Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis

The quick advance in image/video editing techniques has enabled people to synthesize realistic images/videos conveniently. Some legal issues may arise when a tampered image cannot be distinguished from a real one by visual examination. In this paper, we focus on JPEG images and propose detecting tam...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Pattern recognition Ročník 42; číslo 11; s. 2492 - 2501
Hlavní autori: Lin, Zhouchen, He, Junfeng, Tang, Xiaoou, Tang, Chi-Keung
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Kidlington Elsevier Ltd 01.11.2009
Elsevier
Predmet:
ISSN:0031-3203, 1873-5142
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The quick advance in image/video editing techniques has enabled people to synthesize realistic images/videos conveniently. Some legal issues may arise when a tampered image cannot be distinguished from a real one by visual examination. In this paper, we focus on JPEG images and propose detecting tampered images by examining the double quantization effect hidden among the discrete cosine transform (DCT) coefficients. To our knowledge, our approach is the only one to date that can automatically locate the tampered region, while it has several additional advantages: fine-grained detection at the scale of 8 × 8 DCT blocks, insensitivity to different kinds of forgery methods (such as alpha matting and inpainting, in addition to simple image cut/paste), the ability to work without fully decompressing the JPEG images, and the fast speed. Experimental results on JPEG images are promising.
AbstractList The quick advance in image/video editing techniques has enabled people to synthesize realistic images/videos conveniently. Some legal issues may arise when a tampered image cannot be distinguished from a real one by visual examination. In this paper, we focus on JPEG images and propose detecting tampered images by examining the double quantization effect hidden among the discrete cosine transform (DCT) coefficients. To our knowledge, our approach is the only one to date that can automatically locate the tampered region, while it has several additional advantages: fine-grained detection at the scale of 8 × 8 DCT blocks, insensitivity to different kinds of forgery methods (such as alpha matting and inpainting, in addition to simple image cut/paste), the ability to work without fully decompressing the JPEG images, and the fast speed. Experimental results on JPEG images are promising.
Author Lin, Zhouchen
Tang, Xiaoou
He, Junfeng
Tang, Chi-Keung
Author_xml – sequence: 1
  givenname: Zhouchen
  surname: Lin
  fullname: Lin, Zhouchen
  email: zhoulin@microsoft.com
  organization: Microsoft Research, Asia, Zhichun Road #49, Haidian District, Beijing 100190, PR China
– sequence: 2
  givenname: Junfeng
  surname: He
  fullname: He, Junfeng
  email: hejf@ust.hk
  organization: The Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong, PR China
– sequence: 3
  givenname: Xiaoou
  surname: Tang
  fullname: Tang, Xiaoou
  email: xitang@microsoft.com
  organization: Microsoft Research, Asia, Zhichun Road #49, Haidian District, Beijing 100190, PR China
– sequence: 4
  givenname: Chi-Keung
  surname: Tang
  fullname: Tang, Chi-Keung
  email: cktang@cse.ust.hk
  organization: The Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong, PR China
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=21719515$$DView record in Pascal Francis
