Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
The quick advance in image/video editing techniques has enabled people to synthesize realistic images/videos conveniently. Some legal issues may arise when a tampered image cannot be distinguished from a real one by visual examination. In this paper, we focus on JPEG images and propose detecting tam...
Saved in:
| Published in: | Pattern recognition Vol. 42; no. 11; pp. 2492 - 2501 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Kidlington
Elsevier Ltd
01.11.2009
Elsevier |
| Subjects: | |
| ISSN: | 0031-3203, 1873-5142 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The quick advance in image/video editing techniques has enabled people to synthesize realistic images/videos conveniently. Some legal issues may arise when a tampered image cannot be distinguished from a real one by visual examination. In this paper, we focus on JPEG images and propose detecting tampered images by examining the double quantization effect hidden among the discrete cosine transform (DCT) coefficients. To our knowledge, our approach is the only one to date that can automatically locate the tampered region, while it has several additional advantages: fine-grained detection at the scale of
8
×
8
DCT blocks, insensitivity to different kinds of forgery methods (such as alpha matting and inpainting, in addition to simple image cut/paste), the ability to work without fully decompressing the JPEG images, and the fast speed. Experimental results on JPEG images are promising. |
|---|---|
| AbstractList | The quick advance in image/video editing techniques has enabled people to synthesize realistic images/videos conveniently. Some legal issues may arise when a tampered image cannot be distinguished from a real one by visual examination. In this paper, we focus on JPEG images and propose detecting tampered images by examining the double quantization effect hidden among the discrete cosine transform (DCT) coefficients. To our knowledge, our approach is the only one to date that can automatically locate the tampered region, while it has several additional advantages: fine-grained detection at the scale of
8
×
8
DCT blocks, insensitivity to different kinds of forgery methods (such as alpha matting and inpainting, in addition to simple image cut/paste), the ability to work without fully decompressing the JPEG images, and the fast speed. Experimental results on JPEG images are promising. |
| Author | Lin, Zhouchen Tang, Xiaoou He, Junfeng Tang, Chi-Keung |
| Author_xml | – sequence: 1 givenname: Zhouchen surname: Lin fullname: Lin, Zhouchen email: zhoulin@microsoft.com organization: Microsoft Research, Asia, Zhichun Road #49, Haidian District, Beijing 100190, PR China – sequence: 2 givenname: Junfeng surname: He fullname: He, Junfeng email: hejf@ust.hk organization: The Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong, PR China – sequence: 3 givenname: Xiaoou surname: Tang fullname: Tang, Xiaoou email: xitang@microsoft.com organization: Microsoft Research, Asia, Zhichun Road #49, Haidian District, Beijing 100190, PR China – sequence: 4 givenname: Chi-Keung surname: Tang fullname: Tang, Chi-Keung email: cktang@cse.ust.hk organization: The Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong, PR China |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=21719515$$DView record in Pascal Francis |
