Exact JPEG recompression

نویسندگان

  • Andrew Lewis
  • Markus G. Kuhn
چکیده

We present a variant of the JPEG baseline image compression algorithm optimized for images that were generated by a JPEG decompressor. It inverts the computational steps of one particular JPEG decompressor implementation (Independent JPEG Group, IJG), and uses interval arithmetic and an iterative process to infer the possible values of intermediate results during the decompression, which are not directly evident from the decompressor output due to rounding. We applied our exact recompressor on a large database of images, each compressed at ten different quality factors. At the default IJG quality factor 75, our implementation reconstructed the exact quantized transform coefficients in 96% of the 64-pixel image blocks. For blocks where exact reconstruction is not feasible, our implementation can output transform-coefficient intervals, each guaranteed to contain the respective original value. Where different JPEG images decompress to the same result, we can output all possible bit-streams. At quality factors 90 and above, exact recompression becomes infeasible due to combinatorial explosion; but 68% of blocks still recompressed exactly.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts

JPEG-compatibility steganalysis detects the presence of embedding changes using the fact that the stego image was previously JPEG compressed. Following the previous art, we work with the difference between the stego image and an estimate of the cover image obtained by recompression with a JPEG quantization table estimated from the stego image. To better distinguish recompression artifacts from ...

متن کامل

Robust Image Authentication Method Surviving JPEG Lossy Compression

Image authentication veriies the originality of an image by detecting malicious manipulations. This goal is diierent from that of image watermarking which embeds into the image a signature surviving most manipulations. Existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some applications demand techniques that can distinguish accep...

متن کامل

A Multi-feature Based Invertible Authentication Watermarking for JPEG Images

Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this paper, we combine features (relation of coefficients) in DCT domain with content features (edges or texture) of JPEG image into multi-features, which are useful to authenticating images from both spatial and frequency do...

متن کامل

Tamper Detection Using Double Compression Jpeg Artifact-a Review

Image authentication and image tamper detection. Double JPEG compression might occur when a portion is cut from an image which may or may not be: Image tamper detection using passive-blind techniques has become a hot research field. It uses non-intrusive methods which uses image functions to detect tampering. The tampering operation changes the inherent statistical properties of an image which ...

متن کامل

Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images

A JPEG image is double-compressed if it underwent JPEG compression twice, each time with a different quantization matrix but with the same 8 × 8 grid. Some popular steganographic algorithms (Jsteg, F5, OutGuess) naturally produce such double-compressed stego images. Because double-compression may significantly change the statistics of DCT coefficients, it negatively influences the accuracy of s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010