Journal of Information Assurance and Security. ISSN 1554-1010 Volume 10 (2015) pp. 080-088 c MIR Labs, www.mirlabs.net/jias/index.html Integer DCT Convergence for JPEG-75 Forensics for Images Gamal Fahmy Electrical Engineering Dept., Assiut University, Egypt [email protected] Abstract: Many forensic techniques recently tried to detect the tampering and manipulation of JPEG compressed images that became a critical problem in image authentication and origin tracking. Some techniques indicated that a knowledgeable attacker can make it very hard to trace the image origin, while others indicated that portions of the compressed image that has been compressed at different quality factor quantization matrices are distinguishable if they are re-compressed at a higher quality factor quantization matrix (with less quantization steps). In this paper we propose the idea of adopting Integer DCT (ICT) as an implementation technique that can be utilized in the detection of any hacking or tampering of JPEG/ICT compressed images. The proposed approach is based upon recent literature ideas of recompressing JPEG image blocks and detecting if this block has been compressed/touched before or not. We also propose an ICT implementation that has a onetime signature on processed coefficients or pixels and can be used as a tool to detect if this block has been compressed before using the proposed implementation or not. We finally propose to recompress images originally compressed with ICT but with a different quantization matrix as a different compression parameter to analysis and detect more forgeries. Illustrative examples on several processed images are presented with complexity analysis. Keywords: image forensics, JPEG edits, IDCT compression, image security I. Introduction The recent availability of photo editing software with the wide spread use of digital imagery in different applications, has made it easier than ever to edit, manipulate and tamper the content of digital images. While manipulating different uncompressed image versions (i.e.bmp) can be easily none traceable, due to the easy replacement of pixels, compressed images with the widely used JPEG standard, [1] are harder to edit and tamper, due to footprints left by JPEG compression. Several researchers have tried to develop automatic forensic algorithms to detect any tampering or manipulation of JPEG images [2]. These techniques mainly rely on detecting distinctive features of the JPEG DCT coefficients (i.e. blocking artifacts). Hence we can track back any original or tampering information [3]. It has been shown recently [4, 5, 6], that a knowledgeable image attacker/hacker can restore original pixels distribution and hide any edits he makes in original JPEG images. Hence all forensic techniques will fail to detect any tampering of JPEG images. The main idea in [4, 5] is to fill the empty slots in the DCT coefficient distribution of the JPEG compressed images. This is done by introducing a dithering signal in the DCT domain that will match the distribution of tampered images to the original one and hide all traces of blocking artifacts. This dithering signal has to be sufficient to fill in all gaps, but if it exceeded a certain limit it will add noisiness to the recompressed image. Hence any artifact could be hidden without being detected with different forensic techniques. In [7], a novel idea was introduced which stated that compressed portions of an image that are not compressed at the same compression parameters (i.e. Quantization matrix) can be distinguishable if they are recompressed at a third different compression parameter. The compression parameter utilized in [7], was the quality factor quantization matrix. In [8], a continuation of the idea in [7], was presented were anti-forensic of a JPEG image can be countered if the tampered/hacked image is compressed at a different quality factor matrix that is higher in its values than the original JPEG quantization matrix and indicates less quantization steps. In [9], the authors were also able to estimate the original JPEG quantization matrix from the available questionable image, unlike [7], were this information was assumed to be available. In [10], the same idea of recompression was utilized but with a different quantization matrix size to detect forgery. In [11] a novel idea of testing the convergence of JPEG blocks after multiple transformations and their inverse to detect if this block has been tampered before or not, was introduced but it was only for JPEG-100 high quality images. In this paper we propose a novel anti-forensics methodology of compressing