IEEE Transactions on Information Forensics and Security
A bibliography on blind methods for identifying image forgery
Image Communication
Reliable JPEG steganalysis based on multi-directional correlations
Image Communication
FLD-based detection of re-compressed speech signals
Proceedings of the 12th ACM workshop on Multimedia and security
JPEG error analysis and its applications to digital image forensics
IEEE Transactions on Information Forensics and Security
Forensic detection of image manipulation using statistical intrinsic fingerprints
IEEE Transactions on Information Forensics and Security
Estimating QP and motion vectors in H.264/AVC video from decoded pixels
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
A reversible data hiding scheme for JPEG images
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
Detecting double JPEG compression with the same quantization matrix
IEEE Transactions on Information Forensics and Security
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications
JPEG quantization tables forensics: a statistical approach
IWCF'10 Proceedings of the 4th international conference on Computational forensics
A method to detect JPEG-based double compression
ISNN'11 Proceedings of the 8th international conference on Advances in neural networks - Volume Part II
Countering counter-forensics: the case of JPEG compression
IH'11 Proceedings of the 13th international conference on Information hiding
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Identification of smartphone-image source and manipulation
IEA/AIE'12 Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
Countering universal image tampering detection with histogram restoration
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
This paper presents a method for the detection of double JPEG compression and a maximum-likelihood estimator of the primary quality factor. These methods are essential for construction of accurate targeted and blind steganalysis methods for JPEG images. The proposed methods use support vector machine classifiers with feature vectors formed by histograms of low-frequency discrete cosine transformation coefficients. The performance of the algorithms is compared to selected prior art.