Using JPEG quantization tables to identify imagery processed by software

  • Authors:
  • Jesse D. Kornblum

  • Affiliations:
  • Defense Cyber Crime Institute, United States

  • Venue:
  • Digital Investigation: The International Journal of Digital Forensics & Incident Response
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The quantization tables used for JPEG compression can also be used to help separate images that have been processed by software from those that have not. This loose classification is sufficient to greatly reduce the number of images an examiner must consider during an investigation. As illicit imagery prosecutions depend on the authenticity of the images involved, this capability is an advantage for forensic examiners. This paper explains how quantization tables work, how they can be used for image source identification, and the implications for computer forensics.