BookMark eNqFkM1LAzEQxYNUsK3-Bx5y8eau-dh0ux4Eqd8U9FBPHsJ0kpSUdrcksdD_3pTqxYOeZmDee8z7DUiv7VpLyDlnJWd8dLUsN5CwW5SCsaZksmS8OSJ9Pq5loXgleqTPmOSFFEyekEGMS8Z4nQ998vEAMV1S-EzdGpJHCq2hzre2WATIw9AE640NeXl5u3-kfg0LS41NFpPvWrr1QO8mM4qddc6jt23KEbDaRR9PybGDVbRn33NI3h_uZ5OnYvr6-Dy5nRZYMZEKgwgKARWvbYW1FBbQjZ2Cxtm5q0Uzn485iFpKU5kKx8iNQaYEjhRDZWo5JBeH3A1EhJUL0KKPehPys2GnRa7aKK6y7vqgw9DFGKzT6BPsa6TcdaU503uceqkPOPUep2ZSZ5zZXP0y_-T_Y7s52GwGsPU26LiHhNb4kBFq0_m_A74AScOUjA
CODEN PTNRA8
CitedBy_id crossref_primary_10_1016_j_ejor_2023_10_003
crossref_primary_10_1007_s11042_023_15130_5
crossref_primary_10_1016_j_patrec_2017_01_006
crossref_primary_10_1007_s11042_010_0620_1
crossref_primary_10_1007_s11760_025_04320_3
crossref_primary_10_1007_s11042_022_12758_7
crossref_primary_10_1016_j_image_2018_04_011
crossref_primary_10_1007_s10044_024_01305_9
crossref_primary_10_1109_TIM_2023_3300434
crossref_primary_10_1007_s11042_020_10158_3
crossref_primary_10_1007_s11071_013_0915_7
crossref_primary_10_1016_j_fsidi_2020_300924
crossref_primary_10_1016_j_patcog_2016_12_010
crossref_primary_10_1016_j_patcog_2022_109026
crossref_primary_10_1109_TIP_2016_2518870
crossref_primary_10_1587_transinf_2024EDP7249
crossref_primary_10_1016_j_jvcir_2021_103417
crossref_primary_10_1016_j_patcog_2024_110658
crossref_primary_10_1016_j_jvcir_2020_102967
crossref_primary_10_3390_sym11091119
crossref_primary_10_1145_3408299
crossref_primary_10_1007_s11042_022_13312_1
crossref_primary_10_3390_sym11010083
crossref_primary_10_1186_1687_6180_2012_190
crossref_primary_10_1109_ACCESS_2018_2883588
crossref_primary_10_1007_s10851_015_0602_z
crossref_primary_10_1109_ACCESS_2025_3563784
crossref_primary_10_1109_TCSVT_2021_3123829
crossref_primary_10_1017_ATSIP_2012_2
crossref_primary_10_1007_s11042_016_3409_z
crossref_primary_10_1002_cpe_7293
crossref_primary_10_1016_j_patcog_2024_110828
crossref_primary_10_1016_j_procs_2015_06_081
crossref_primary_10_1145_3633203
crossref_primary_10_1186_s13640_018_0307_5
crossref_primary_10_3233_JIFS_232025
crossref_primary_10_1016_j_jksuci_2023_101559
crossref_primary_10_1007_s42979_023_02287_x
crossref_primary_10_1109_TIFS_2016_2636089
crossref_primary_10_1109_TIFS_2017_2656842
crossref_primary_10_1016_j_dsp_2016_07_011
crossref_primary_10_1007_s10044_017_0678_8
crossref_primary_10_1007_s12559_010_9045_4
crossref_primary_10_1016_j_diin_2013_04_007
crossref_primary_10_1016_j_knosys_2025_113525
crossref_primary_10_1016_j_neucom_2022_09_060
crossref_primary_10_1016_j_jvcir_2018_01_010
crossref_primary_10_1007_s11042_023_16534_z
crossref_primary_10_1016_j_image_2017_10_011
crossref_primary_10_1109_TCSS_2024_3415160
crossref_primary_10_1007_s11771_012_1350_5
crossref_primary_10_1088_1742_6596_1368_3_032028
crossref_primary_10_1007_s11042_019_08597_8
crossref_primary_10_1109_LSP_2023_3348689
crossref_primary_10_1109_TIFS_2010_2072921
crossref_primary_10_1002_sec_721
crossref_primary_10_1016_j_ins_2019_09_038
crossref_primary_10_3390_s24165103
crossref_primary_10_1007_s11042_014_1868_7
crossref_primary_10_1016_j_image_2023_117029
crossref_primary_10_1049_bme2_12025
crossref_primary_10_1109_ACCESS_2021_3051678
crossref_primary_10_1016_j_knosys_2025_114126
crossref_primary_10_4018_ijdcf_2013100102
crossref_primary_10_1016_j_asoc_2023_110730
crossref_primary_10_1109_TIFS_2012_2187516
crossref_primary_10_1016_j_ijleo_2020_164196
crossref_primary_10_1186_1687_6180_2014_101
crossref_primary_10_1016_j_jnlest_2025_100325
crossref_primary_10_1109_TIP_2019_2895466
crossref_primary_10_1145_3301274
crossref_primary_10_1016_j_fsidi_2022_301392
crossref_primary_10_1016_j_knosys_2025_114365
crossref_primary_10_1016_j_asoc_2021_107256
