This paper proposes a new method for estimation of JPEG (joint photographic experts group) quality factor for images once compressed but saved in the bmp or tiff format. By calculating a gray histogram of the test image, the gray value was set at the maximum of the gray histogram occurs. The test image is split into 8×8 blocks, and a position histogram of the specified gray value g in each 8×8 block is obtained. The position histograms of all blocks are combined to produce a position histogram of the entire image, from which the quality factor of the test image is estimated. Experiments show that the method has a high correct rate. In addition, derivative characteristics of similarity curves of images having undergone single JPEG compression with high quality are analyzed at some high quality factors, and an improved version of a previous method is proposed, and verified in experiments.
ZHANG Jun-hua, L¨U Dong-hui
. Quality Factor Estimation for Single JPEG Compression Based on Position Histogram[J]. Journal of Shanghai University, 2013
, 19(2)
: 120
-125
.
DOI: 10.3969/j.issn.1007-2861.2013.02.003
[1] 李晟, 张新鹏. 利用JPEG 压缩特性的合成图像检测[J]. 应用科学学报, 2008, 26(3): 281-287.
[2] 李晟. 基于JPEG 特性与小波域共生矩阵特征的被动图像取证[D]. 上海: 上海大学, 2008.
[3] Kee E, Johnson M K, Farid H. Digital image authentication from JPEG headers [J]. IEEE Trans Inf Forensics Security, 2011, 6(3): 1066-1075.
[4] 扈文斌, 刘凯. 基于量化表不一致性的JPEG 图像篡改盲检测[J]. 中国图象图形学报, 2011, 16(3): 316-323.
[5] Chen Y L, Hsu C T. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection [J]. IEEE Trans Inf Forensics Security, 2011, 6(2): 396-406.
[6] Huang F J, Huang J W, Shi Y Q. Detecting double JPEG compression with the same quantization matrix [J]. IEEE Trans Inf Forensics Security, 2010, 5(4): 848-856.
[7] Farid H. Exposing digital forgeries from JPEG ghosts [J]. IEEE Trans Inf Forensics Security, 2009, 4(1): 154-160.
[8] Luo W Q, Huang J W, Qiu G P. JPEG error analysis and its application to digital image forensics [J]. IEEE Trans Inf Forensics Security, 2010, 5(3): 480-491.
[9] Fu D, Shi Y Q, Su Q. A generalized Benford’s law for JPEG coefficients and its applications in image forensics [C]// SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents Ⅸ. 2007: 1L1-1L11.
[10] Ye S M, Sun Q B, Chang E C. Detecting digital image forgeries by measuring inconsistencies of blocking artifact [C]// 2007 IEEE International Conference on Multimedia and Expo. 2007: 12-15.
[11] 孙文颗, 张新鹏, 王朔中. 基于直方图差异的模型隐写分析[J]. 上海大学学报: 自然科学版, 2008, 14(2): 111-115.
[12] 唐跃林, 肖沙里, 姚富光, 等. 一种反映人眼视觉特性的JPEG 压缩编码[J]. 微型机与应用, 2004(2): 49-50.
[13] Wang C Y, Lee S M, Chang L W. Designing JPEG quantization tables based on human visual system [J]. Signal Process: Image Comm, 2001, 16: 501-506.