Dual JPEG Compatibility: a Reliable and ...
Document type :
Pré-publication ou Document de travail
Permalink :
Title :
Dual JPEG Compatibility: a Reliable and Explainable Tool for Image Forensics
Author(s) :
Levecque, Etienne [Auteur]
Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Butora, Jan [Auteur]
Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Bas, Patrick [Auteur]
Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Butora, Jan [Auteur]
Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Bas, Patrick [Auteur]

Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Publication date :
2024
English keyword(s) :
JPEG; JPEG Forensics; JPEG Compatibility; Forgery localization
HAL domain(s) :
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Informatique [cs]/Traitement des images [eess.IV]
Informatique [cs]/Traitement des images [eess.IV]
English abstract : [en]
Given a JPEG pipeline (compression or decompression), this paper shows how to find the antecedent of a 8 × 8 block. If it exists, the block is compatible with the pipeline. For unaltered images, all blocks are always ...
Show more >Given a JPEG pipeline (compression or decompression), this paper shows how to find the antecedent of a 8 × 8 block. If it exists, the block is compatible with the pipeline. For unaltered images, all blocks are always compatible with the original pipeline; however, for manipulated images, this is not always the case. This article demonstrates the potential of compatibility concepts for JPEG image forensics. It presents a solution to the main challenge of finding a block antecedent in a high-dimensional space. This solution relies on a local search algorithm with restrictions on the search space. We show that inpainting, copy-move, or splicing applied after a JPEG compression can be turned into three different mismatch problems and be detected. In particular, when the image is re-compressed after the modification, we can detect the manipulation if the quality factor of the second compression is higher than the first one. Our method can pinpoint forgeries down to the JPEG block with great detection power and without False Positive. We compare our method with two state-of-the-art models on localizing inpainted forgeries after a simple or a double compression. We show that under our working assumptions, it outperforms those models for most experiments.Show less >
Show more >Given a JPEG pipeline (compression or decompression), this paper shows how to find the antecedent of a 8 × 8 block. If it exists, the block is compatible with the pipeline. For unaltered images, all blocks are always compatible with the original pipeline; however, for manipulated images, this is not always the case. This article demonstrates the potential of compatibility concepts for JPEG image forensics. It presents a solution to the main challenge of finding a block antecedent in a high-dimensional space. This solution relies on a local search algorithm with restrictions on the search space. We show that inpainting, copy-move, or splicing applied after a JPEG compression can be turned into three different mismatch problems and be detected. In particular, when the image is re-compressed after the modification, we can detect the manipulation if the quality factor of the second compression is higher than the first one. Our method can pinpoint forgeries down to the JPEG block with great detection power and without False Positive. We compare our method with two state-of-the-art models on localizing inpainted forgeries after a simple or a double compression. We show that under our working assumptions, it outperforms those models for most experiments.Show less >
Language :
Anglais
European Project :
Collections :
Source :
Submission date :
2024-08-31T02:05:13Z
Files
- document
- Open access
- Access the document
- paper.pdf
- Open access
- Access the document