Open Access iconOpen Access

REVIEW

crossmark

An Overview of Double JPEG Compression Detection and Anti-detection

by Kun Wan*

Nanjing University of Information Science and Technology, Nanjing, 210044, China

* Corresponding Author: Kun Wan. Email: email

Journal of Information Hiding and Privacy Protection 2022, 4(2), 89-101. https://doi.org/10.32604/jihpp.2022.039764

Abstract

JPEG (Joint Image Experts Group) is currently the most widely used image format on the Internet. Existing cases show that many tampering operations occur on JPEG images. The basic process of the operation is that the JPEG file is first decompressed, modified in the null field, and then the tampered image is compressed and saved in JPEG format, so that the tampered image may be compressed several times. Therefore, the double compression detection of JPEG images can be an important part for determining whether an image has been tampered with, and the study of double JPEG compression anti-detection can further advance the progress of detection work. In this paper, we mainly review the literature in the field of double JPEG compression detection in recent years with two aspects, namely, the quantization table remains unchanged and the quantization table is inconsistent in the double JPEG compression process, Also, we will introduce some representative methods of double JPEG anti-detection in recent years. Finally, we analyze the problems existing in the field of double JPEG compression and give an outlook on the future development direction.

Keywords


Cite This Article

APA Style
Wan, K. (2022). An overview of double JPEG compression detection and anti-detection. Journal of Information Hiding and Privacy Protection, 4(2), 89-101. https://doi.org/10.32604/jihpp.2022.039764
Vancouver Style
Wan K. An overview of double JPEG compression detection and anti-detection. J Inf Hiding Privacy Protection . 2022;4(2):89-101 https://doi.org/10.32604/jihpp.2022.039764
IEEE Style
K. Wan, “An Overview of Double JPEG Compression Detection and Anti-detection,” J. Inf. Hiding Privacy Protection , vol. 4, no. 2, pp. 89-101, 2022. https://doi.org/10.32604/jihpp.2022.039764



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 825

    View

  • 652

    Download

  • 0

    Like

Share Link