Unlock instant, AI-driven research and patent intelligence for your innovation.

A detection method for jpeg image quantization table tampering

A detection method and quantization table technology, which is applied in the detection field of JPEG image quantization table tampering, can solve problems such as unsatisfactory detection results and achieve high accuracy

Active Publication Date: 2017-10-20
深圳国信安信息技术有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In terms of passive image authentication, although the originality of a JPEG image can be judged theoretically by detecting whether the JPEG image has undergone two JPEG compressions, due to the quantization table of the JPEG image generated by the current camera, mobile phone and other shooting devices and the commonly used quantization of software such as Photoshop, etc. Tables are similar, so the detection results of two JPEG compressions are usually not ideal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A detection method for jpeg image quantization table tampering
  • A detection method for jpeg image quantization table tampering
  • A detection method for jpeg image quantization table tampering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The accompanying drawings are for illustrative purposes only and cannot be construed as limiting the patent;

[0033] For those skilled in the art, it is understandable that some well-known structures and descriptions thereof may be omitted in the drawings.

[0034] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0035] (2) The construction of the picture with tampered quantization table: firstly, the original JPEG is processed with the commonly used compression parameters of the software Photoshop (the quality factors are 11, 12) and the common compression parameters of ACDsee (the quantization factors are 96, 97, 98 and 99). JPEG re-compression, and then replace the quantization table of the compressed JPEG picture with the corresponding quantization table of the original picture. The case where the compressed JPEG quantization table is consistent with the original JPEG ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting tampering of quantization tables of JPEG pictures, which comprises the following steps: selecting several JPEG pictures as original JPEG pictures, tampering the quantization tables of the original JPEG pictures, and obtaining the JPEG pictures after the quantization tables have been tampered with; and quantization table tampered JPEG picture feature extraction; according to the feature extracted from the original JPEG picture and quantization table tampered JPEG picture, the classifier is trained to obtain a classifier model; extract the features of the picture to be tested, according to the classifier model Determine whether the quantization table of the image to be tested has been tampered with. The invention can be used as a technology for identifying JPEG pictures of tampered quantization tables, provides an effective automatic means for detecting malicious image tampering, and has broad application prospects in judicial and criminal investigation and evidence collection.

Description

technical field [0001] The invention belongs to the field of multimedia information security and evidence collection, and in particular relates to a method for detecting tampering of a JPEG picture quantization table. Background technique [0002] With the popularization of various powerful professional image editing software such as Photoshop and ACDsee, tampering with images has become easier and easier. Even ordinary users can tamper with visually enough fake pictures. However, after the original JPEG image has been tampered with by Photoshop, ACDsee, etc., it will inevitably introduce its own quantization table when it is saved as JPEG again, because the quantization table of the software is mostly different from the quantization table of the JPEG image taken by the camera and mobile phone, which leads to The quantization tables of JPEG pictures before and after tampering are inconsistent. If the quantization table is not replaced back to the quantization table before t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/66
Inventor 陈超李浩东黄继武
Owner 深圳国信安信息技术有限公司