original images with an unconventional type of DCT that is not completely orthogonal, and results in a minor amount of distortion after inverse transformation. This Nonorthgonal transformation is similar to the Integer Cosine Transform (ICT), [12], that is generated from conventional DCT by replacing real numbers with integer ones. This ICT introduces a minor amount of error that is affordable to most applications, but more importantly it spreads this error in high frequency regions (edges) and makes any MIR Labs, USA 81 Fahmy further processing or recompression of this original image easily detectable due to this unique feature of nonorthogonality. We note here that utilizing ICT for compression will result in non optimal JPEG compressed image that are known as JPEG-75 images, where conventionally and optimally DCT compressed images are known as JPEG-100 images due to the quality matrix used in compression and the amount of error it results in [1, 4, 5, 6]. We also propose an efficient implementation for ICT and how it can be utilized in JPEG-75 forensics. Experiments on a large set of database of images that has both original and tampered images were conducted. Any further manipulations to images compressed with ICT were easily detectable with false accept rate of less than 2% and a false reject rate up to 3%. We finally propose to decompose ICT compressed images with different Quantization Matrix (QM) sizes to redistribute any possible dithered noise that is typically injected in tampering or hacking, to detect possible forgeries, similar to [10] and [9]. Some parts and Preliminary results of this paper has been presented before in [10], [13] and [14], and this work aims at bringing different parts in one system. Section 2 of this paper provides necessary background for ICT, its structure, features and compression-distortion tradeoff. Section 3 proposes our novel methodology of utilizing ICT in detecting forgery along with a theoretic justification for its one time processing signature. Section 4 presents our model to measure block convergence of ICT and how it can be utilized for local tamper detection. In section 5, we decompose the ICT compressed images with different QM and show how it can provide an additional tool to detect forgeries. Section 6 presents our simulation results on a large set of images along with false accept and false reject response to our ICT based proposed approach for detecting forgery in JPEG images. Discussions are in section 7, followed by conclusions and references in section 8 and 9, respectively. II. Background ICT allows the basic vectors of processed data to be nonorthogonal. This ICT achieves a balance between reconstruction error and the dyadic symmetry between ICT coefficients. This dyadic symmetry, [15], would make transform coefficients have an average variance σr2 that is greater than the variance of quantization error σq2 . Hence there is a minor amount of reconstruction error after inverse transformation that is greater than the quantization error that exists due to this nonorthogonality. If we assume that the ICT is represented by a matrix T , and the inverse ICT is T T , hence the expected reconstruction error Er is the difference between T T T and the identity matrix I, where the reconstruction error for data with size N xN is σr2 = N −1 N −1 1 X X M (k, j)R(j − k) N2 j=0 (1) k=0 where M = ErT Er and R(.) is the autocorrelation of input image of size N xN . We note here that this T transformation matrix that has nonorthogonal basis would magnify the reconstruction error if multiplied by another orthogonal matrix B (post processing). The resulting image after reconstruction for this post processing would be Y = B T T T XT B (2) where X and Y are the input and output images. Hence the reconstruction error for equation 2, EBr inherits this inequal2 2 ity EBr ≥ Er , also for the variance σBr , σBr ≥ σr2 . This last equation can also be written in the form Y = DT .X.D, where D = T B and this corresponds to a nonorthgonal transformation of input data and projection of it into a plane that is more diverse and scattered in its basis, due to the past two inequalities. We note here that if this post processing matrix B is also nonorthogonal similar to T , then the reconstruction error, EBr , would be even greater. If this post processing of that B matrix is repeated multiple times, there would be a significant amount of distortion that can be easily detected. We also note that this nonorthogonal matrix T projects data into basis ck . These basis can be mostly recovered by the inverse matrix T T , but some of