| BookMark | eNqFkM1LAzEQxYNUsK3-Bx5y8eau-dh0ux4Eqd8U9FBPHsJ0kpSUdrcksdD_3pTqxYOeZmDee8z7DUiv7VpLyDlnJWd8dLUsN5CwW5SCsaZksmS8OSJ9Pq5loXgleqTPmOSFFEyekEGMS8Z4nQ998vEAMV1S-EzdGpJHCq2hzre2WATIw9AE640NeXl5u3-kfg0LS41NFpPvWrr1QO8mM4qddc6jt23KEbDaRR9PybGDVbRn33NI3h_uZ5OnYvr6-Dy5nRZYMZEKgwgKARWvbYW1FBbQjZ2Cxtm5q0Uzn485iFpKU5kKx8iNQaYEjhRDZWo5JBeH3A1EhJUL0KKPehPys2GnRa7aKK6y7vqgw9DFGKzT6BPsa6TcdaU503uceqkPOPUep2ZSZ5zZXP0y_-T_Y7s52GwGsPU26LiHhNb4kBFq0_m_A74AScOUjA |
| CODEN | PTNRA8 |
| CitedBy_id | crossref_primary_10_1016_j_ejor_2023_10_003 crossref_primary_10_1007_s11042_023_15130_5 crossref_primary_10_1016_j_patrec_2017_01_006 crossref_primary_10_1007_s11042_010_0620_1 crossref_primary_10_1007_s11760_025_04320_3 crossref_primary_10_1007_s11042_022_12758_7 crossref_primary_10_1016_j_image_2018_04_011 crossref_primary_10_1007_s10044_024_01305_9 crossref_primary_10_1109_TIM_2023_3300434 crossref_primary_10_1007_s11042_020_10158_3 crossref_primary_10_1007_s11071_013_0915_7 crossref_primary_10_1016_j_fsidi_2020_300924 crossref_primary_10_1016_j_patcog_2016_12_010 crossref_primary_10_1016_j_patcog_2022_109026 crossref_primary_10_1109_TIP_2016_2518870 crossref_primary_10_1587_transinf_2024EDP7249 crossref_primary_10_1016_j_jvcir_2021_103417 crossref_primary_10_1016_j_patcog_2024_110658 crossref_primary_10_1016_j_jvcir_2020_102967 crossref_primary_10_3390_sym11091119 crossref_primary_10_1145_3408299 crossref_primary_10_1007_s11042_022_13312_1 crossref_primary_10_3390_sym11010083 crossref_primary_10_1186_1687_6180_2012_190 crossref_primary_10_1109_ACCESS_2018_2883588 crossref_primary_10_1007_s10851_015_0602_z crossref_primary_10_1109_ACCESS_2025_3563784 crossref_primary_10_1109_TCSVT_2021_3123829 crossref_primary_10_1017_ATSIP_2012_2 crossref_primary_10_1007_s11042_016_3409_z crossref_primary_10_1002_cpe_7293 crossref_primary_10_1016_j_patcog_2024_110828 crossref_primary_10_1016_j_procs_2015_06_081 crossref_primary_10_1145_3633203 crossref_primary_10_1186_s13640_018_0307_5 crossref_primary_10_3233_JIFS_232025 crossref_primary_10_1016_j_jksuci_2023_101559 crossref_primary_10_1007_s42979_023_02287_x crossref_primary_10_1109_TIFS_2016_2636089 crossref_primary_10_1109_TIFS_2017_2656842 crossref_primary_10_1016_j_dsp_2016_07_011 crossref_primary_10_1007_s10044_017_0678_8 crossref_primary_10_1007_s12559_010_9045_4 crossref_primary_10_1016_j_diin_2013_04_007 crossref_primary_10_1016_j_knosys_2025_113525 crossref_primary_10_1016_j_neucom_2022_09_060 crossref_primary_10_1016_j_jvcir_2018_01_010 crossref_primary_10_1007_s11042_023_16534_z crossref_primary_10_1016_j_image_2017_10_011 crossref_primary_10_1109_TCSS_2024_3415160 crossref_primary_10_1007_s11771_012_1350_5 crossref_primary_10_1088_1742_6596_1368_3_032028 crossref_primary_10_1007_s11042_019_08597_8 crossref_primary_10_1109_LSP_2023_3348689 crossref_primary_10_1109_TIFS_2010_2072921 crossref_primary_10_1002_sec_721 crossref_primary_10_1016_j_ins_2019_09_038 crossref_primary_10_3390_s24165103 crossref_primary_10_1007_s11042_014_1868_7 crossref_primary_10_1016_j_image_2023_117029 crossref_primary_10_1049_bme2_12025 crossref_primary_10_1109_ACCESS_2021_3051678 crossref_primary_10_1016_j_knosys_2025_114126 crossref_primary_10_4018_ijdcf_2013100102 crossref_primary_10_1016_j_asoc_2023_110730 crossref_primary_10_1109_TIFS_2012_2187516 crossref_primary_10_1016_j_ijleo_2020_164196 crossref_primary_10_1186_1687_6180_2014_101 crossref_primary_10_1016_j_jnlest_2025_100325 crossref_primary_10_1109_TIP_2019_2895466 crossref_primary_10_1145_3301274 crossref_primary_10_1016_j_fsidi_2022_301392 crossref_primary_10_1016_j_knosys_2025_114365 crossref_primary_10_1016_j_asoc_2021_107256 crossref_primary_10_1016_j_image_2020_116008 crossref_primary_10_1109_TCSVT_2023_3247607 crossref_primary_10_1016_j_forsciint_2015_10_024 