crossref_primary_10_1016_j_image_2020_116008
crossref_primary_10_1109_TCSVT_2023_3247607
crossref_primary_10_1016_j_forsciint_2015_10_024
crossref_primary_10_3390_app131910980
crossref_primary_10_1007_s11042_015_2449_0
crossref_primary_10_1109_TIFS_2014_2302078
crossref_primary_10_1016_j_imavis_2012_09_002
crossref_primary_10_1016_j_ins_2020_03_099
crossref_primary_10_1038_s41598_025_97555_6
crossref_primary_10_1080_00450618_2016_1153711
crossref_primary_10_1016_j_forsciint_2021_111040
crossref_primary_10_1016_j_image_2018_07_011
crossref_primary_10_1007_s11263_013_0688_y
crossref_primary_10_1007_s11554_019_00929_z
crossref_primary_10_1016_j_dsp_2015_01_006
crossref_primary_10_1007_s11042_018_5756_4
crossref_primary_10_1002_int_22939
crossref_primary_10_1016_j_image_2023_117045
crossref_primary_10_1007_s11042_021_11265_5
crossref_primary_10_1080_09747338_2014_921415
crossref_primary_10_4028_www_scientific_net_AMM_385_386_1466
crossref_primary_10_1016_j_patcog_2021_108347
crossref_primary_10_1016_j_ipm_2021_102610
crossref_primary_10_32604_jihpp_2022_039766
crossref_primary_10_1007_s11042_017_4691_0
crossref_primary_10_1016_j_image_2013_03_006
crossref_primary_10_1109_TIFS_2012_2202227
crossref_primary_10_1109_ACCESS_2022_3188299
crossref_primary_10_1016_j_jvcir_2018_05_011
crossref_primary_10_1109_LSP_2023_3245947
crossref_primary_10_1080_1369118X_2025_2492577
crossref_primary_10_1007_s12065_019_00243_4
crossref_primary_10_1109_TIFS_2021_3129654
crossref_primary_10_1155_2022_9291971
crossref_primary_10_1007_s11042_020_09623_w
crossref_primary_10_1016_j_patcog_2012_05_014
crossref_primary_10_1109_TCSVT_2019_2922309
crossref_primary_10_1016_j_dsp_2023_104005
crossref_primary_10_1002_asi_24359
crossref_primary_10_1109_TIFS_2014_2345479
crossref_primary_10_1109_ACCESS_2018_2880433
crossref_primary_10_1007_s00138_019_01048_2
crossref_primary_10_1016_j_sigpro_2019_107430
crossref_primary_10_1007_s11042_018_6225_9
crossref_primary_10_1080_09500340_2019_1660816
crossref_primary_10_1109_JSTSP_2020_3002101
crossref_primary_10_1016_j_jvcir_2017_09_003
crossref_primary_10_1016_j_forsciint_2020_110311
crossref_primary_10_1155_2013_496701
crossref_primary_10_1007_s42979_025_04263_z
crossref_primary_10_1016_j_eswa_2024_124975
crossref_primary_10_1016_j_image_2010_05_003
crossref_primary_10_1007_s11042_016_4290_5
crossref_primary_10_1007_s11042_018_6266_0
crossref_primary_10_1117_1_JEI_32_4_043015
crossref_primary_10_1109_ACCESS_2019_2959627
crossref_primary_10_1109_TPAMI_2022_3180556
crossref_primary_10_1007_s11263_022_01617_5
crossref_primary_10_1016_j_inffus_2020_06_014
crossref_primary_10_1049_iet_ipr_2019_1114
crossref_primary_10_1109_TIFS_2011_2170836
crossref_primary_10_1016_j_dsp_2022_103429
crossref_primary_10_1007_s11042_016_3964_3
crossref_primary_10_1007_s11042_017_4915_3
crossref_primary_10_1007_s11042_023_15942_5
crossref_primary_10_1016_j_ijleo_2012_08_018
crossref_primary_10_1186_s13640_018_0257_y
crossref_primary_10_1016_j_eswa_2025_129089
crossref_primary_10_1155_2015_653164
crossref_primary_10_1007_s13735_014_0051_2
crossref_primary_10_1109_TIFS_2014_2330312
crossref_primary_10_1109_ACCESS_2013_2260814
crossref_primary_10_1109_TCSVT_2021_3111195
crossref_primary_10_1007_s11042_018_6611_3
crossref_primary_10_51682_jiscom_v3i1_28
crossref_primary_10_1007_s11042_019_07817_5
crossref_primary_10_1109_ACCESS_2025_3577221
crossref_primary_10_1186_s13640_017_0196_z
crossref_primary_10_1111_1556_4029_15210
crossref_primary_10_1016_j_patcog_2018_03_028
crossref_primary_10_1016_j_image_2016_05_005