these basis are L2 normed due to the rounding and nonorthogonality of T . If we assume that these basis ck are further transformed m times by either orthogonal or nonorthogonal matrices, B or T (post processing like matrix D), the resulting basis cm k that data would be projected upon, would be further diverse and the amount of original data samples that can be recovered is further reduced. Hence the reconstruction error would significantly increase with a large number of m and would also increase if we use more nonorthogonal matrices T in further transformations. III. ICT based detection of image forgery In [11] the idea of transforming and inverse transforming input data multiple times was introduced. Convergence of output data to a saturated value was an indication if the source block (input) was hacked or manipulated before or not. This algorithm relied on the concept that multiple transformations and inverse transformations for the same data would keep the quantization error saturate to zeros, and the variance of 2 would be closer to the variance of output dainput data σxr 2 . After m transformations and inverse transformations ta σyr 2 2 for a high number would be equal to σyr (processings) σxr of m. In other words for input data x that is transformed and then inverse transformed t times, it would be xt and the following equation would apply xt+1 = tr([IDCT ([DCT (xt )])]), t ≥ 0 (3) where [.] denotes rounding and tr(.) truncates to the value range. It has been shown in [11] that x0 or xt for low t values would imply that the input data x has not been touched before, but for a large value of t, xt+1 would tend to be equal to xt , as the quantization error would be negligible (or actually zero). This analysis was given for orthogonal transforms in [11] and it has been shown that the term stability would imply that xt is equal to xt+1 . It is our belief in this paper that this divergence would be even greater if utilized with a nonorthogonal transform. Moreover with a nonorthogonal transform the difference between x0 (that would imply authenticity and no tampering) and x1 (which indicates a possibility of a one-time tampering) would be significant and even greater than the case for orthogonal Integer DCT Convergence for JPEG-75 Forensics for Images 82 transforms, equation 3. Also σx2t+1 is ≥ σx2t which is ≥ σx2t−1 .......until we reach σx20 which is the variance of the authenticated originally compressed data. In this part we will mathematically analyzes the ICT matrix decomposition and verify its one time signature on processed input data samples. The ICT matrix, B is typically generated from rounding the conventional DCT matrix A to integer values. This rounding happens when matrix A is truncated and normalized to endless values, hence the normalization factor of ICT can be itself a unique signature. g g g g g g g g a b c d −d −c −b −a e f −f −e −e −f f e b −d −a −c c a d −b (4) A= g −g −g g g −g −g g c −a d b −b −d a −c f −e e −f −f e −e f d −c b −a a −b c −d Moreover we here study and compare the Eigen analysis of an image originally compressed with a nonorthogonal matrix then manipulated for a m or n values as in equation 6. We note here that we kept m and n values low, ≤ 2 to indicate minor hacking or tampering and to see if it is distinctive enough from the originally compressed image (m, n = 0). Fig.2 shows the distribution of the Eigen values of the cameraman image after being processed through equation 6, for different t, n and m values. It can be easily noticed from Fig.2, that the Eigen values distribution is unique for the one time processed image (m, n = 0). Due to the well-known feature of Eigen values that measure energy concentration, Fig.2 shows the unique energy distribution for the originally compressed image with no hacking or tampering. where a = 0.4904, b = 0.4157, c = 0.2778, d = 0.0975, e = 0.4619, f = 0.1913 and g = 0.3536. .35 0.49 0.46 0.41 0.35 0.27 0.19 0.09 B= .35 0.41 0.19 −0.09 −0.35 −0.49 −0.46 −0.27 .35 0.27 −0.19 −0.49 −0.35 0.09 0.46 0.41 .35 0.09 −0.46 −0.27 0.35 0.41 −0.19 −0.49 .35 0.09 −0.46 0.27 0.35 −0.41 −0.19 0.49 .35 −0.27 −0.19 0.49 −0.35 −0.09 0.46 −0.41 .35 −0.41 0.19 0.09 −0.35 0.49 −0.46 0.27 .35 −0.49 0.46 −0.41 0.35 −0.27 0.19 −0.09 (5) If we assume data is one time processed through a nonorthogonal transformation B, then tampered several times by either a similar nonorthogonal transform or an orthogonal one A, the resulting output data, Y would be equal to: Y = (B T .B)t .(AT .A)m .