crossref_primary_10_3390_app131910980 crossref_primary_10_1007_s11042_015_2449_0 crossref_primary_10_1109_TIFS_2014_2302078 crossref_primary_10_1016_j_imavis_2012_09_002 crossref_primary_10_1016_j_ins_2020_03_099 crossref_primary_10_1038_s41598_025_97555_6 crossref_primary_10_1080_00450618_2016_1153711 crossref_primary_10_1016_j_forsciint_2021_111040 crossref_primary_10_1016_j_image_2018_07_011 crossref_primary_10_1007_s11263_013_0688_y crossref_primary_10_1007_s11554_019_00929_z crossref_primary_10_1016_j_dsp_2015_01_006 crossref_primary_10_1007_s11042_018_5756_4 crossref_primary_10_1002_int_22939 crossref_primary_10_1016_j_image_2023_117045 crossref_primary_10_1007_s11042_021_11265_5 crossref_primary_10_1080_09747338_2014_921415 crossref_primary_10_4028_www_scientific_net_AMM_385_386_1466 crossref_primary_10_1016_j_patcog_2021_108347 crossref_primary_10_1016_j_ipm_2021_102610 crossref_primary_10_32604_jihpp_2022_039766 crossref_primary_10_1007_s11042_017_4691_0 crossref_primary_10_1016_j_image_2013_03_006 crossref_primary_10_1109_TIFS_2012_2202227 crossref_primary_10_1109_ACCESS_2022_3188299 crossref_primary_10_1016_j_jvcir_2018_05_011 crossref_primary_10_1109_LSP_2023_3245947 crossref_primary_10_1080_1369118X_2025_2492577 crossref_primary_10_1007_s12065_019_00243_4 crossref_primary_10_1109_TIFS_2021_3129654 crossref_primary_10_1155_2022_9291971 crossref_primary_10_1007_s11042_020_09623_w crossref_primary_10_1016_j_patcog_2012_05_014 crossref_primary_10_1109_TCSVT_2019_2922309 crossref_primary_10_1016_j_dsp_2023_104005 crossref_primary_10_1002_asi_24359 crossref_primary_10_1109_TIFS_2014_2345479 crossref_primary_10_1109_ACCESS_2018_2880433 crossref_primary_10_1007_s00138_019_01048_2 crossref_primary_10_1016_j_sigpro_2019_107430 crossref_primary_10_1007_s11042_018_6225_9 crossref_primary_10_1080_09500340_2019_1660816 crossref_primary_10_1109_JSTSP_2020_3002101 crossref_primary_10_1016_j_jvcir_2017_09_003 crossref_primary_10_1016_j_forsciint_2020_110311 crossref_primary_10_1155_2013_496701 crossref_primary_10_1007_s42979_025_04263_z crossref_primary_10_1016_j_eswa_2024_124975 crossref_primary_10_1016_j_image_2010_05_003 crossref_primary_10_1007_s11042_016_4290_5 crossref_primary_10_1007_s11042_018_6266_0 crossref_primary_10_1117_1_JEI_32_4_043015 crossref_primary_10_1109_ACCESS_2019_2959627 crossref_primary_10_1109_TPAMI_2022_3180556 crossref_primary_10_1007_s11263_022_01617_5 crossref_primary_10_1016_j_inffus_2020_06_014 crossref_primary_10_1049_iet_ipr_2019_1114 crossref_primary_10_1109_TIFS_2011_2170836 crossref_primary_10_1016_j_dsp_2022_103429 crossref_primary_10_1007_s11042_016_3964_3 crossref_primary_10_1007_s11042_017_4915_3 crossref_primary_10_1007_s11042_023_15942_5 crossref_primary_10_1016_j_ijleo_2012_08_018 crossref_primary_10_1186_s13640_018_0257_y crossref_primary_10_1016_j_eswa_2025_129089 crossref_primary_10_1155_2015_653164 crossref_primary_10_1007_s13735_014_0051_2 crossref_primary_10_1109_TIFS_2014_2330312 crossref_primary_10_1109_ACCESS_2013_2260814 crossref_primary_10_1109_TCSVT_2021_3111195 crossref_primary_10_1007_s11042_018_6611_3 crossref_primary_10_51682_jiscom_v3i1_28 crossref_primary_10_1007_s11042_019_07817_5 crossref_primary_10_1109_ACCESS_2025_3577221 crossref_primary_10_1186_s13640_017_0196_z crossref_primary_10_1111_1556_4029_15210 crossref_primary_10_1016_j_patcog_2018_03_028 crossref_primary_10_1016_j_image_2016_05_005 crossref_primary_10_1007_s11042_025_20626_3 crossref_primary_10_1007_s12559_022_10008_4 crossref_primary_10_1007_s11042_023_16131_0 crossref_primary_10_1109_TIFS_2014_2359368 