crossref_primary_10_1007_s11042_025_20626_3
crossref_primary_10_1007_s12559_022_10008_4
crossref_primary_10_1007_s11042_023_16131_0
crossref_primary_10_1109_TIFS_2014_2359368
crossref_primary_10_1109_TIFS_2019_2916364
crossref_primary_10_1109_ACCESS_2025_3545830
crossref_primary_10_1016_j_jvcir_2018_12_007
crossref_primary_10_1016_j_patcog_2024_110727
crossref_primary_10_26634_jip_6_1_15925
crossref_primary_10_1109_TIFS_2021_3070444
crossref_primary_10_1007_s00521_024_09511_6
crossref_primary_10_1016_j_dsp_2017_08_009
crossref_primary_10_1016_j_sigpro_2025_110123
crossref_primary_10_1051_matecconf_201927702026
crossref_primary_10_1109_TNNLS_2021_3130168
crossref_primary_10_3390_jimaging10010004
crossref_primary_10_1016_j_diin_2018_01_011
crossref_primary_10_1038_s41598_025_04203_0
crossref_primary_10_1007_s11042_020_10211_1
crossref_primary_10_1016_j_image_2012_07_006
crossref_primary_10_1109_ACCESS_2019_2934160
crossref_primary_10_1016_j_eswa_2017_05_044
crossref_primary_10_1109_TIFS_2013_2248727
crossref_primary_10_1145_3698770
crossref_primary_10_1007_s11042_016_3795_2
crossref_primary_10_1007_s00530_024_01583_7
crossref_primary_10_1109_ACCESS_2023_3264014
Cites_doi 10.1109/ICME.2007.4284574
10.1109/TSP.2004.839932
10.1145/566570.566572
10.1145/1015706.1015721
10.1145/1015706.1015719
10.1109/83.951529
10.1117/12.640109
10.1109/ICME.2006.262447
10.1109/ICME.2007.4284578
10.1145/882262.882264
10.1145/882262.882269
10.1145/1073170.1073171
10.1145/344779.344972
10.1145/1161366.1161376
10.1145/1073204.1073274
10.1109/TSP.2005.855406
ContentType Journal Article
Copyright 2009 Elsevier Ltd
2009 INIST-CNRS
Copyright_xml – notice: 2009 Elsevier Ltd
– notice: 2009 INIST-CNRS
DBID AAYXX
CITATION
IQODW
DOI 10.1016/j.patcog.2009.03.019
DatabaseName CrossRef
Pascal-Francis
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Applied Sciences
EISSN 1873-5142
EndPage 2501
ExternalDocumentID 21719515
10_1016_j_patcog_2009_03_019
S0031320309001198
GroupedDBID --K
--M
-D8
-DT
-~X
.DC
.~1
0R~
123
1B1
1RT
1~.
1~5
29O
4.4
457
4G.
53G
5VS
7-5
71M
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABEFU
ABFNM
ABFRF
ABHFT
ABJNI
ABMAC
ABTAH
ABXDB
ABYKQ
ACBEA
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADMXK
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F0J
F5P
FD6
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
H~9
IHE
J1W
JJJVA
KOM
KZ1
LG9
LMP
LY1
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
RNS
ROL
RPZ
SBC
SDF
SDG
SDP
SDS
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TN5
UNMZH
VOH
WUQ
XJE
XPP
ZMT
ZY4
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
AFXIZ
AGCQF
AGRNS
BNPGV
IQODW
SSH
ID FETCH-LOGICAL-c402t-dcca5cac517e4c732eacf8f5a9febf729bb81a2733d4d4c8c1ddc052c650c5d73
ISICitedReferencesCount 275
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000268453800014&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0031-3203
IngestDate Mon Jul 21 09:17:00 EDT 2025
Sat Nov 29 03:52:04 EST 2025
Tue Nov 18 22:33:20 EST 2025
Fri Feb 23 02:33:54 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 11
Keywords Tampered image detection
JPEG
Double quantization
Pattern analysis
DCT coefficient
Image processing
Video technique
Image compression
Realistic images
Image coding
Signal quantization
Signal processing
Image sensor
Discrete cosine transforms
Signal detection
JPE
Language English
License https://www.elsevier.com/tdm/userlicense/1.0
CC BY 4.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c402t-dcca5cac517e4c732eacf8f5a9febf729bb81a2733d4d4c8c1ddc052c650c5d73
PageCount 10
ParticipantIDs pascalfrancis_primary_21719515
crossref_citationtrail_10_1016_j_patcog_2009_03_019
crossref_primary_10_1016_j_patcog_2009_03_019
elsevier_sciencedirect_doi_10_1016_j_patcog_2009_03_019
PublicationCentury 2000
PublicationDate 2009-11-01
PublicationDateYYYYMMDD 2009-11-01
PublicationDate_xml – month: 11
  year: 2009
  text: 2009-11-01
  day: 01
PublicationDecade 2000
PublicationPlace Kidlington
PublicationPlace_xml – name: Kidlington
PublicationTitle Pattern recognition
PublicationYear 2009
Publisher Elsevier Ltd
Elsevier
Publisher_xml – name: Elsevier Ltd
– name: Elsevier
References Lin, Wang, Tang, Shum (bib25) 2005
V. Kwatra, et al., Graphcut textures: image and video synthesis using graph cuts, in: ACM Siggraph, 2003, pp. 277–286.
S. Ye, Q. Sun, E.-C. Chang, Detecting digital image forgeries by measuring inconsistencies of blocking artifact, Int’l Conf. Multimedia and Expo (ICME 2007), Beijing, China.
M. Johnson, H. Farid, Exposing digital forgeries by detecting inconsistencies in lighting, in: ACM Multimedia and Security Workshop, New York, NY, 2005.
Y.-Y. Chuang, et al., Video matting of complex scenes, in: ACM Siggraph, 2002, pp. 243–248.
Ng, Chang, Lin, Sun (bib10) 2006
C. Amsberry, Alterations of photos raise host of legal, ethical issues, The Wall Street Journal, January 26, 1989, Section B, p. 1.
A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004.
Popescu, Farid (bib13) 2004
Craver (bib9) 2001
T.-T. Ng, S.-F. Chang, Q. Sun, Blind detection of photomontage using higher order statistics, in: IEEE International Symposium on Circuits and Systems (ISCAS 2004), Vancouver, Canada, pp. 688–691.
P. Pérez, M. Gangnet, A. Blake, Poisson image editing, in: ACM Siggraph, 2003, pp. 313–318.
J. Lukas, J. Fridrich, M. Goljan, Detecting digital image forgeries using sensor pattern noise, SPIE Electronic Imaging, Photonics West, January 2006.
M. Bertalmio, G. Sapiro, V. Caselles, C. Ballester, Image inpainting, in: ACM Siggraph, 2000, pp. 417–424.
M.K. Johnson, H. Farid, Exposing digital forgeries through chromatic aberration, in: ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006.
Popescu, Farid (bib15) 2005; 52
Lukas, Fridrich (bib27) 2003
J. He, Z. Lin, L. Wang, X. Tang, Detecting doctored JPEG images via DCT coefficient analysis, in: Proceedings of the 9th European Conference on Computer Vision, Lecture Notes in Computer Sciences, vol. 3953, Springer, Berlin, 2006, pp. 423–435.
Farid (bib17) 2001; 10
S.-J. Lee, S.-H. Jung, A survey of watermarking techniques applied to multimedia, in: Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE2001), vol. 1, pp. 272–277.
J. Sun, L. Yuan, J. Jia, H.-Y. Shum, Image completion with structure propagation, in: ACM Siggraph, 2005, pp. 861–868.
Y.-F. Hsu, S.-F. Chang, Detecting image splicing using geometry invariants and camera characteristics consistency, in: International Conference on Multimedia and Expo (ICME 2006), Toronto, Canada.
Y.-F. Hsu, S.-F. Chang, Image splicing detection using camera response function consistency and automatic segmentation, in: International Conference on Multimedia and Expo (ICME 2007), Beijing, China.
Tekalp (bib28) 1995
T.V. Lanh, K.-S. Chong, S. Emmanuel, M. Kankanhalli, A survey on image forensic methods, in: International Conference on Multimedia and Expo (ICME 2007), Beijing, China.
J. Sun, et al., Poisson matting, in: ACM Siggraph, 2004, pp. 315–321.
Popescu, Farid (bib14) 2005; 53
Y. Li, et al., Lazy snapping, in: ACM Siggraph, 2004, pp. 303–308.
Popescu (10.1016/j.patcog.2009.03.019_bib13) 2004
10.1016/j.patcog.2009.03.019_bib19
10.1016/j.patcog.2009.03.019_bib18
Tekalp (10.1016/j.patcog.2009.03.019_bib28) 1995
Lin (10.1016/j.patcog.2009.03.019_bib25) 2005
10.1016/j.patcog.2009.03.019_bib26
10.1016/j.patcog.2009.03.019_bib24
Popescu (10.1016/j.patcog.2009.03.019_bib14) 2005; 53
10.1016/j.patcog.2009.03.019_bib22
10.1016/j.patcog.2009.03.019_bib23
10.1016/j.patcog.2009.03.019_bib20
10.1016/j.patcog.2009.03.019_bib21
Ng (10.1016/j.patcog.2009.03.019_bib10) 2006
Popescu (10.1016/j.patcog.2009.03.019_bib15) 2005; 52
Lukas (10.1016/j.patcog.2009.03.019_bib27) 2003
Craver (10.1016/j.patcog.2009.03.019_bib9) 2001
10.1016/j.patcog.2009.03.019_bib7
10.1016/j.patcog.2009.03.019_bib6
10.1016/j.patcog.2009.03.019_bib8
10.1016/j.patcog.2009.03.019_bib3
10.1016/j.patcog.2009.03.019_bib2
10.1016/j.patcog.2009.03.019_bib5
Farid (10.1016/j.patcog.2009.03.019_bib17) 2001; 10
10.1016/j.patcog.2009.03.019_bib4
10.1016/j.patcog.2009.03.019_bib16
10.1016/j.patcog.2009.03.019_bib1
10.1016/j.patcog.2009.03.019_bib11
10.1016/j.patcog.2009.03.019_bib12
References_xml – reference: V. Kwatra, et al., Graphcut textures: image and video synthesis using graph cuts, in: ACM Siggraph, 2003, pp. 277–286.
– year: 2001
  ident: bib9
  article-title: Reading between the lines: lessons from the SDMI challenge
  publication-title: Proceedings of the 10th USENIX Security Symposium
– reference: T.V. Lanh, K.-S. Chong, S. Emmanuel, M. Kankanhalli, A survey on image forensic methods, in: International Conference on Multimedia and Expo (ICME 2007), Beijing, China.
– reference: J. Sun, L. Yuan, J. Jia, H.-Y. Shum, Image completion with structure propagation, in: ACM Siggraph, 2005, pp. 861–868.
– reference: M. Johnson, H. Farid, Exposing digital forgeries by detecting inconsistencies in lighting, in: ACM Multimedia and Security Workshop, New York, NY, 2005.
– year: 2003
  ident: bib27
  article-title: Estimation of primary quantization matrix in double compressed JPEG images
  publication-title: Proceedings of the Digital Forensic Research Workshop
– reference: M.K. Johnson, H. Farid, Exposing digital forgeries through chromatic aberration, in: ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006.
– year: 1995
  ident: bib28
  article-title: Digital Video Processing
– reference: A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004.
– reference: J. Sun, et al., Poisson matting, in: ACM Siggraph, 2004, pp. 315–321.
– reference: S.-J. Lee, S.-H. Jung, A survey of watermarking techniques applied to multimedia, in: Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE2001), vol. 1, pp. 272–277.
– reference: T.-T. Ng, S.-F. Chang, Q. Sun, Blind detection of photomontage using higher order statistics, in: IEEE International Symposium on Circuits and Systems (ISCAS 2004), Vancouver, Canada, pp. 688–691.
– start-page: 1087
  year: 2005
  end-page: 1092
  ident: bib25
  article-title: Detecting doctored images using camera response normality and consistency
  publication-title: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition
– reference: Y.-Y. Chuang, et al., Video matting of complex scenes, in: ACM Siggraph, 2002, pp. 243–248.
– year: 2004
  ident: bib13
  article-title: Statistical tools for digital forensics
  publication-title: Proceedings of the 6th International Workshop on Information Hiding, Toronto, Canada
– volume: 53
  start-page: 3948
  year: 2005
  end-page: 3959
  ident: bib14
  article-title: Exposing digital forgeries in color filter array interpolated images
  publication-title: IEEE Transactions on Signal Processing
– reference: C. Amsberry, Alterations of photos raise host of legal, ethical issues, The Wall Street Journal, January 26, 1989, Section B, p. 1.
– reference: Y.-F. Hsu, S.-F. Chang, Image splicing detection using camera response function consistency and automatic segmentation, in: International Conference on Multimedia and Expo (ICME 2007), Beijing, China.