(B T .B)n .X (6) where the powers m and n indicates how many times the processed originally compressed image is tampered by either A or B, respectively. t takes a value of 0, or 1 to indicate if the image is first originally compressed with a nonorthogonal one, B or not. If the image is originally compressed with a conventional orthogonal transform, A, then for any further tampering or hacking by a similar orthogonal transform, forgery would be harder to detect. With our proposed nonorthogonal transformation B, any further tampering can be easily detected as in Fig.1. Fig.1 shows the histogram of equation 6 for different values of m and n for t equals 0 or 1. It is obvious from Fig.1, that if an image is originally compressed with a nonorthogonal transform then hacked with different orthogonal or nonorthogonal matrices(dotted lines), it can be easily identified from a conventionally compressed image (solid line in the figure). The higher is the m or n values, the more saturated is the output values from the first processed image were m and n equals zeros. The more orthogonal transforms are used post the originally utilized nonorthgonal transform, the more distinctive is the originally compressed image from any post version. This proposed transformation represents a onetime signature that can only be removed if the hacker knows the original nonorthogonal matrix originally adopted in compression which is not likely to happen, especially that the utilized ICT can have a random normalization factor as shown before in equation 5,6. IV. Block Convergence of JPEG-75 Images In [11], block convergence was measured for JPEG compressed images with quality factor (quantization table QT) 100, each block was denoted stable if xt is equal to xt+1 , as in equation 3. We mean here by block convergence the convergence path of block values after repeated rounding from transformations and inverse transformations, as in equation 3. Different experimentations were conducted for different DCT implementations and the authors were able to measure the stability of all blocks (and also determine the value of t) in a large image database. The authors concluded that the distribution of the number of iteration until blocks are stable is mostly independent of the image content. This has been validated for different DCT implementations. Later on in [11], the authors gave a scenario for how this could be used in JPEG forensics. They assume if the forensic scientist knows the DCT implementation adopted in original compression, for QT-100 they can estimate the number of times each block has been compressed or touched before. Local tampering can then be detected for an image portion if it has a different distribution of stable blocks than the rest of the image. In this section we plan to apply the same block convergence technique and utilize it in countering JPEG anti-forensics but for JPEG-compressed images with QT less than 100 (e.g. 75). We note here that JPEG-75 images have a lower quality than JPEG-100, as there is more quantization error energy in it. This is due to the fact that the QT is not just zeros and ones, but it has many fractions. We propose to utilize this block convergence for JPEG-75 images that are originally compressed with ICT. It is our belief that utilizing ICT with JPEG -100 images for carbon dating scenarios would not be helpful as there is already a reconstruction error that is accumulated. This will make image blocks converge after a large value of t for all attacked and non-attacked blocks and there will be no distinction between them in tampering detection (the block would converge to be stable after a large value of t, equation 3), typically between 22 and 26 as in our conducted experiments. In [11], they reported similar results for JPEG-100 with fast DCT implementation. However with JPEG-75 images, there is already an amount of distortion introduced due to the quantization error. It is our belief that this quantization error introduces noise that counters the reconstruction noise that results from multiple transformations and inverse transformations (post compressions). This 83 Fahmy Figure. 