crossref_primary_10_1109_TIFS_2019_2916364 crossref_primary_10_1109_ACCESS_2025_3545830 crossref_primary_10_1016_j_jvcir_2018_12_007 crossref_primary_10_1016_j_patcog_2024_110727 crossref_primary_10_26634_jip_6_1_15925 crossref_primary_10_1109_TIFS_2021_3070444 crossref_primary_10_1007_s00521_024_09511_6 crossref_primary_10_1016_j_dsp_2017_08_009 crossref_primary_10_1016_j_sigpro_2025_110123 crossref_primary_10_1051_matecconf_201927702026 crossref_primary_10_1109_TNNLS_2021_3130168 crossref_primary_10_3390_jimaging10010004 crossref_primary_10_1016_j_diin_2018_01_011 crossref_primary_10_1038_s41598_025_04203_0 crossref_primary_10_1007_s11042_020_10211_1 crossref_primary_10_1016_j_image_2012_07_006 crossref_primary_10_1109_ACCESS_2019_2934160 crossref_primary_10_1016_j_eswa_2017_05_044 crossref_primary_10_1109_TIFS_2013_2248727 crossref_primary_10_1145_3698770 crossref_primary_10_1007_s11042_016_3795_2 crossref_primary_10_1007_s00530_024_01583_7 crossref_primary_10_1109_ACCESS_2023_3264014 |
| Cites_doi | 10.1109/ICME.2007.4284574 10.1109/TSP.2004.839932 10.1145/566570.566572 10.1145/1015706.1015721 10.1145/1015706.1015719 10.1109/83.951529 10.1117/12.640109 10.1109/ICME.2006.262447 10.1109/ICME.2007.4284578 10.1145/882262.882264 10.1145/882262.882269 10.1145/1073170.1073171 10.1145/344779.344972 10.1145/1161366.1161376 10.1145/1073204.1073274 10.1109/TSP.2005.855406 |
| ContentType | Journal Article |
| Copyright | 2009 Elsevier Ltd 2009 INIST-CNRS |
| Copyright_xml | – notice: 2009 Elsevier Ltd – notice: 2009 INIST-CNRS |
| DBID | AAYXX CITATION IQODW |
| DOI | 10.1016/j.patcog.2009.03.019 |
| DatabaseName | CrossRef Pascal-Francis |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science Applied Sciences |
| EISSN | 1873-5142 |
| EndPage | 2501 |
| ExternalDocumentID | 21719515 10_1016_j_patcog_2009_03_019 S0031320309001198 |
| GroupedDBID | --K --M -D8 -DT -~X .DC .~1 0R~ 123 1B1 1RT 1~. 1~5 29O 4.4 457 4G. 53G 5VS 7-5 71M 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABEFU ABFNM ABFRF ABHFT ABJNI ABMAC ABTAH ABXDB ABYKQ ACBEA ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADMXK ADTZH AEBSH AECPX AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F0J F5P FD6 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ H~9 IHE J1W JJJVA KOM KZ1 LG9 LMP LY1 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG RNS ROL RPZ SBC SDF SDG SDP SDS SES SEW SPC SPCBC SST SSV SSZ T5K TN5 UNMZH VOH WUQ XJE XPP ZMT ZY4 ~G- 9DU AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD AFXIZ AGCQF AGRNS BNPGV IQODW SSH |
| ID | FETCH-LOGICAL-c402t-dcca5cac517e4c732eacf8f5a9febf729bb81a2733d4d4c8c1ddc052c650c5d73 |
| ISICitedReferencesCount | 275 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000268453800014&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0031-3203 |
| IngestDate | Mon Jul 21 09:17:00 EDT 2025 Sat Nov 29 03:52:04 EST 2025 Tue Nov 18 22:33:20 EST 2025 Fri Feb 23 02:33:54 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 11 |
| Keywords | Tampered image detection JPEG Double quantization Pattern analysis DCT coefficient Image processing Video technique Image compression Realistic images Image coding Signal quantization Signal processing Image sensor Discrete cosine transforms Signal detection JPE |
| Language | English |
| License | https://www.elsevier.com/tdm/userlicense/1.0 CC BY 4.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c402t-dcca5cac517e4c732eacf8f5a9febf729bb81a2733d4d4c8c1ddc052c650c5d73 |
| PageCount | 10 |
