SlideShare a Scribd company logo
1 of 6
Revealing the Trace of High-Quality JPEG Compression
Through Quantization Noise Analysis
ABSTRACT:
To identify whether an image has been JPEG compressed is an important issue in
forensic practice. The state-of-the-art methods fail to identify high-quality
compressed images, which are common on the Internet. In this paper, we provide a
novel quantization noise-based solution to reveal the traces of JPEG compression.
Based on the analysis of noises in multiple-cycle JPEG compression, we define a
quantity called forward quantization noise. We analytically derive that a
decompressed JPEG image has a lower variance of forward quantization noise than
its uncompressed counterpart. With the conclusion, we develop a simple yet very
effective detection algorithm to identify decompressed JPEG images. We show
that our method outperforms the state-of-the-art methods by a large margin
especially for high-quality compressed images through extensive experiments on
various sources of images. We also demonstrate that the proposed method is robust
to small image size and chroma subsampling. The proposed algorithm can be
applied in some practical applications, such as Internet image classification and
forgery detection.
EXISTING SYSTEM:
๏ถ Traces of JPEG compression may also be found in the histogram of DCT
coefficients. Luo et al. noted that JPEG compression reduces the amount of
DCT coefficients with an absolute value no larger than one. There are less
DCT coefficients in the range of [โˆ’1,1] after JPEG compression. A
discriminative statistics based on measuring the amount of DCT coefficients
in the range of [โˆ’2,2] is constructed. When the statistics of a test image
exceeds a threshold, it is classified as uncompressed. Otherwise, it is
identified as having been previously JPEG compressed.
๏ถ Although Luoet al.โ€™s method is considered as the current state of the art in
terms of its identification performance, it has a few shortcomings. First, the
analysis only uses a portion of the DCT coefficients that are close to 0.
Hence, information is not optimally utilized. Second, the method requires
the quantization step to be no less than 2 to be effective. As a result, this
method fails on high-quality compressed image such as those with a
quantization table containing mostly quantization steps being ones.
DISADVANTAGES OF EXISTING SYSTEM:
๏ถ High quality compressionis not achieved.
๏ถ Existing method fails on high-quality compressed image such as those
with a quantization table containing mostly quantization steps being
ones.
PROPOSED SYSTEM:
๏ถ In this paper, we focus on the problem of identifying whether an image
currently in uncompressed form is truly uncompressed or has been
previously JPEG compressed. Being able to identify such a historical record
may help to answer some forensics questions related to the originality and
the authenticity of an image, such as where is the image coming from,
whether it is an original one, or whether any tampering operation has been
performed.
๏ถ In this paper, we propose a method to reveal the traces of JPEG
compression. The proposed method is based on analyzing the forward
quantization noise, which is obtained by quantizing the block-DCT
coefficients with a step of one. A decompressed JPEG image has a lower
noise variance than its uncompressed counterpart. Such an observation can
be derived analytically.
๏ถ The main contribution of this work is to address the challenges posed by
high-quality compression in JPEG compression identification. Specifically,
our method is able to detect the images previously compressed with IJG
QF=99 or 100, and Photoshop QF from 90 to 100.
ADVANTAGES OF PROPOSED SYSTEM:
๏ถ Show that high-quality compressed images.
๏ถ Experiments show that high-quality compressed images are common on the
Internet, and our method is effective to identify them. Besides, our method
is robust to small image size and color sub-sampling in chrominance
channels.
๏ถ The proposed method can be applied to Internet image classification and
forgery detection with relatively accurate results.
๏ถ We show that our method outperforms the previous methods by a large
margin for high-quality JPEG compressed images which are common on
the Internet and present a challenge for identifying their compression
history.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
๏ƒ˜ System : Pentium IV 2.4 GHz.
๏ƒ˜ Hard Disk : 40 GB.
๏ƒ˜ Floppy Drive : 1.44 Mb.
๏ƒ˜ Monitor : 15 VGA Colour.
๏ƒ˜ Mouse : Logitech.
๏ƒ˜ Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
๏ƒ˜ Operating system : Windows XP/7.
๏ƒ˜ Coding Language : MATLAB
๏ƒ˜ Tool : MATLAB R2013A
REFERENCE:
Bin Li, Member, IEEE, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Member,
IEEE, and Jiwu Huang, Senior Member, IEEE, โ€œRevealing the Trace of High-
Quality JPEG Compression Through Quantization Noise Analysisโ€, IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
VOL. 10, NO. 3, MARCH 2015.