1: Histogram of image according to equation 6 is due to the fact that reconstruction noise is L2 normed after inverse transformation and is projected into a perpendicular direction to the quantization noise (or at least different direction), chapter 9 in [16]. ICT block convergence will become stable only if the reconstruction error is less than the quantization error energy. This quantization error energy is much bigger in the case of JPEG-75 (than JPEG-100), as the error is bigger and the quantization table contains values other than zeros and ones (which is the case for JPEG-100). This makes block convergence faster and the value of t much smaller and it will be possible to make a distinction between hacked and untouched blocks. This is because hacked blocks will have added noise which makes their stable t value different. If we assume a forensic expert want to examine an ICT compressed image, he would measure the value of t in equation 3, for which this ICT originally compressed image would converge at. We mean by converge the value were the block would become stable at. In Fig.3, we show the histogram of no. of blocks against values of t at which the image would converge for different DCT implementations, ICT and regular orthogonal DCT for JPEG-100 images. It can be easily noticed that both transformations would converge after a large value of t for different images. Next we apply the same methodology but for lower quality images, JPEG-75 images that have more quantization noise due to the values of QT as shown before. Fig.4 shows the same histogram values of Fig.3 but for JPEG-75 images. It can be noticed that there is a significant difference between the stable t values for both implementations. As a key observation for us, ICT would not be useful in tampering detection as mentioned before with JPEG-100 as the reconstruction error would be accumulated and would hide any tampering noise. Hence the value of t for stable blocks would not be different for tampered or non-tampered image portions. V. Detectable tampering with smaller QM We here propose to recompress the original JPEG image through a DCT quantization matrix of smaller size and more detailed basis, 4x4 size if the original is 8x8 size. This lower dimension matrix would project the extra energy through Figure. 2: Distribution of Eigen values of Cameraman Image several middle and corner cosine frequencies and makes it impossible to eliminate. Hence a considerable amount of visual distortion would still exist in the modified image and can be detected. We note here that the projection of the extra dithering energy, [4, 5], into different DCT basis will spread any extra/unadjusted values to data samples across the whole image, which makes it impossible to track. Our main contribution here lies in recompressing the tampered image with a more local detailed and smaller size, quantization matrix, 4x4. This smaller dimension matrix, will L2 norm the extra energy into different middle frequency basis, accodring to the well known DCT formula [17]. Hence, this dithering signal energy will no longer be limited with the quantized bins and its neighboring bins in the same size quantization matrix, but it will be spread into neighboring frequencies. These neighboring frequencies are typically spread all over the whole modified JPEG image, and it would be almost impossible to eliminate. Hence, a significant amount of distortion in the recompressed image that is spread all over the tampered image is inevitable. Due to the additive nature of the L2 norm in DCT transformation, it is only possible to calculate the distortion for the whole image, not on a regionregion or subband-subband basis. Hence, the MSE difference Integer DCT Convergence for JPEG-75 Forensics for Images 84 the dithered signal depended mainly on two factors, the quality factor that was used in the initial JPEG 8x8 compression, and the amount of dithering energy that was added. Table 1: Performance of the detection of tampered images Q and noise Non orth. error ICT Orth. error DCT Q=30 0.2db Q=50 0.2db Q=90 0.2db Q=30 0.3db Q=50 0.3db 99.1% 98.5% 98.3% 99.6% 98.9% 2.9% 3.2% 3.7% 1.8% 1.9% 98.5% 98.1% 97.6% 98.8% 98.1% 3.1% 3.6% 3.9% 2.3% 2.7% VI. Experimental Results Figure. 3: Distribution of Eigen values of Cameraman JPEG-100 Figure. 4: Distribution of Eigen values of Cameraman JPEG-75 for the original JPEG image and the recompressed one at a smaller size quantization matrix is the only avenue to investigate any tampering or manipulation. In case of no hacking, there still exit an inevitable amount of minor distortion due to the L2 norm projection into different DCT basis. However, when a dithering energy signal is added a significant noticeable distortion is added and spread over the image that makes hacking/tampering clear enough to be noticed. We note here that in our proposed technique due to the high frequency energy nature of the dithering energy that is packed near edges and high frequencies, more distortion is visible in the recompressed image at higher frequency regions (edges). This makes our proposed technique more suitable for detecting any manipulation in high frequency regions (which are always the attacked regions). We carried out a large scale of testing of the proposed algorithm on 160 outdoor natural images, all of size 256 x256 pixels, luminance component only, and all were originally compressed with the JPEG standard with the well known 8x8 quantization matrix. 