| ParticipantIDs | pascalfrancis_primary_21719515 crossref_citationtrail_10_1016_j_patcog_2009_03_019 crossref_primary_10_1016_j_patcog_2009_03_019 elsevier_sciencedirect_doi_10_1016_j_patcog_2009_03_019 |
| PublicationCentury | 2000 |
| PublicationDate | 2009-11-01 |
| PublicationDateYYYYMMDD | 2009-11-01 |
| PublicationDate_xml | – month: 11 year: 2009 text: 2009-11-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationPlace | Kidlington |
| PublicationPlace_xml | – name: Kidlington |
| PublicationTitle | Pattern recognition |
| PublicationYear | 2009 |
| Publisher | Elsevier Ltd Elsevier |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier |
| References | Lin, Wang, Tang, Shum (bib25) 2005 V. Kwatra, et al., Graphcut textures: image and video synthesis using graph cuts, in: ACM Siggraph, 2003, pp. 277–286. S. Ye, Q. Sun, E.-C. Chang, Detecting digital image forgeries by measuring inconsistencies of blocking artifact, Int’l Conf. Multimedia and Expo (ICME 2007), Beijing, China. M. Johnson, H. Farid, Exposing digital forgeries by detecting inconsistencies in lighting, in: ACM Multimedia and Security Workshop, New York, NY, 2005. Y.-Y. Chuang, et al., Video matting of complex scenes, in: ACM Siggraph, 2002, pp. 243–248. Ng, Chang, Lin, Sun (bib10) 2006 C. Amsberry, Alterations of photos raise host of legal, ethical issues, The Wall Street Journal, January 26, 1989, Section B, p. 1. A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004. Popescu, Farid (bib13) 2004 Craver (bib9) 2001 T.-T. Ng, S.-F. Chang, Q. Sun, Blind detection of photomontage using higher order statistics, in: IEEE International Symposium on Circuits and Systems (ISCAS 2004), Vancouver, Canada, pp. 688–691. P. Pérez, M. Gangnet, A. Blake, Poisson image editing, in: ACM Siggraph, 2003, pp. 313–318. J. Lukas, J. Fridrich, M. Goljan, Detecting digital image forgeries using sensor pattern noise, SPIE Electronic Imaging, Photonics West, January 2006. M. Bertalmio, G. Sapiro, V. Caselles, C. Ballester, Image inpainting, in: ACM Siggraph, 2000, pp. 417–424. M.K. Johnson, H. Farid, Exposing digital forgeries through chromatic aberration, in: ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006. Popescu, Farid (bib15) 2005; 52 Lukas, Fridrich (bib27) 2003 J. He, Z. Lin, L. Wang, X. Tang, Detecting doctored JPEG images via DCT coefficient analysis, in: Proceedings of the 9th European Conference on Computer Vision, Lecture Notes in Computer Sciences, vol. 3953, Springer, Berlin, 2006, pp. 423–435. Farid (bib17) 2001; 10 S.-J. Lee, S.-H. Jung, A survey of watermarking techniques applied to multimedia, in: Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE2001), vol. 1, pp. 272–277. J. Sun, L. Yuan, J. Jia, H.-Y. Shum, Image completion with structure propagation, in: ACM Siggraph, 2005, pp. 861–868. Y.-F. Hsu, S.-F. Chang, Detecting image splicing using geometry invariants and camera characteristics consistency, in: International Conference on Multimedia and Expo (ICME 2006), Toronto, Canada. Y.-F. Hsu, S.-F. Chang, Image splicing detection using camera response function consistency and automatic segmentation, in: International Conference on Multimedia and Expo (ICME 2007), Beijing, China. Tekalp (bib28) 1995 T.V. Lanh, K.