Upscaling factor estimation on double JPEG compressed images | Multimedia Tools and Applications Skip to main content
Log in

Upscaling factor estimation on double JPEG compressed images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Resampling detection is one of the most important topics in image forensics. Some methods can even estimate the resampling factors. However, it remains a challenge on the post-compressed images because the JPEG compression destroys the statistical characteristics of the resampled images which greatly affect the detection ability. In this paper, we propose a method to estimate the upscaling factors of double JPEG compressed images in the presence of image upscaling between the two compressions. Both of the pre-compression and the post-compression have a great impact on the estimation. We first analyze the pre-compressed image upscaling and find that the peaks produced by the pre-compression will be suppressed by the post-compression. Therefore, the post-compression has a greater impact than the pre-compression. Through analyzing the influence of post-compression and the causes of the periodic JPEG peaks, we find that the image block estimation can effectively reduce the influence of JPEG block artifacts. To further improve the detection ability, a Gaussian filtering model is developed to deal with JPEG block artifacts and a detector which can more effective extract resampling characteristic is proposed to estimate the upscaling factor. The experimental results demonstrate that the proposed detection method outperforms some state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Trans Inform Forens Secur 7(4):1105–1117

    Google Scholar 

  2. Bianchi T, Piva A (2012) Reverse engineering of double jpeg compression in the presence of image resizing. In: 2012 IEEE International workshop on information forensics and security (WIFS), pp 127–132

  3. Birajdar GH, Mankar V (2014) Blind method for rescaling detection and rescale factor estimation in digital images using periodic properties of interpolation. AEUE - International Journal of Electronics and Communications, 68

  4. Blachman NM, Mousavinezhad SH (1990) The spectrum of the square of a synchronous random pulse train. IEEE Trans Commun 38(1):13–17

    Google Scholar 

  5. Cao G, Zhao Y, Ni R, Li X (2014) Contrast enhancement-based forensics in digital images. IEEE Trans Inform Forens Secur 9(3):515–525

    Google Scholar 

  6. Chen C, Ni J, Shen Z (2014) Effective estimation of image rotation angle using spectral method. IEEE Signal Process Lett 21(7):890–894

    Google Scholar 

  7. Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254

    Google Scholar 

  8. Chen C, Ni J, Shen Z, Shi Y (2017) Blind forensics of successive geometric transformations in digital images using spectral method: theory and applications. IEEE Trans Image Process 26(6):2811–2824

    MathSciNet  MATH  Google Scholar 

  9. Chen X, Weng J, Lu W, Xu J (2018) Multi-gait recognition based on attribute discovery. IEEE Trans Pattern Anal Mach Intell 40(7):1697–1710

    Google Scholar 

  10. Chen X, Weng J, Lu W, Xu J, Weng J (2018) Deep manifold learning combined with convolutional neural networks for action recognition. IEEE Trans Neural Netw Learn Syst 29(9):3938–3952

    Google Scholar 

  11. Dalgaard N, Mosquera C, Pérez-González F (2010) On the role of differentiation for resampling detection. In: 2010 IEEE International conference on image processing, pp 1753–1756

  12. Feng X, Cox IJ, Doerr G (2012) Normalized energy density-based forensic detection of resampled images. IEEE Trans Multimed 14(3):536–545

    Google Scholar 

  13. Gardner AW (1994) Cyclostationarity in communications and signal processing. IEEE Press

  14. Gallagher AC (2005) Detection of linear and cubic interpolation in jpeg compressed images. In: The 2nd Canadian conference on computer and robot vision, pp 65–72

  15. Gloe T, Bohme R (2010) The ‘Dresden image database’ for benchmarking digital image forensics. In: Proceedings of the 25th symposium on applied computing (ACM SAC 2010), vol 2, pp 1585–1591

  16. He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on markov features in dct and dwt domain. Pattern Recogn 45(12):4292–4299

    Google Scholar 

  17. Huang X, Liu Z, Lu W, Liu H, Xiang S (2019) Fast and effective copy-move detection of digital audio based on auto segment. Int J Digit Crime Forens 11:47–62