More Related Content

Similar to Revealing the trace of high quality jpeg

K03502056061
K03502056061K03502056061
K03502056061theijes
ย 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegPvrtechnologies Nellore
ย 
A Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate CompressionA Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate CompressionIOSR Journals
ย 
16 20 jul17 6jun 7995 yg baru(edit)
16 20 jul17 6jun 7995 yg baru(edit)16 20 jul17 6jun 7995 yg baru(edit)
16 20 jul17 6jun 7995 yg baru(edit)IAESIJEECS
ย 
Towards robust image steganography
Towards robust image steganographyTowards robust image steganography
Towards robust image steganographyJAYAPRAKASH JPINFOTECH
ย 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
ย 
Adaptive-Quality Image Compression Algorithm
Adaptive-Quality Image Compression AlgorithmAdaptive-Quality Image Compression Algorithm
Adaptive-Quality Image Compression Algorithmijma
ย 
Reduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageReduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageDr Sukhpal Singh Gill
ย 
Iaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensicIaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensicIaetsd Iaetsd
ย 
steganography based image compression
steganography based image compressionsteganography based image compression
steganography based image compressionINFOGAIN PUBLICATION
ย 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...chennaijp
ย 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compressionPradip Kumar
ย 
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGESTOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGESI3E Technologies
ย 
designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...swathi78
ย 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueCSCJournals
ย 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...IEEEBEBTECHSTUDENTPROJECTS
ย 
Quality assessment of deep-learning-based image compression
Quality assessment of deep-learning-based image compressionQuality assessment of deep-learning-based image compression
Quality assessment of deep-learning-based image compressionMarco Cagnazzo
ย 
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...chennaijp
ย 
Medical images compression: JPEG variations for DICOM standard
Medical images compression: JPEG variations for DICOM standardMedical images compression: JPEG variations for DICOM standard
Medical images compression: JPEG variations for DICOM standardJose Pinilla
ย 

Similar to Revealing the trace of high quality jpeg (20)

K03502056061
K03502056061K03502056061
K03502056061
ย 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
ย 
A Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate CompressionA Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate Compression
ย 
16 20 jul17 6jun 7995 yg baru(edit)
16 20 jul17 6jun 7995 yg baru(edit)16 20 jul17 6jun 7995 yg baru(edit)
16 20 jul17 6jun 7995 yg baru(edit)
ย 
Towards robust image steganography
Towards robust image steganographyTowards robust image steganography
Towards robust image steganography
ย 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
ย 
Adaptive-Quality Image Compression Algorithm
Adaptive-Quality Image Compression AlgorithmAdaptive-Quality Image Compression Algorithm
Adaptive-Quality Image Compression Algorithm
ย 
Reduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageReduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed Image
ย 
JPEG
JPEGJPEG
JPEG
ย 
Iaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensicIaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensic
ย 
steganography based image compression
steganography based image compressionsteganography based image compression
steganography based image compression
ย 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
ย 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
ย 
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGESTOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
ย 
designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...
ย 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression Technique
ย 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
ย 
Quality assessment of deep-learning-based image compression
Quality assessment of deep-learning-based image compressionQuality assessment of deep-learning-based image compression
Quality assessment of deep-learning-based image compression
ย 
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
ย 
Medical images compression: JPEG variations for DICOM standard
Medical images compression: JPEG variations for DICOM standardMedical images compression: JPEG variations for DICOM standard
Medical images compression: JPEG variations for DICOM standard
ย 

More from jpstudcorner

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicatejpstudcorner
ย 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facialjpstudcorner
ย 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegjpstudcorner
ย 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievaljpstudcorner
ย 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsctjpstudcorner
ย 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based onjpstudcorner
ย 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced referencejpstudcorner
ย 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchjpstudcorner
ย 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images forjpstudcorner
ย 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correctionjpstudcorner
ย 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metricjpstudcorner
ย 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind imagejpstudcorner
ย 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitatejpstudcorner
ย 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertainjpstudcorner
ย 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllablejpstudcorner
ย 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detectionjpstudcorner
ย 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadedjpstudcorner
ย 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware enginejpstudcorner
ย 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of networkjpstudcorner
ย 
Multiview alignment hashing for
Multiview alignment hashing forMultiview alignment hashing for
Multiview alignment hashing forjpstudcorner
ย 

More from jpstudcorner (20)

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
ย 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
ย 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
ย 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
ย 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
ย 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
ย 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
ย 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
ย 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
ย 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
ย 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
ย 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
ย 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
ย 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
ย 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
ย 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
ย 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
ย 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
ย 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
ย 
Multiview alignment hashing for
Multiview alignment hashing forMultiview alignment hashing for
Multiview alignment hashing for
ย 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
ย 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .DerechoLaboralIndivi
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
ย 