-S. Chong, S. Emmanuel, M. Kankanhalli, A survey on image forensic methods, in: International Conference on Multimedia and Expo (ICME 2007), Beijing, China. J. Sun, et al., Poisson matting, in: ACM Siggraph, 2004, pp. 315–321. Popescu, Farid (bib14) 2005; 53 Y. Li, et al., Lazy snapping, in: ACM Siggraph, 2004, pp. 303–308. Popescu (10.1016/j.patcog.2009.03.019_bib13) 2004 10.1016/j.patcog.2009.03.019_bib19 10.1016/j.patcog.2009.03.019_bib18 Tekalp (10.1016/j.patcog.2009.03.019_bib28) 1995 Lin (10.1016/j.patcog.2009.03.019_bib25) 2005 10.1016/j.patcog.2009.03.019_bib26 10.1016/j.patcog.2009.03.019_bib24 Popescu (10.1016/j.patcog.2009.03.019_bib14) 2005; 53 10.1016/j.patcog.2009.03.019_bib22 10.1016/j.patcog.2009.03.019_bib23 10.1016/j.patcog.2009.03.019_bib20 10.1016/j.patcog.2009.03.019_bib21 Ng (10.1016/j.patcog.2009.03.019_bib10) 2006 Popescu (10.1016/j.patcog.2009.03.019_bib15) 2005; 52 Lukas (10.1016/j.patcog.2009.03.019_bib27) 2003 Craver (10.1016/j.patcog.2009.03.019_bib9) 2001 10.1016/j.patcog.2009.03.019_bib7 10.1016/j.patcog.2009.03.019_bib6 10.1016/j.patcog.2009.03.019_bib8 10.1016/j.patcog.2009.03.019_bib3 10.1016/j.patcog.2009.03.019_bib2 10.1016/j.patcog.2009.03.019_bib5 Farid (10.1016/j.patcog.2009.03.019_bib17) 2001; 10 10.1016/j.patcog.2009.03.019_bib4 10.1016/j.patcog.2009.03.019_bib16 10.1016/j.patcog.2009.03.019_bib1 10.1016/j.patcog.2009.03.019_bib11 10.1016/j.patcog.2009.03.019_bib12 |
| References_xml | – reference: V. Kwatra, et al., Graphcut textures: image and video synthesis using graph cuts, in: ACM Siggraph, 2003, pp. 277–286. – year: 2001 ident: bib9 article-title: Reading between the lines: lessons from the SDMI challenge publication-title: Proceedings of the 10th USENIX Security Symposium – reference: T.V. Lanh, K.-S. Chong, S. Emmanuel, M. Kankanhalli, A survey on image forensic methods, in: International Conference on Multimedia and Expo (ICME 2007), Beijing, China. – reference: J. Sun, L. Yuan, J. Jia, H.-Y. Shum, Image completion with structure propagation, in: ACM Siggraph, 2005, pp. 861–868. – reference: M. Johnson, H. Farid, Exposing digital forgeries by detecting inconsistencies in lighting, in: ACM Multimedia and Security Workshop, New York, NY, 2005. – year: 2003 ident: bib27 article-title: Estimation of primary quantization matrix in double compressed JPEG images publication-title: Proceedings of the Digital Forensic Research Workshop – reference: M.K. Johnson, H. Farid, Exposing digital forgeries through chromatic aberration, in: ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006. – year: 1995 ident: bib28 article-title: Digital Video Processing – reference: A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004. – reference: J. Sun, et al., Poisson matting, in: ACM Siggraph, 2004, pp. 315–321. – reference: S.-J. Lee, S.-H. Jung, A survey of watermarking techniques applied to multimedia, in: Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE2001), vol. 1, pp. 272–277. – reference: T.-T. Ng, S.-F. Chang, Q. Sun, Blind detection of photomontage using higher order statistics, in: IEEE International Symposium on Circuits and Systems (ISCAS 2004), Vancouver, Canada, pp. 688–691. – start-page: 1087 year: 2005 end-page: 1092 ident: bib25 article-title: Detecting doctored images using camera response normality and consistency publication-title: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition – reference: Y.-Y. Chuang, et al., Video matting of complex scenes, in: ACM Siggraph, 2002, pp. 243–248. – year: 2004 ident: bib13 article-title: Statistical tools for digital forensics publication-title: Proceedings of the 6th International Workshop on Information Hiding, Toronto, Canada – volume: 53 start-page: 3948 year: 2005 end-page: 3959 ident: bib14 article-title: Exposing digital forgeries in color filter array interpolated images publication-title: IEEE Transactions on Signal Processing – reference: C. Amsberry, Alterations of photos raise host of legal, ethical issues, The Wall Street Journal, January 26, 1989, Section B, p. 1. – reference: Y.