    Google Scholar 

  18. Kao YT, Lin H, Wang CW, Pai YC (2012) Effective detection for linear up-sampling by a factor of fraction. IEEE Trans Image Process 21(8):3443–3453

    MathSciNet  MATH  Google Scholar 

  19. Katzenbeisser HCN (2013) Detecting resized double jpeg compressed images - using support vector machine. In: Communications and multimedia security: 14th IFIP TC 6/TC 11 international conference, pp 113–122

  20. Kirchner M (2008) Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: Proceedings of the 10th ACM workshop on multimedia and security. ACM, New York, pp 11–20

  21. Kirchner M (2010) Linear row and column predictors for the analysis of resized images. In: Proceedings of the 12th ACM workshop on multimedia and security. ACM, New York, pp 13–18

  22. Kirchner M, Gloe T (2009) On resampling detection in re-compressed images. In: 2009 First IEEE international workshop on information forensics and security (WIFS), pp 21–25

  23. Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20 (12):3524–3533

    MathSciNet  MATH  Google Scholar 

  24. Li L, Xue J, Tian Z (2013) Moment feature based forensic detection of resampled digital images. In: Proceedings of the 21st ACM international conference on multimedia. ACM, New York, pp 569–572

  25. Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22 (6):2181–2191

    MathSciNet  MATH  Google Scholar 

  26. Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inform Forens Secur 8(7):1091–1100

    Google Scholar 

  27. Li J, Yang F, Lu W, Sun W (2016) Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimed Tools Appl, 1–15

  28. Li J, Lu W, Weng J, Mao Y, Li G (2018) Double jpeg compression detection based on block statistics. Multimed Tools Appl 77(24):31,895–31,910

    Google Scholar 

  29. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76 (20):20,739–20,753

    Google Scholar 

  30. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process: Image Commun 58:146–156

    Google Scholar 

  31. Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10,033–10,050

    Google Scholar 

  32. Lin C, Lu W, Huang X, Liu K, Sun W, Lin H, Tan Z (2018) Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications

  33. Lin C, Lu W, Sun W, Zeng J, Xu T, Lai JH (2018) Region duplication detection based on image segmentation and keypoint contexts. Multimed Tools Appl 77(11):14,241–14,258

    Google Scholar 

  34. Lin C, Lu W, Huang X, Liu K, Sun W, Lin H (2019) Region duplication detection based on hybrid feature and evaluative clustering. Multimedia Tools and Applications

  35. Liu MCSW (2013) Information forensics an overview of the first decade. IEEE Access 1:167–200

    Google Scholar 

  36. Liu X, Lu W, Huang T, Liu H, Xue Y, Yeung Y (2018) Scaling factor estimation on jpeg compressed images by cyclostationarity analysis. Multimedia Tools and Applications

  37. Liu X, Lu W, Liu W, Luo S, Liang Y, Li M (2019) Image deblocking detection based on a convolutional neural network. IEEE Access 7:26,432–26,439

    Google Scholar 

  38. Liu X, Lu W, Zhang Q, Huang J, Shi Y (2019) Downscaling factor estimation on pre-jpeg compressed images. IEEE Trans Circ Syst Video Technol, 1–1

  39. Lu W, He L, Yeung Y, Xue Y, Liu H, Feng B (2018) Secure binary image steganography based on fused distortion measurement. IEEE Trans Circ Syst Video Technol, 1–1

  40. Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13,557–13, 583

    Google Scholar 

  41. Ma Y, Luo X, Li X, Bao Z, Zhang Y (2019) Selection of rich model steganalysis features based on decision rough set α -positive region reduction. IEEE Trans Circ Syst Video Technol 29(2): 336–350

    Google Scholar 

  42. Mahdian B, Saic S (2008) Blind authentication using periodic properties of interpolation. IEEE Trans Inform Forens Secur 3(3):529–538

    Google Scholar 

  43. Nataraj L, Sarkar A, Manjunath BS (2009) Adding gaussian noise to “denoise” jpeg for detecting image resizing. In: Proceedings of the 16th IEEE international conference on image processing, pp 1477–1480

