A CONVOLUTIVE MIXING MODEL FOR SHIFTED DOUBLE JPEG COMPRESSION WITH APPLICATION TO PASSIVE IMAGE AUTHENTICATION Zhenhua Qu, Weiqi Luo, Jiwu Huang Guangdong Key Lab. of Information Security Technology Sun Yat-Sen University, Guangzhou, China, 510275 ABSTRACT The artifacts by JPEG recompression have been demonstrated to be useful in passive image authentication. In this paper, we focus on the shifted double JPEG problem, aiming at identi- fying if a given JPEG image has ever been compressed twice with inconsistent block segmentation. We formulated the shifted double JPEG compression (SD-JPEG) as a noisy convolu- tive mixing model mostly studied in blind source separation (BSS). In noise free condition, the model can be solved by directly applying the independent component analysis (ICA) method with minor constraint to the contents of natural im- ages. In order to achieve robust identication in noisy condi- tion, the asymmetry of the independent value map (IVM) is exploited to obtain a normalized criteria of the independency. We generate a total of 13 features to fully represent the asym- metric characteristic of the independent value map and then feed to a support vector machine (SVM) classier. Experi- ment results on a set of 1000 images, with various parameter settings, demonstrated the effectiveness of our method. Index TermsImage Forgery, Shifted Double JPEG, Con- volutive Mixing Model, ICA, Image Authentication 1. INTRODUCTION With the rapid advancement in digital image editing software, the verication the trustworthy of a given digital image is re- ceiving increasing concerns, especially in the legal system and journalism. The traditional approach of image authen- tication is to use digital signature and digital watermarking. However, these two methods will fail if the signature or wa- termark is not employed prior to the malicious editing of the untampered image. Recently, some researchers tried to ad- dress a new approach, called the Passive Image Authentica- tion which only uses the characteristic from the forgery/fake images to gure them out. Some pioneer works are done by Farid et al. and Fridrich et al. [1][2]. The JPEG recompression artifacts is one kind of those im- portant characteristics. It is unlikely for an ordinary JPEG This work is supported by NSFC (90604008, 60633030), NSF of Guang- dong (04205407), and 973 Program (2006CB303104). Contact Author (isshjw@mail.sysu.edu.cn) image/photo or a part of it to possess recompression artifacts, unless it has been opened and re-saved as JPEG format by an image editing software. Recent researches have been focusing on the Double JPEG Compression Problem 1 , which means to identify the image suffered from the lossy JPEG compres- sion twice. A possible solution for this problem presented by Lukas and Fridrich [2] is to estimate the primitive quantiza- tion table coefcients from a double compressed JPEG im- age directly. Other approaches tried to detect the abnormal DCT coefcient distribution caused by the recompression. In [1], Popescu and Farid utilized the periodical artifacts of the re-quantized DCT coefcient histogram. Fu et al. [3] con- tributed another identication algorithm based on a gener- alized Benford Law model of the blockwise discrete cosine transform (BDCT) coefcients. However the above meth- ods did not address how to determine whether a given JPEG image had been recompressed with inconsistent block seg- mentation which frequently occurs in a composite or region- duplication image. We dene the task of identifying such a JPEG recompressed image with Shifted Double JPEG (SD- JPEG) Compression Problem. He et al. [4] noticed the dif- ference between these two types of problem and utilized it to detect forgery, but they did not derive any explicit model for the SD-JPEG problem. In previous work [5], we proposed an rapid identication algorithm in spatial domain based on the symmetric charac- teristic of blocking artifact characteristics matrix (BACM). In this paper, our contribution comes in three aspects : 1) We ad- dress a statistic model in the BDCT domain for the SD-JPEG problem and give it a new insight from the direction of BSS. 2) An novel ICA-based identication algorithm utilizing the symmetric property of IVM is proposed. 3) The problem of estimating the shifted distance is also addressed here to pro- vide detailed information of how the image is recompressed. The rest of this paper is organized as follows. In Sec- tion 2, we establish a convolutive mxing model of SD-JPEG compression. Section 3 mainly discusses the identication of the model with a ICA-based method and how to estimate the shifted distance. The experiment results with comparison to 1 Other than this literal explanation, this term has a more specic meaning which stands for unshifted double JPEG compression problem in this paper. 1661 1-4244-1484-9/08/$25.00 ©2008 IEEE ICASSP 2008