Based on Digital Image Forensics Double JPEG Compression Algorithm

Article Preview

Abstract:

Means of digital image tampering diverse, new technical approach increasingly renovation, therefore, the detection of forged digital tampering issues are complex, and must not universal, once and for all solutions. In this paper, digital image tampering common practices through research, proposed a re-deposit operations for double JPEG image processing software compression testing technology method using image compression and decompression process lossy compression of images tamper with forensic, this method can play an effective role in the detection.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1044-1045)

Pages:

1098-1101

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] PoPeseuA.C. andFaridH.: ExPosing Digital Forgeries by Detecting Traees of ResamPling, IEEE Transaetions on Signal Proeessing, vol. 53(2), PP. 758一767, (2005).

DOI: 10.1109/tsp.2004.839932

Google Scholar

[2] A. stfeld andA. Pfitzmarm. Attacks on Steganographic Systems. IHW99, Dresden, Germany, (1999).

Google Scholar

[3] J. Fridrieh. Feature-Based Steganalysis for JPEG Images and its Implieations for FutureDesign of Steganographic Schemes, Proc. 6th Information Hiding Workshop, Toronto, Canada, May23-25, (2004).

Google Scholar

[4] J. Fridrieh,M. Goljan and D. Hogea. Attaeking the OutGuess. Proc. of the ACM Workshop on Multimedia and Seeurity 2002, Juan-les-Pins, Franee, Deeember 6, (2002).

Google Scholar