based on Inconsistency of ,JPEG Blocking Artifacts [J]. Computer Science, 2010, 37(2): 269-273.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .