Dual JPEG Compatibility: a Reliable and ...
Type de document :
Pré-publication ou Document de travail
URL permanente :
Titre :
Dual JPEG Compatibility: a Reliable and Explainable Tool for Image Forensics
Auteur(s) :
Levecque, Etienne [Auteur]
Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Butora, Jan [Auteur]
Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Bas, Patrick [Auteur]
Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Butora, Jan [Auteur]
Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Bas, Patrick [Auteur]

Centrale Lille
Université de Lille
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Date de publication :
2024
Mot(s)-clé(s) en anglais :
JPEG; JPEG Forensics; JPEG Compatibility; Forgery localization
Discipline(s) HAL :
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Informatique [cs]/Traitement des images [eess.IV]
Informatique [cs]/Traitement des images [eess.IV]
Résumé en anglais : [en]
Given a JPEG pipeline (compression or decompression), this paper shows how to find the antecedent of a 8 × 8 block. If it exists, the block is compatible with the pipeline. For unaltered images, all blocks are always ...
Lire la suite >Given a JPEG pipeline (compression or decompression), this paper shows how to find the antecedent of a 8 × 8 block. If it exists, the block is compatible with the pipeline. For unaltered images, all blocks are always compatible with the original pipeline; however, for manipulated images, this is not always the case. This article demonstrates the potential of compatibility concepts for JPEG image forensics. It presents a solution to the main challenge of finding a block antecedent in a high-dimensional space. This solution relies on a local search algorithm with restrictions on the search space. We show that inpainting, copy-move, or splicing applied after a JPEG compression can be turned into three different mismatch problems and be detected. In particular, when the image is re-compressed after the modification, we can detect the manipulation if the quality factor of the second compression is higher than the first one. Our method can pinpoint forgeries down to the JPEG block with great detection power and without False Positive. We compare our method with two state-of-the-art models on localizing inpainted forgeries after a simple or a double compression. We show that under our working assumptions, it outperforms those models for most experiments.Lire moins >
Lire la suite >Given a JPEG pipeline (compression or decompression), this paper shows how to find the antecedent of a 8 × 8 block. If it exists, the block is compatible with the pipeline. For unaltered images, all blocks are always compatible with the original pipeline; however, for manipulated images, this is not always the case. This article demonstrates the potential of compatibility concepts for JPEG image forensics. It presents a solution to the main challenge of finding a block antecedent in a high-dimensional space. This solution relies on a local search algorithm with restrictions on the search space. We show that inpainting, copy-move, or splicing applied after a JPEG compression can be turned into three different mismatch problems and be detected. In particular, when the image is re-compressed after the modification, we can detect the manipulation if the quality factor of the second compression is higher than the first one. Our method can pinpoint forgeries down to the JPEG block with great detection power and without False Positive. We compare our method with two state-of-the-art models on localizing inpainted forgeries after a simple or a double compression. We show that under our working assumptions, it outperforms those models for most experiments.Lire moins >
Langue :
Anglais
Projet Européen :
Collections :
Source :
Date de dépôt :
2024-08-31T02:05:13Z
Fichiers
- document
- Accès libre
- Accéder au document
- paper.pdf
- Accès libre
- Accéder au document