45 of the examined images were hacked/manipulated, by having part of it modified with a dithering Gaussian noise signal added according to the technique in [4, 5]. All these images were later recompressed with the 4x4 DCT matrix [1]. This detection of We tested our proposed ICT based compression algorithm on a data base of 1024 images of the well-known Vistex image database [18], that represents several images of different frequencies and orientations. In our first experimental part, images were compressed with regular conventional DCT matrix, then they were hacked back to the DCT domain using the dithering signal that injects noise across different high frequencies and guarantees that this injected noise is within bound and less than the quantization error ∆2 /2 as in [4, 5]. In the second experimental part images were also compressed with the same compression factor (Quality factor=75) using the proposed ICT based JPEG compression technique and then they were hacked and tampered in a similar way to the first part with several compression ratios and with different hacking matrices. We note here that in the second part the ICT matrix originally utilized for compression was blind; hence hacking attempts were done using several orthogonal or nonorthogonal matrices. Table 1 lists the recall and error values for hacking/manipulation detection of images using our proposed technique (for adopting nonorthogonal transformation in JPEG compression) and the conventional DCT orthogonal transformation for three different quality factors and different injected noise. Fig.5 shows the histogram of DCT coefficients of the Cameraman image before noise dithering, after dithering using [4, 5] were regular orthogonal transformation is used for original compression, and after dithering were nonorthogonal transformation is adopted. It can be noticed that hacking or tampering using the noise dithering signal [4, 5] can be easily detected with a different hacking transformation. Fig.6 shows a tampered image where an object was hacked and dithered with noise and Fig.7 shows that tampered image after IDCT projection with blocks with inconsistent distribution filled with black blocks. Fig.8 shows the receiver operating characteristics curve (ROC) for 160 images with both orthogonal (case a dotted line) and nonorthogonal (case b solid line) used for initial compression, were hacking and tampering is performed using an orthogonal back transformation. In our next experiment we assume a forensic expert would test a suspectable image that is originally compressed using ICT to determine if it has been tampered of not. He would apply equation 3, and mark stable blocks in the tested image. As this image is already degraded with lower quality (JPEG75), most blocks would be stable after a short t value even in the presence of reconstruction noise; t would equal 5 or 6 at 85 Fahmy the most. However if there is a local image portion that has been tampered, there would be inconsistency in the distribution of stable blocks in this tampered image portion, and this would be an indication of local tampering or hackings. Fig.9 shows an original image (with low quality JPEG-75) and a tampered version (Fig.10) as well as the distribution of stable blocks in the image(Fig.11). ICT has been used for original compression for this image, and then has also been utilized for post compression, equation 3, to determine the stable t values. Stable blocks for this image are determined for t value ≥ 4. It can be easily noticed that the hacked portion of the image has inconsistency in the distribution of stable blocks. Table 2 shows average values of t for several images for which blocks will become stable for ICT and regular DCT for JPEG-75. Table 2: Stable t values for ICT and DCT for JPEG-75 t value Cameraman Lina Indoor Outdoor ICT 99.1% 98.5% 98.3% 99.6% Table 3: Performance of the detection of tampered images Rec.4x4 98.1% 97.5% 97.3% 98.6% 96.9% error4x4 2.2% 2.2% 2.4% 1.2% 1.4% Rec.8x8 97.5% 97.1% 96.6% 96.8% 97.1% Table 4: Distortion Error for Nonorthogonal matrix values a 0.49 0.62 0.35 0.18 DCT 3.1% 3.2% 3.7% 1.8% With respect to section 5, table 3 lists the recall and error values for hacking/manipulation detection of images using our technique (sizes 4x4 and 8x8) for three different quality factors and different dithering signal