Double JPEG Compression Detection Using Statistical Analysis
عنوان مقاله: Double JPEG Compression Detection Using Statistical Analysis
شناسه ملی مقاله: JR_ACSIJ-4-3_010
منتشر شده در شماره 3 دوره 4 فصل May در سال 1394
شناسه ملی مقاله: JR_ACSIJ-4-3_010
منتشر شده در شماره 3 دوره 4 فصل May در سال 1394
مشخصات نویسندگان مقاله:
Ehsan Nowroozi - Department of Computer Engineering Shahid Beheshti University Tehran, Iran
Ali Zakerolhosseini - Department of Computer Engineering Shahid Beheshti University Tehran, Iran
خلاصه مقاله:
Ehsan Nowroozi - Department of Computer Engineering Shahid Beheshti University Tehran, Iran
Ali Zakerolhosseini - Department of Computer Engineering Shahid Beheshti University Tehran, Iran
Nowadays with advancement of technology, tampering of digital images using computer and advanced software packages like Photoshop has become a simple task. Many algorithms have beenproposed to detect tampered images that have been kept developing. In this regard, verification of accuracy of imagecontent and detection of manipulations in image regardless of any previous knowledge about the image content and can be animportant research field. Recently, many efforts have been made in the area of image forensics, especially passive algorithms for detecting tampered images. JPEG format is one of the mostcommon formats used for image compression. Hence, JPEG images are subjected to attacks such as manipulation andcropping. Since single compressed and double compressed JPEG images contain blocking artifacts, therefore these images can bedetected by assessment of these artifacts. JPEG artifacts will be not aligned in double compressed images which have beenmanipulated. This paper intends to examine challenges existingin blocking artifact extraction and improve the detection of double compressed JPEG images. Results of experiments show that new proposed approach has a proper functionality
کلمات کلیدی: Detection of double JPEG compression,Digital Image Forensics, Image manipulation, Validation originality image, Detection image manipulate
صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/405208/