SlideShare a Scribd company logo
Revealing the Trace of High-Quality JPEG Compression
Through Quantization Noise Analysis
ABSTRACT:
To identify whether an image has been JPEG compressed is an important issue in
forensic practice. The state-of-the-art methods fail to identify high-quality
compressed images, which are common on the Internet. In this paper, we provide a
novel quantization noise-based solution to reveal the traces of JPEG compression.
Based on the analysis of noises in multiple-cycle JPEG compression, we define a
quantity called forward quantization noise. We analytically derive that a
decompressed JPEG image has a lower variance of forward quantization noise than
its uncompressed counterpart. With the conclusion, we develop a simple yet very
effective detection algorithm to identify decompressed JPEG images. We show
that our method outperforms the state-of-the-art methods by a large margin
especially for high-quality compressed images through extensive experiments on
various sources of images. We also demonstrate that the proposed method is robust
to small image size and chroma subsampling. The proposed algorithm can be
applied in some practical applications, such as Internet image classification and
forgery detection.
EXISTING SYSTEM:
 Traces of JPEG compression may also be found in the histogram of DCT
coefficients. Luo et al. noted that JPEG compression reduces the amount of
DCT coefficients with an absolute value no larger than one. There are less
DCT coefficients in the range of [−1,1] after JPEG compression. A
discriminative statistics based on measuring the amount of DCT coefficients
in the range of [−2,2] is constructed. When the statistics of a test image
exceeds a threshold, it is classified as uncompressed. Otherwise, it is
identified as having been previously JPEG compressed.
 Although Luoet al.’s method is considered as the current state of the art in
terms of its identification performance, it has a few shortcomings. First, the
analysis only uses a portion of the DCT coefficients that are close to 0.
Hence, information is not optimally utilized. Second, the method requires
the quantization step to be no less than 2 to be effective. As a result, this
method fails on high-quality compressed image such as those with a
quantization table containing mostly quantization steps being ones.
DISADVANTAGES OF EXISTING SYSTEM:
 High quality compressionis not achieved.
 Existing method fails on high-quality compressed image such as those
with a quantization table containing mostly quantization steps being
ones.
PROPOSED SYSTEM:
 In this paper, we focus on the problem of identifying whether an image
currently in uncompressed form is truly uncompressed or has been
previously JPEG compressed. Being able to identify such a historical record
may help to answer some forensics questions related to the originality and
the authenticity of an image, such as where is the image coming from,
whether it is an original one, or whether any tampering operation has been
performed.
 In this paper, we propose a method to reveal the traces of JPEG
compression. The proposed method is based on analyzing the forward
quantization noise, which is obtained by quantizing the block-DCT
coefficients with a step of one. A decompressed JPEG image has a lower
noise variance than its uncompressed counterpart. Such an observation can
be derived analytically.
 The main contribution of this work is to address the challenges posed by
high-quality compression in JPEG compression identification. Specifically,
our method is able to detect the images previously compressed with IJG
QF=99 or 100, and Photoshop QF from 90 to 100.
ADVANTAGES OF PROPOSED SYSTEM:
 Show that high-quality compressed images.
 Experiments show that high-quality compressed images are common on the
Internet, and our method is effective to identify them. Besides, our method
is robust to small image size and color sub-sampling in chrominance
channels.
 The proposed method can be applied to Internet image classification and
forgery detection with relatively accurate results.
 We show that our method outperforms the previous methods by a large
margin for high-quality JPEG compressed images which are common on
the Internet and present a challenge for identifying their compression
history.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : MATLAB
 Tool : MATLAB R2013A
REFERENCE:
Bin Li, Member, IEEE, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Member,
IEEE, and Jiwu Huang, Senior Member, IEEE, “Revealing the Trace of High-
Quality JPEG Compression Through Quantization Noise Analysis”, IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
VOL. 10, NO. 3, MARCH 2015.

More Related Content

Viewers also liked

KME Plus® Market Segments and Applications
KME Plus® Market Segments and ApplicationsKME Plus® Market Segments and Applications
KME Plus® Market Segments and ApplicationsKMEwebmanager
 
TRENITALIA E IL RIDE-SHARING
TRENITALIA E IL RIDE-SHARINGTRENITALIA E IL RIDE-SHARING
TRENITALIA E IL RIDE-SHARING
Target Research
 
The 2 role model of affect
The 2 role model of affectThe 2 role model of affect
The 2 role model of affect
David R Cole
 
vlsi projects using verilog code 2014-2015
vlsi projects using verilog code 2014-2015vlsi projects using verilog code 2014-2015
vlsi projects using verilog code 2014-2015
E2MATRIX
 