noises. It can be easily noticed the difference in error and recall values details between the 4x4 and 8x8 QM. Q and noise Q=30 0.2db Q=50 0.2db Q=90 0.2db Q=30 0.3db Q=50 0.3db hacking or tampering. After several transformation the values of the JPEG compressed image saturates to fixed values due to the noise removal that is usually less than the quantization error ∆2 /2. With respect to compression/reconstruction error, table 4 shows distortion errors for different nonorthogonal matrix values, which proves the insignificant error when adopting it for compression. With respect to utilizing a smaller size quantization matrix, (according to section 5, the previous work in [4, 5, 7, 9, 19]), the performance of any tampering detection deteriorates with a quality matrix that is very high. As this will make the quantization almost lossless, like manipulating a never compressed image, hence detecting the tampering is almost impossible. error8x8 2.6% 3.3% 3.6% 2.3% 3.3% VII. Discussion We note here that JPEG-75 images in countering antiforensics represent a more practical scenario of detecting local tampering. This is because image hackers tends to down grade the quality of the image after it has been edited, so they can hide editing traces. It is also our belief that ICT can be best suitable for these JPEG-75 images in tampering detection. We note here that our proposed block convergence measurement for low quality images, JPEG-75, originally compressed with ICT can be useful in media industries that utilize ICT in compression due to its efficient implementations. With our proposed approach, images produced by such industries can be better identified if hacked or tampered even if they have degraded quality with our proposed block convergence methodology. We note here that our proposed nonorthogonal transformation matrix, has been adopted during the past decade in hardware implementation for media applications, due to the fact that this B matrix can be implemented without any multipliers but with only shifters and adders. We also note that our proposed technique can detect any hacking with even one inverse back transformation for b 0.41 0.61 0.67 0.43 c 0.27 0.37 0.41 0.28 d 0.09 0.19 0.34 0.4 e 0.46 0.23 0.31 0.17 f 0.19 0.13 0.19 0.43 g 0.35 0.41 0.24 0.21 Er.% 7% 9% 12% 6% VIII. Conclusions and Future Research In this paper we presented our own approach of utilizing ICT in detecting local tampering with less quality images (not optimal compression, like JPEG-75). We utilized the block convergence methodology first introduced in [9], and adapted it to suit JPEG-75 images with our newly proposed ICT in the countering anti-forensics area. We presented a novel algorithm for the detection of tampered images. The proposed technique relies on compressing the original authenticated image with a nonorthogonal transformation, hence any hacking by reverting it back to the DCT domain and inserting different values with a noise dithering signal to hide it can be easily noticed, as this nonorthogonal technique represents a onetime signature that can be hardly avoided. We also presented our own implementation approach for ICT (Integer Cosine Transform) and it can efficiently implemented. We finally projected data samples into more localized DCT basis that have a stronger analysis capability and can detect any hacking or manipulation more accurately. Illustrative graphs of the proposed idea as well as comparisons with other recent literature techniques are presented. Future work would include studying a theory for the distribution of stable blocks with image content, as well as investigating the cases of color images. We also consider the issue of studying more local features such as spatial frequency magnitude and phase in forgery detection. This work is supported in part by the Alexander von Humboldt foundation in Germany. We acknowledge the support and comments of Dr Rolf Wurtz at Universitat Bochum, Germany. Acknowledgments This work is supported in part by the Alexander von Humboldt foundation, Germany. We acknowledge the support and comments of Rolf Wurtz at Universitat Bochum, Germany. Integer DCT Convergence for JPEG-75 Forensics for Images References [1] T. Lane, “Independent jpeg group software codec,” . [2] Z. Fan and R.L. de Queiroz, “Identification of bitmap compression history: Jpeg detection and quantizer estimation,” Image Processing, IEEE Transactions on, vol. 12, no. 2, pp. 230–235, 2003. [3] A.J. Fridrich, B.D. Soukal, and A.J. Lukáš, “Detection of copy-move forgery in digital images,” in in Proceedings of Digital Forensic Research Workshop. Citeseer, 2003. [4] M.C. Stamm, S.K. Tjoa, W.S. Lin, and K.J.R. Liu, “Anti-forensics of jpeg compression,” in Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. IEEE, 2010, pp. 1694– 1697. 