-F. Hsu, S.-F. Chang, Image splicing detection using camera response function consistency and automatic segmentation, in: International Conference on Multimedia and Expo (ICME 2007), Beijing, China. – reference: J. He, Z. Lin, L. Wang, X. Tang, Detecting doctored JPEG images via DCT coefficient analysis, in: Proceedings of the 9th European Conference on Computer Vision, Lecture Notes in Computer Sciences, vol. 3953, Springer, Berlin, 2006, pp. 423–435. – reference: J. Lukas, J. Fridrich, M. Goljan, Detecting digital image forgeries using sensor pattern noise, SPIE Electronic Imaging, Photonics West, January 2006. – reference: P. Pérez, M. Gangnet, A. Blake, Poisson image editing, in: ACM Siggraph, 2003, pp. 313–318. – volume: 52 start-page: 758 year: 2005 end-page: 767 ident: bib15 article-title: Exposing digital forgeries by detecting traces of re-sampling publication-title: IEEE Transactions on Signal Processing – reference: Y. Li, et al., Lazy snapping, in: ACM Siggraph, 2004, pp. 303–308. – volume: 10 start-page: 1428 year: 2001 end-page: 1433 ident: bib17 article-title: Blind inverse gamma correction publication-title: IEEE Transactions on Image Processing – reference: Y.-F. Hsu, S.-F. Chang, Detecting image splicing using geometry invariants and camera characteristics consistency, in: International Conference on Multimedia and Expo (ICME 2006), Toronto, Canada. – reference: M. Bertalmio, G. Sapiro, V. Caselles, C. Ballester, Image inpainting, in: ACM Siggraph, 2000, pp. 417–424. – year: 2006 ident: bib10 article-title: Passive-blind image forensics publication-title: Multimedia Security Technologies for Digital Rights – reference: S. Ye, Q. Sun, E.-C. Chang, Detecting digital image forgeries by measuring inconsistencies of blocking artifact, Int’l Conf. Multimedia and Expo (ICME 2007), Beijing, China. – ident: 10.1016/j.patcog.2009.03.019_bib23 doi: 10.1109/ICME.2007.4284574 – volume: 52 start-page: 758 issue: 2 year: 2005 ident: 10.1016/j.patcog.2009.03.019_bib15 article-title: Exposing digital forgeries by detecting traces of re-sampling publication-title: IEEE Transactions on Signal Processing doi: 10.1109/TSP.2004.839932 – ident: 10.1016/j.patcog.2009.03.019_bib3 doi: 10.1145/566570.566572 – ident: 10.1016/j.patcog.2009.03.019_bib8 – ident: 10.1016/j.patcog.2009.03.019_bib20 – ident: 10.1016/j.patcog.2009.03.019_bib5 doi: 10.1145/1015706.1015721 – ident: 10.1016/j.patcog.2009.03.019_bib7 doi: 10.1145/1015706.1015719 – year: 2003 ident: 10.1016/j.patcog.2009.03.019_bib27 article-title: Estimation of primary quantization matrix in double compressed JPEG images – year: 2004 ident: 10.1016/j.patcog.2009.03.019_bib13 article-title: Statistical tools for digital forensics – ident: 10.1016/j.patcog.2009.03.019_bib18 – year: 2006 ident: 10.1016/j.patcog.2009.03.019_bib10 article-title: Passive-blind image forensics – volume: 10 start-page: 1428 issue: 10 year: 2001 ident: 10.1016/j.patcog.2009.03.019_bib17 article-title: Blind inverse gamma correction publication-title: IEEE Transactions on Image Processing doi: 10.1109/83.951529 – ident: 10.1016/j.patcog.2009.03.019_bib16 doi: 10.1117/12.640109 – ident: 10.1016/j.patcog.2009.03.019_bib21 doi: 10.1109/ICME.2006.262447 – ident: 10.1016/j.patcog.2009.03.019_bib11 – ident: 10.1016/j.patcog.2009.03.019_bib22 doi: 10.1109/ICME.2007.4284578 – ident: 10.1016/j.patcog.2009.03.019_bib2 doi: 10.1145/882262.882264 – start-page: 1087 year: 2005 ident: 10.1016/j.patcog.2009.03.019_bib25 article-title: Detecting doctored images using camera response normality