Seminar on textile finishing
Seminar on textile finishingSeminar on textile finishing
Seminar on textile finishing
010aastha
 
Role of voluntary health organization and international health agencies
Role of voluntary health organization and international health agenciesRole of voluntary health organization and international health agencies
Role of voluntary health organization and international health agencies
Indra Mani Mishra
 
New control of pv solar farm as statcom (pv statcom) for increasing grid powe...
New control of pv solar farm as statcom (pv statcom) for increasing grid powe...New control of pv solar farm as statcom (pv statcom) for increasing grid powe...
New control of pv solar farm as statcom (pv statcom) for increasing grid powe...
LeMeniz Infotech
 

Viewers also liked (8)

KME Plus® Market Segments and Applications
KME Plus® Market Segments and ApplicationsKME Plus® Market Segments and Applications
KME Plus® Market Segments and Applications
 
TRENITALIA E IL RIDE-SHARING
TRENITALIA E IL RIDE-SHARINGTRENITALIA E IL RIDE-SHARING
TRENITALIA E IL RIDE-SHARING
 
The 2 role model of affect
The 2 role model of affectThe 2 role model of affect
The 2 role model of affect
 
Special finishes
Special finishesSpecial finishes
Special finishes
 
vlsi projects using verilog code 2014-2015
vlsi projects using verilog code 2014-2015vlsi projects using verilog code 2014-2015
vlsi projects using verilog code 2014-2015
 
Seminar on textile finishing
Seminar on textile finishingSeminar on textile finishing
Seminar on textile finishing
 
Role of voluntary health organization and international health agencies
Role of voluntary health organization and international health agenciesRole of voluntary health organization and international health agencies
Role of voluntary health organization and international health agencies
 
New control of pv solar farm as statcom (pv statcom) for increasing grid powe...
New control of pv solar farm as statcom (pv statcom) for increasing grid powe...New control of pv solar farm as statcom (pv statcom) for increasing grid powe...
New control of pv solar farm as statcom (pv statcom) for increasing grid powe...
 

Similar to Revealing the trace of high quality jpeg

K03502056061
K03502056061K03502056061
K03502056061
theijes
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
Pvrtechnologies Nellore
 
A Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate CompressionA Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate Compression
IOSR Journals
 
16 20 jul17 6jun 7995 yg baru(edit)
16 20 jul17 6jun 7995 yg baru(edit)16 20 jul17 6jun 7995 yg baru(edit)
16 20 jul17 6jun 7995 yg baru(edit)
IAESIJEECS
 
Towards robust image steganography
Towards robust image steganographyTowards robust image steganography
Towards robust image steganography
JAYAPRAKASH JPINFOTECH
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Adaptive-Quality Image Compression Algorithm
Adaptive-Quality Image Compression AlgorithmAdaptive-Quality Image Compression Algorithm
Adaptive-Quality Image Compression Algorithm
ijma
 
Reduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageReduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed Image
Dr Sukhpal Singh Gill
 
JPEG
JPEGJPEG
Iaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensicIaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensic
Iaetsd Iaetsd
 
steganography based image compression
steganography based image compressionsteganography based image compression
steganography based image compression
INFOGAIN PUBLICATION
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
chennaijp
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
Pradip Kumar
 
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGESTOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
I3E Technologies
 
designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...
swathi78
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression Technique
CSCJournals
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEEBEBTECHSTUDENTPROJECTS
 
Quality assessment of deep-learning-based image compression
Quality assessment of deep-learning-based image compressionQuality assessment of deep-learning-based image compression
Quality assessment of deep-learning-based image compression
Marco Cagnazzo
 
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
chennaijp
 

Similar to Revealing the trace of high quality jpeg (20)

Revealing the trace of high
Revealing the trace of highRevealing the trace of high
Revealing the trace of high
 
K03502056061
K03502056061K03502056061
K03502056061
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
A Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate CompressionA Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate Compression
 
16 20 jul17 6jun 7995 yg baru(edit)
16 20 jul17 6jun 7995 yg baru(edit)16 20 jul17 6jun 7995 yg baru(edit)
16 20 jul17 6jun 7995 yg baru(edit)
 
Towards robust image steganography
Towards robust image steganographyTowards robust image steganography
Towards robust image steganography
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Adaptive-Quality Image Compression Algorithm
Adaptive-Quality Image Compression AlgorithmAdaptive-Quality Image Compression Algorithm
Adaptive-Quality Image Compression Algorithm
 
Reduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageReduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed Image
 