– reference: J. He, Z. Lin, L. Wang, X. Tang, Detecting doctored JPEG images via DCT coefficient analysis, in: Proceedings of the 9th European Conference on Computer Vision, Lecture Notes in Computer Sciences, vol. 3953, Springer, Berlin, 2006, pp. 423–435.
– reference: J. Lukas, J. Fridrich, M. Goljan, Detecting digital image forgeries using sensor pattern noise, SPIE Electronic Imaging, Photonics West, January 2006.
– reference: P. Pérez, M. Gangnet, A. Blake, Poisson image editing, in: ACM Siggraph, 2003, pp. 313–318.
– volume: 52
  start-page: 758
  year: 2005
  end-page: 767
  ident: bib15
  article-title: Exposing digital forgeries by detecting traces of re-sampling
  publication-title: IEEE Transactions on Signal Processing
– reference: Y. Li, et al., Lazy snapping, in: ACM Siggraph, 2004, pp. 303–308.
– volume: 10
  start-page: 1428
  year: 2001
  end-page: 1433
  ident: bib17
  article-title: Blind inverse gamma correction
  publication-title: IEEE Transactions on Image Processing
– reference: Y.-F. Hsu, S.-F. Chang, Detecting image splicing using geometry invariants and camera characteristics consistency, in: International Conference on Multimedia and Expo (ICME 2006), Toronto, Canada.
– reference: M. Bertalmio, G. Sapiro, V. Caselles, C. Ballester, Image inpainting, in: ACM Siggraph, 2000, pp. 417–424.
– year: 2006
  ident: bib10
  article-title: Passive-blind image forensics
  publication-title: Multimedia Security Technologies for Digital Rights
– reference: S. Ye, Q. Sun, E.-C. Chang, Detecting digital image forgeries by measuring inconsistencies of blocking artifact, Int’l Conf. Multimedia and Expo (ICME 2007), Beijing, China.
– ident: 10.1016/j.patcog.2009.03.019_bib23
  doi: 10.1109/ICME.2007.4284574
– volume: 52
  start-page: 758
  issue: 2
  year: 2005
  ident: 10.1016/j.patcog.2009.03.019_bib15
  article-title: Exposing digital forgeries by detecting traces of re-sampling
  publication-title: IEEE Transactions on Signal Processing
  doi: 10.1109/TSP.2004.839932
– ident: 10.1016/j.patcog.2009.03.019_bib3
  doi: 10.1145/566570.566572
– ident: 10.1016/j.patcog.2009.03.019_bib8
– ident: 10.1016/j.patcog.2009.03.019_bib20
– ident: 10.1016/j.patcog.2009.03.019_bib5
  doi: 10.1145/1015706.1015721
– ident: 10.1016/j.patcog.2009.03.019_bib7
  doi: 10.1145/1015706.1015719
– year: 2003
  ident: 10.1016/j.patcog.2009.03.019_bib27
  article-title: Estimation of primary quantization matrix in double compressed JPEG images
– year: 2004
  ident: 10.1016/j.patcog.2009.03.019_bib13
  article-title: Statistical tools for digital forensics
– ident: 10.1016/j.patcog.2009.03.019_bib18
– year: 2006
  ident: 10.1016/j.patcog.2009.03.019_bib10
  article-title: Passive-blind image forensics
– volume: 10
  start-page: 1428
  issue: 10
  year: 2001
  ident: 10.1016/j.patcog.2009.03.019_bib17
  article-title: Blind inverse gamma correction
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/83.951529
– ident: 10.1016/j.patcog.2009.03.019_bib16
  doi: 10.1117/12.640109
– ident: 10.1016/j.patcog.2009.03.019_bib21
  doi: 10.1109/ICME.2006.262447
– ident: 10.1016/j.patcog.2009.03.019_bib11
– ident: 10.1016/j.patcog.2009.03.019_bib22
  doi: 10.1109/ICME.2007.4284578
– ident: 10.1016/j.patcog.2009.03.019_bib2
  doi: 10.1145/882262.882264
– start-page: 1087
  year: 2005
  ident: 10.1016/j.patcog.2009.03.019_bib25
  article-title: Detecting doctored images using camera response normality and consistency
– ident: 10.1016/j.patcog.2009.03.019_bib26
– ident: 10.1016/j.patcog.2009.03.019_bib4
  doi: 10.1145/882262.882269
– year: 2001
  ident: 10.1016/j.patcog.2009.03.019_bib9
  article-title: Reading between the lines: lessons from the SDMI challenge
– ident: 10.1016/j.patcog.2009.03.019_bib24
– ident: 10.1016/j.patcog.2009.03.019_bib12
  doi: 10.1145/1073170.1073171
– year: 1995
  ident: 10.1016/j.patcog.2009.03.019_bib28
– ident: 10.1016/j.patcog.2009.03.019_bib1
  doi: 10.1145/344779.344972
– ident: 10.1016/j.patcog.2009.03.019_bib19
  doi: 10.1145/1161366.1161376
– ident: 10.1016/j.patcog.2009.03.019_bib6
  doi: 10.1145/1073204.1073274
– volume: 53
  start-page: 3948
  issue: 10
  year: 2005
  ident: 10.1016/j.patcog.2009.03.019_bib14
  article-title: Exposing digital forgeries in color filter array interpolated images
  publication-title: IEEE Transactions on Signal Processing
  doi: 10.1109/TSP.2005.855406
SSID ssj0017142
Score 2.4862773
Snippet The quick advance in image/video editing techniques has enabled people to synthesize realistic images/videos conveniently. Some legal issues may arise when a...
