Export file:


  • RIS(for EndNote,Reference Manager,ProCite)
  • BibTex
  • Text


  • Citation Only
  • Citation and Abstract

JPEG compression history detection based on detail deviation

1 School of Information and Communication Engineering, Dalian University of Technology, Dalian, 116024, China
2 School of Psychology, Liaoning Normal University, Dalian, 116029, China
3 Department of Data Science and Engineering, Zhejiang University, Hangzhou, 310007, China

Special Issues: Information Multimedia Hiding & Forensics based on Intelligent Devices

The authenticity of the image is crucial to many cases. The efficient detection of the JPEG compression history of bitmap image could reveal the possibility of tampering on the image. In this paper, we propose a lightweight but reliable JPEG compression detection method based on image information loss. An efficient feature of the decreasing percentage of zero coefficient is proposed to detect the JPEG compression history of an image, due to the increasing JPEG compression quality factor. In our method, estimated original images are first created. Then the given image and its estimated counterpart are compressed to get the JPEG coefficient. After that, the image information loss will be calculated. Through the analysis, the goal of the compression history detection can be achieved. Extensive experimental results have demonstrated that the proposed method outperforms the existing methods.
  Article Metrics

Keywords compression history; bitmap; image information loss; JPEG coefficient

Citation: Bo Wang, Yabin Li, Jianxiang Zhao, Xue Sui, Xiangwei Kong. JPEG compression history detection based on detail deviation. Mathematical Biosciences and Engineering, 2019, 16(5): 5584-5594. doi: 10.3934/mbe.2019277


  • 1. T. H. Thai, R. Cogranne, F. Retraint, et al., JPEG quantization step estimation and its applications to digital image forensics, IEEE T. Inf. Foren. Sec., 12 (2017), 123–133.
  • 2. F. L. Hernández, E. G. de Ory, S. R. Aguilar, et al., Residue properties for the arithmetical estimation of the image quantization table, Appl. Soft Comput., 67 (2018), 309–321.
  • 3. Z. Fan and R. L. De Queiroz, Identification of bitmap compression history: JPEG detection and quantizer estimation, IEEE T. Image Process., 12 (2003), 230–235.
  • 4. J. Yang, G. Zhu, J. Huang, et al., Estimating JPEG compression history of bitmaps based on factor histogram, Digit. Signal Process., 41 (2015), 90–97.
  • 5. R. Zhang, R. D. Wang, L. J. Guo, et al., High-quality JPEG compression history detection for fake uncompressed images, J. Electron. Imaging, 26 (2017), 033028.
  • 6. J. Krommweh, Tetrolet transform: A new adaptive Haar wavelet algorithm for sparse image representation, J. Vis. Commun. Image R., 21 (2010), 364–374.
  • 7. J. Y. Lee and H. W. Park, A rate control algorithm for DCT-based video coding using simple rate estimation and linear source model, IEEE T. Circ. Syst. Vid., 15 (2005), 1077–1085.
  • 8. J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in International Workshop on Information Hiding, Springer, 2004, 67–81.
  • 9. J. Fridrich, M. Goljan, D. Hogea, et al., Quantitative steganalysis of digital images: estimating the secret message length, Multimed. Syst., 9 (2003), 288–302.
  • 10. D. Fu, Y. Q. Shi and W. Su, A generalized Benford's law for JPEG coefficients and its applications in image forensics, in Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, International Society for Optics and Photonics, 2007, 65051L.
  • 11. Y. Ma, X. Luo, X. Li, et al., Selection of rich model steganalysis features based on decision rough set α-positive region reduction, IEEE T. Circ. Syst. Vid., 29 (2019), 336–350.
  • 12. W. Luo, J. Huang and G. Qiu, JPEG error analysis and its applications to digital image forensics, IEEE T. Inf. Foren. Sec., 5 (2010), 480–491.


Reader Comments

your name: *   your email: *  

© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)

Download full text in PDF

Export Citation

Copyright © AIMS Press All Rights Reserved