JPEG
JPEGJPEG
JPEG
 
Iaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensicIaetsd a review on modified anti forensic
Iaetsd a review on modified anti forensic
 
steganography based image compression
steganography based image compressionsteganography based image compression
steganography based image compression
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGESTOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
TOWARDS PRACTICAL SELF-EMBEDDING FOR JPEG-COMPRESSED DIGITAL IMAGES
 
designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression Technique
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
 
Quality assessment of deep-learning-based image compression
Quality assessment of deep-learning-based image compressionQuality assessment of deep-learning-based image compression
Quality assessment of deep-learning-based image compression
 
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
 

More from jpstudcorner

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
jpstudcorner
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
jpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
jpstudcorner
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
jpstudcorner
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
jpstudcorner
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
jpstudcorner
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
jpstudcorner
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
jpstudcorner
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
jpstudcorner
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
jpstudcorner
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
jpstudcorner
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
jpstudcorner
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
jpstudcorner
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
jpstudcorner
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
jpstudcorner
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
jpstudcorner
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
jpstudcorner
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
jpstudcorner
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
jpstudcorner
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
jpstudcorner
 

More from jpstudcorner (20)

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 

Revealing the trace of high quality jpeg

  • 1. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis ABSTRACT: To identify whether an image has been JPEG compressed is an important issue in forensic practice. The state-of-the-art methods fail to identify high-quality compressed images, which are common on the Internet. In this paper, we provide a novel quantization noise-based solution to reveal the traces of JPEG compression. Based on the analysis of noises in multiple-cycle JPEG compression, we define a quantity called forward quantization noise. We analytically derive that a decompressed JPEG image has a lower variance of forward quantization noise than its uncompressed counterpart. With the conclusion, we develop a simple yet very effective detection algorithm to identify decompressed JPEG images. We show that our method outperforms the state-of-the-art methods by a large margin especially for high-quality compressed images through extensive experiments on various sources of images. We also demonstrate that the proposed method is robust to small image size and chroma subsampling. The proposed algorithm can be applied in some practical applications, such as Internet image classification and forgery detection.
  • 2. EXISTING SYSTEM:  Traces of JPEG compression may also be found in the histogram of DCT coefficients. Luo et al. noted that JPEG compression reduces the amount of DCT coefficients with an absolute value no larger than one. There are less DCT coefficients in the range of [−1,1] after JPEG compression. A discriminative statistics based on measuring the amount of DCT coefficients in the range of [−2,2] is constructed. When the statistics of a test image exceeds a threshold, it is classified as uncompressed. Otherwise, it is identified as having been previously JPEG compressed.  Although Luoet al.’s method is considered as the current state of the art in terms of its identification performance, it has a few shortcomings. First, the analysis only uses a portion of the DCT coefficients that are close to 0. Hence, information is not optimally utilized. Second, the method requires the quantization step to be no less than 2 to be effective. As a result, this method fails on high-quality compressed image such as those with a quantization table containing mostly quantization steps being ones. DISADVANTAGES OF EXISTING SYSTEM:  High quality compressionis not achieved.
  • 3.  Existing method fails on high-quality compressed image such as those with a quantization table containing mostly quantization steps being ones. PROPOSED SYSTEM:  In this paper, we focus on the problem of identifying whether an image currently in uncompressed form is truly uncompressed or has been previously JPEG compressed. Being able to identify such a historical record may help to answer some forensics questions related to the originality and the authenticity of an image, such as where is the image coming from, whether it is an original one, or whether any tampering operation has been performed.  In this paper, we propose a method to reveal the traces of JPEG compression. The proposed method is based on analyzing the forward quantization noise, which is obtained by quantizing the block-DCT coefficients with a step of one. A decompressed JPEG image has a lower noise variance than its uncompressed counterpart. Such an observation can be derived analytically.  The main contribution of this work is to address the challenges posed by high-quality compression in JPEG compression identification. Specifically,
  • 4. our method is able to detect the images previously compressed with IJG QF=99 or 100, and Photoshop QF from 90 to 100. ADVANTAGES OF PROPOSED SYSTEM:  Show that high-quality compressed images.  Experiments show that high-quality compressed images are common on the Internet, and our method is effective to identify them. Besides, our method is robust to small image size and color sub-sampling in chrominance channels.  The proposed method can be applied to Internet image classification and forgery detection with relatively accurate results.  We show that our method outperforms the previous methods by a large margin for high-quality JPEG compressed images which are common on the Internet and present a challenge for identifying their compression history.
  • 6.  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : MATLAB  Tool : MATLAB R2013A REFERENCE: Bin Li, Member, IEEE, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Member, IEEE, and Jiwu Huang, Senior Member, IEEE, “Revealing the Trace of High- Quality JPEG Compression Through Quantization Noise Analysis”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 3, MARCH 2015.