and consistency – ident: 10.1016/j.patcog.2009.03.019_bib26 – ident: 10.1016/j.patcog.2009.03.019_bib4 doi: 10.1145/882262.882269 – year: 2001 ident: 10.1016/j.patcog.2009.03.019_bib9 article-title: Reading between the lines: lessons from the SDMI challenge – ident: 10.1016/j.patcog.2009.03.019_bib24 – ident: 10.1016/j.patcog.2009.03.019_bib12 doi: 10.1145/1073170.1073171 – year: 1995 ident: 10.1016/j.patcog.2009.03.019_bib28 – ident: 10.1016/j.patcog.2009.03.019_bib1 doi: 10.1145/344779.344972 – ident: 10.1016/j.patcog.2009.03.019_bib19 doi: 10.1145/1161366.1161376 – ident: 10.1016/j.patcog.2009.03.019_bib6 doi: 10.1145/1073204.1073274 – volume: 53 start-page: 3948 issue: 10 year: 2005 ident: 10.1016/j.patcog.2009.03.019_bib14 article-title: Exposing digital forgeries in color filter array interpolated images publication-title: IEEE Transactions on Signal Processing doi: 10.1109/TSP.2005.855406 |
| SSID | ssj0017142 |
| Score | 2.4862044 |
| Snippet | The quick advance in image/video editing techniques has enabled people to synthesize realistic images/videos conveniently. Some legal issues may arise when a... |
| SourceID | pascalfrancis crossref elsevier |
| SourceType | Index Database Enrichment Source Publisher |
| StartPage | 2492 |
| SubjectTerms | Applied sciences DCT coefficient Detection, estimation, filtering, equalization, prediction Double quantization Exact sciences and technology Image processing Information, signal and communications theory JPEG Pattern analysis Pattern recognition Sampling, quantization Signal and communications theory Signal processing Signal, noise Tampered image detection Telecommunications and information theory |
| Title | Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis |
| URI | https://dx.doi.org/10.1016/j.patcog.2009.03.019 |
| Volume | 42 |
| WOSCitedRecordID | wos000268453800014&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: ScienceDirect database customDbUrl: eissn: 1873-5142 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017142 issn: 0031-3203 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9pAEF7RpIdKUd9Rk7bRHnqjjuz1-4ioCaGV4QAVag_Weh8RUQooGJQf0B_eWXbXOH2I9tCLtVrZWGa-nflmdx4IvaMxFRF3fYfKUjgB92BUisiRkvCA8ZLwbbT7509xnifTaTpqtb7bXJjNTTyfJ3d36fK_ihrmQNgqdfYfxF3_KEzAGIQOVxA7XP9K8D2q0zjoulrs6rFKYJPOleoHAQyzokCWVeD5YJRdtGffVNwOF5XQbcM3M9r-0B2rsiHb-hI6Cl3XLmly2dG2NKdKhzExSLsT_S_94aTbz3LQjfVRz2CS97L8or2rcDC97AyHk_a4k9cNvtRYRwHMnI9ibcyq3ZVITXpevVVm7HpT9fqe4xPXb6regDQh5jUVaaBb5BmjDETN-63C13sP1-dLMFyLK1N_1D93jR6-V1_7J7tXRyOCV-YB0QwfoEMShynoxsPOZTYd1KdRsRfoqvPmE2wK5jZO8Nc3_4niHC3pChae1B1TGjRm_BQ9Nv4H7mjcPEMtMX-OnhhfBBtNv4Ip2-7Dzr1AXxWy3uMaVxhwhZu4whZXWOEKb3GFa1xhwBUGXOEGrrDF1Us06WXjbt8xvTkcFrikcjis_JBRFnqxCFjsEzDgMpEhTaUoJXhsZZl4FLixzwNY9AnzOGduSBh4BCzksX-MDuaLuXiFsPRYGMoQ_HABdDJKKbi8nEQ8jlLukoicIN_-nQUzhetV_5SbwkYoXhdaCKqnalq4fgFCOEFO_dRSF27Zc39sJVUY8qlJZQFQ2_Pk2T3B1q-zuDrdd8Nr9Gi3ht6gg-p2Ld6ih2xTzVa3ZwaNPwDk1K5r |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fast%2C+automatic+and+fine-grained+tampered+JPEG+image+detection+via+DCT+coefficient+analysis&rft.jtitle=Pattern+recognition&rft.au=ZHOUCHEN+LIN&rft.au=JUNFENG+HE&rft.au=XIAOOU+TANG&rft.au=TANG%2C+Chi-Keung&rft.date=2009-11-01&rft.pub=Elsevier&rft.issn=0031-3203&rft.volume=42&rft.issue=11&rft.spage=2492&rft.epage=2501&rft_id=info:doi/10.1016%2Fj.patcog.2009.03.019&rft.externalDBID=n%2Fa&rft.externalDocID=21719515 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0031-3203&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0031-3203&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0031-3203&client=summon |