Recently uploaded (20)

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
ย 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 

Revealing the trace of high quality jpeg

  • 1. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis ABSTRACT: To identify whether an image has been JPEG compressed is an important issue in forensic practice. The state-of-the-art methods fail to identify high-quality compressed images, which are common on the Internet. In this paper, we provide a novel quantization noise-based solution to reveal the traces of JPEG compression. Based on the analysis of noises in multiple-cycle JPEG compression, we define a quantity called forward quantization noise. We analytically derive that a decompressed JPEG image has a lower variance of forward quantization noise than its uncompressed counterpart. With the conclusion, we develop a simple yet very effective detection algorithm to identify decompressed JPEG images. We show that our method outperforms the state-of-the-art methods by a large margin especially for high-quality compressed images through extensive experiments on various sources of images. We also demonstrate that the proposed method is robust to small image size and chroma subsampling. The proposed algorithm can be applied in some practical applications, such as Internet image classification and forgery detection.
  • 2. EXISTING SYSTEM: ๏ถ Traces of JPEG compression may also be found in the histogram of DCT coefficients. Luo et al. noted that JPEG compression reduces the amount of DCT coefficients with an absolute value no larger than one. There are less DCT coefficients in the range of [โˆ’1,1] after JPEG compression. A discriminative statistics based on measuring the amount of DCT coefficients in the range of [โˆ’2,2] is constructed. When the statistics of a test image exceeds a threshold, it is classified as uncompressed. Otherwise, it is identified as having been previously JPEG compressed. ๏ถ Although Luoet al.โ€™s method is considered as the current state of the art in terms of its identification performance, it has a few shortcomings. First, the analysis only uses a portion of the DCT coefficients that are close to 0. Hence, information is not optimally utilized. Second, the method requires the quantization step to be no less than 2 to be effective. As a result, this method fails on high-quality compressed image such as those with a quantization table containing mostly quantization steps being ones. DISADVANTAGES OF EXISTING SYSTEM: ๏ถ High quality compressionis not achieved.
  • 3. ๏ถ Existing method fails on high-quality compressed image such as those with a quantization table containing mostly quantization steps being ones. PROPOSED SYSTEM: ๏ถ In this paper, we focus on the problem of identifying whether an image currently in uncompressed form is truly uncompressed or has been previously JPEG compressed. Being able to identify such a historical record may help to answer some forensics questions related to the originality and the authenticity of an image, such as where is the image coming from, whether it is an original one, or whether any tampering operation has been performed. ๏ถ In this paper, we propose a method to reveal the traces of JPEG compression. The proposed method is based on analyzing the forward quantization noise, which is obtained by quantizing the block-DCT coefficients with a step of one. A decompressed JPEG image has a lower noise variance than its uncompressed counterpart. Such an observation can be derived analytically. ๏ถ The main contribution of this work is to address the challenges posed by high-quality compression in JPEG compression identification. Specifically,
  • 4. our method is able to detect the images previously compressed with IJG QF=99 or 100, and Photoshop QF from 90 to 100. ADVANTAGES OF PROPOSED SYSTEM: ๏ถ Show that high-quality compressed images. ๏ถ Experiments show that high-quality compressed images are common on the Internet, and our method is effective to identify them. Besides, our method is robust to small image size and color sub-sampling in chrominance channels. ๏ถ The proposed method can be applied to Internet image classification and forgery detection with relatively accurate results. ๏ถ We show that our method outperforms the previous methods by a large margin for high-quality JPEG compressed images which are common on the Internet and present a challenge for identifying their compression history.
  • 6. ๏ƒ˜ System : Pentium IV 2.4 GHz. ๏ƒ˜ Hard Disk : 40 GB. ๏ƒ˜ Floppy Drive : 1.44 Mb. ๏ƒ˜ Monitor : 15 VGA Colour. ๏ƒ˜ Mouse : Logitech. ๏ƒ˜ Ram : 512 Mb. SOFTWARE REQUIREMENTS: ๏ƒ˜ Operating system : Windows XP/7. ๏ƒ˜ Coding Language : MATLAB ๏ƒ˜ Tool : MATLAB R2013A REFERENCE: Bin Li, Member, IEEE, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Member, IEEE, and Jiwu Huang, Senior Member, IEEE, โ€œRevealing the Trace of High- Quality JPEG Compression Through Quantization Noise Analysisโ€, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 3, MARCH 2015.