  44. Ou B, Li X, Zhao Y, Ni R, Shi Y (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010–5021

    MathSciNet  MATH  Google Scholar 

  45. Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758–767

    MathSciNet  MATH  Google Scholar 

  46. Qian R, Li W, Yu N, Hao Z (2012) Image forensics with rotation-tolerant resampling detection. In: 2012 IEEE International conference on multimedia and expo workshops, pp 61–66

  47. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Trans Multimed 16(5):1486–1491

    Google Scholar 

  48. Vázquez-Padín D, Comesaña P (2012) Ml estimation of the resampling factor. In: 2012 IEEE International workshop on information forensics and security (WIFS), pp 205–210

  49. Vázquez-Padín D, Pérez-González F (2011) Prefilter design for forensic resampling estimation. In: Information forensics and security, vol 00, pp 1–6

  50. Vázquez-Padín D, Mosquera C, Pérez-González F (2010) Two-dimensional statistical test for the presence of almost cyclostationarity on images. In: 2010 IEEE International conference on image processing, pp 1745–1748

  51. Vázquez-Padín D, Comesaña P, Pérez-González F (2015) An svd approach to forensic image resampling detection. In: 2015 23rd European signal processing conference (EUSIPCO), pp 2067–2071

  52. Vázquez-Padín D, Pérez-González F, Comesaña-Alfaro P (2017) A random matrix approach to the forensic analysis of upscaled images. IEEE Trans Inform Forens Secur 12(9):2115–2130

    Google Scholar 

  53. Wang R, Lu W, Xiang S, Zhao X, Wang J (2017) Digital image splicing detection based on markov features in qdct and qwt domain. Int J Digital Crime Forens, 10

  54. Wei W, Wang S, Zhang X, Tang Z (2010) Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. IEEE Trans Inform Forens Secur 5(3):507–517

    Google Scholar 

  55. Wolberg G (1994) Digital Image warping, 1st edn. IEEE Computer Society Press, Los Alamitos

    Google Scholar 

  56. Wu H, Weng J, Chen X, Lu W (2018) Feedback weight convolutional neural network for gait recognition. J Vis Commun Image Represent 55:424–432

    Google Scholar 

  57. Xiao H, Lu W, Li R, Zhong N, Yeung Y, Chen J, Xue F, Sun W (2019) Defocus blur detection based on multiscale svd fusion in gradient domain. J Vis Commun Image Represent, 59

  58. Xu Z, Wei Z, Zhang Q, Yeung Y, Chen X (2019) Gait recognition based on capsule network. J Vis Commun Image Represent, 59

  59. Xue F, Ye Z, Lu W, Liu H, Li B (2017) Mse period based estimation of first quantization step in double compressed jpeg images. Signal Process Image Commun 57:76–83

    Google Scholar 

  60. Xue F, Lu W, Ye Z, Liu H (2018) Jpeg image tampering localization based on normalized gray level co-occurrence matrix. Multimedia Tools and Applications

  61. Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intel 59:73–83

    Google Scholar 

  62. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    MathSciNet  MATH  Google Scholar 

  63. Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458

    Google Scholar 

  64. Zhang Q, Wei Z, Wang R, Li G (2018) Digital image splicing detection based on markov features in block dwt domain. Multimed Tools Appl, 77

  65. Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111

    Google Scholar 

  66. Zhu N, Deng C, Gao X (2016) A learning-to-rank approach for image scaling factor estimation. Neurocomputing 204:33–40

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No. U1736118 and No. U1636202), the Key Areas R&D Program of Guangdong (No. 2019B010136002 and No. 2019B010139003), the Key Scientific Research Program of Guangzhou (No. 201804020068), the Natural Science Foundation of Guangdong (No. 2016A030313350), the Special Funds for Science and Technology Development of Guangdong (No. 2016KZ010103), Shenzhen R&D Program, the Open Fund of GuangDong Key Laboratory of Information Security Technology (No. 2017B030314131).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Lu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, X., Lu, W., Xue, Y. et al. Upscaling factor estimation on double JPEG compressed images. Multimed Tools Appl 79, 12891–12914 (2020). https://doi.org/10.1007/s11042-019-08519-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08519-8

Keywords