86 [14] Gamal Fahmy, “Nonorthogonal dct block convergence for jpeg-75 forensics,” in ISSPIT 2014, International Symposium on Signal Processing and Information Technology; Proceedings of. ISSPIT, 2014. [15] Mohamed Nasr Haggag, Mohamed El-Sharkawy, and Gamal Fahmy, “Efficient fast multiplication-free integer transformation for the 2-d dct h. 265 standard,” in Image Processing (ICIP), 2010 17th IEEE International Conference on. IEEE, 2010, pp. 3769–3772. [16] S. Mallat, A wavelet tour of signal processing: the sparse way, Access Online via Elsevier, 2010. [17] S.H. Jung, S.K. Mitra, and D. Mukherjee, “Subband dct: Definition, analysis, and applications,” Circuits and Systems for Video Technology, IEEE Transactions on, vol. 6, no. 3, pp. 273–286, 1996. [5] M.C. Stamm, S.K. Tjoa, W.S. Lin, and K.J.R. Liu, “Undetectable image tampering through jpeg compression anti-forensics,” in Image Processing (ICIP), 2010 17th IEEE International Conference on. IEEE, 2010, pp. 2109–2112. [18] T. Chang and C.C.J. Kuo, “Texture analysis and classification with tree-structured wavelet transform,” Image Processing, IEEE Transactions on, vol. 2, no. 4, pp. 429–441, 1993. [6] Zhung-Han Wu, Matthew C Stamm, and KJ Liu, “Antiforensics of median filtering,” in Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, 2013, pp. 3043–3047. [19] VALENZISE G., TAGLIASACCHI M., and TUBARO S., “Detectability-quality trade-off in jpeg counterforensics,” in IEEE Int. Conf. on Image Processing, ICIP, 2014. [7] H. Farid, “Exposing digital forgeries from jpeg ghosts,” Information Forensics and Security, IEEE Transactions on, vol. 4, no. 1, pp. 154–160, 2009. Author Biography [8] G. Valenzise, M. Tagliasacchi, and S. Tubaro, “The cost of jpeg compression anti-forensics,” in Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. IEEE, 2011, pp. 1884– 1887. Gamal Fahmy [9] G. Valenzise, V. Nobile, M. Tagliasacchi, and S. Tubaro, “Countering jpeg antiforensics,” in IEEE Int. Conf. on Image Processing, ICIP, 2011. [10] Gamal Fahmy, “Detectable tampering of jpeg antiforensics,” in WIAR’2012; National Workshop on Information Assurance Research; Proceedings of. VDE, 2012, pp. 1–4. [11] ShiYue Lai and Rainer Bhme, “Block convergence in repeated transform coding: Jpeg-100 forensics, carbon dating, and tamper detection.,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013, Vancouver, BC, Canada, 2013, pp. 3028–3032, IEEE. [12] Jie Dong, King Ngi Ngan, Chi-Keung Fong, and WaiKuen Cham, “2-d order-16 integer transforms for hd video coding,” Circuits and Systems for Video Technology, IEEE Transactions on, vol. 19, no. 10, pp. 1462– 1474, 2009. [13] Gamal Fahmy, “Nonorthogonal dct implementation for jpeg forensics,” in The 14th International Conference on Hybrid Intelligence, Kuwait, dec. 2014. IEEE, 2014. Gamal Fahmy was born in Leeds, U.K. in 1973. He received the B.Sc. and M.Sc. degrees from Assiut University, Assiut, Egypt, in 1996 and 1998, respectively, and the Ph.D. degree in electrical engineering from Arizona State University, Tempe, USA in 2003. From 2003 to 2005, he was a Research Assistant Professor with West Virginia University,Morgantown, where he worked on several identification and recognition projects in collaboration with different federal agencies in the United States, such as the Federal Bureau of Investigation, the National Institute of Justice, Transportation Security Administration, and the Department of Homeland Security. He won the Egypt National State award in Engineering Sciences 2012-2013. His research interests include image super-resolution, perceptual image compression, human vision, biometrics (IRIS recognition and 3-D face recognition), and image forenscis. Dr. Fahmy is currently an 87 Fahmy alexander von Humboldt research fellow at Bochum Universitat, Germany, he is also with the Electrical Engineering Department, Assiut University, Egypt. (a) Before dithering (b) After Non Orth. dithering (c) After Orth. dithering Figure. 5: Histogram of DCT values before and after noise dithering Integer DCT Convergence for JPEG-75 Forensics for Images 88 Figure. 6: Hacked image with noise dithering Figure. 9: Distribution of Stable blocks of Ship Image Figure. 7: Hacked image with black boxes on suspectable IDCT blocks Figure. 8: Receiver Operating Characteristics curve (ROC) Figure. 10: Distribution of Stable blocks of Ship Image Figure. 11: Distribution of Stable blocks of Ship Image
© Copyright 2026 Paperzz