Recompression of JPEG crypto-compressed images without a key

V Itier, P Puteaux, W Puech - … on Circuits and Systems for Video …, 2019 - ieeexplore.ieee.org
The rising popularity of social networks and cloud computing has greatly increased a
number of JPEG compressed image exchanges. In this context, the security of the …

Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection

SY Lai, R Böhme - 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
Repeated rounding of sample blocks in alternating domains creates complex convergence
paths. We study convergence and block stability for JPEG images compressed with quality …

JPEG-compatibility steganalysis using block-histogram of recompression artifacts

J Kodovský, J Fridrich - International Workshop on Information Hiding, 2012 - Springer
JPEG-compatibility steganalysis detects the presence of embedding changes using the fact
that the stego image was previously JPEG compressed. Following the previous art, we work …

Reconstructing compressed photo and video data

AB Lewis - 2012 - cl.cam.ac.uk
Forensic investigators sometimes need to verify the integrity and processing history of digital
photos and videos. The multitude of storage formats and devices they need to access also …

Dual JPEG Compatibility: a Reliable and Explainable Tool for Image Forensics

E Levecque, J Butora, P Bas - arXiv preprint arXiv:2408.17106, 2024 - arxiv.org
Given a JPEG pipeline (compression or decompression), this paper shows how to find the
antecedent of a 8 x 8 block. If it exists, the block is compatible with the pipeline. For …

An uncompressed benchmark image dataset for colour imaging

G Schaefer - 2010 IEEE International Conference on Image …, 2010 - ieeexplore.ieee.org
Virtually all vision and imaging applications and algorithms require validation and
evaluation, yet benchmarking and evaluation have proven to be difficult and challenging …

UCID-RAW–A colour image database in raw format

G Schaefer - VipIMAGE 2017: Proceedings of the VI ECCOMAS …, 2018 - Springer
Virtually all multimedia and imaging applications and algorithms require validation and
evaluation, yet benchmarking and evaluation have proven to be difficult and challenging …

[PDF][PDF] Survey of JPEG compression history analysis

AB Lewis - Citeseer
Survey of JPEG compression history analysis Page 1 Survey of JPEG compression history
analysis Andrew B. Lewis Computer Laboratory Topics in security – forensic signal analysis …