SourceID pascalfrancis
crossref
elsevier
SourceType Index Database
Enrichment Source
Publisher
StartPage 2492
SubjectTerms Applied sciences
DCT coefficient
Detection, estimation, filtering, equalization, prediction
Double quantization
Exact sciences and technology
Image processing
Information, signal and communications theory
JPEG
Pattern analysis
Pattern recognition
Sampling, quantization
Signal and communications theory
Signal processing
Signal, noise
Tampered image detection
Telecommunications and information theory
Title Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
URI https://dx.doi.org/10.1016/j.patcog.2009.03.019
Volume 42
WOSCitedRecordID wos000268453800014&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1873-5142
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0017142
  issn: 0031-3203
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj5swELbS3R4qVX2vun2sfOgtZYWxCXCMUrLZVCI5JFLUHpAxZpXVlkQbEu0P6A_vGNuE7UNpD71YyIIgMp9nvrHngdAHAInLe1HkEC6FwySnDue-Cvan0g0jAUNYN5sIkiRcLKJpp_Pd5sLsboKyDO_uovV_FTXMgbBV6uw_iLv5UZiAaxA6jCB2GP9K8EOu0zj4tlrt67EWwCadK9UPAhhmxYEsq8Dz8TS-6C6_qbidXFZStw3fLXn302CmyobU9SV0FLquXdLmstO6NKdKhzExSPsT_S-jyXwwihPQjc1Rz3ieDOPkoruvcLC47E8m8-6snzQNvtS1jgJYOp_l1phVuysRmfS8ZqvM2PW26qXEAWDQtuplXhtipK1ImW6RZ4wyEDXyW4Wv9x6uz9dguFZXpv4oPXeNHr5XX_snu9dEI4JXRoBo-g_QsRf4EejG4_5lvBg3p1EBYbrqvPkEm4JZxwn--uY_UZzHa76BhVfojiktGjN7hp4Y_wP3NW6eo44sX6CnxhfBRtNvYMq2-7BzL9FXhayPuMEVBlzhNq6wxRVWuMI1rnCDKwy4woAr3MIVtrh6hebDeDYYOaY3hyOY61VODivfF1z4JJBMBNQDA16Ehc-jQmYFeGxZFhIO3JjmLGciFCTPhet7AjwC4ecBPUFH5aqUrxHmOaOcA81lvYwVRIQs8yRzJctERjjvnSJq_85UmML1qn_KTWojFK9TLQTVUzVKXZqCEE6R0zy11oVbDtwfWEmlhnxqUpkC1A48eXZPsM3rLK7eHLrhLXq0X0Pv0FF1u5Xv0UOxq5ab2zODxh-hoK4r
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fast%2C+automatic+and+fine-grained+tampered+JPEG+image+detection+via+DCT+coefficient+analysis&rft.jtitle=Pattern+recognition&rft.au=ZHOUCHEN+LIN&rft.au=JUNFENG+HE&rft.au=XIAOOU+TANG&rft.au=TANG%2C+Chi-Keung&rft.date=2009-11-01&rft.pub=Elsevier&rft.issn=0031-3203&rft.volume=42&rft.issue=11&rft.spage=2492&rft.epage=2501&rft_id=info:doi/10.1016%2Fj.patcog.2009.03.019&rft.externalDBID=n%2Fa&rft.externalDocID=21719515
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0031-3203&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0031-3203&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0031-3203&client=summon