Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (11): 3609-3620.DOI: 10.11772/j.issn.1001-9081.2024111614

• Cyber security • Previous Articles    

Review of JPEG recompression forensics for color images

Hao WANG1, Jinwei WANG1,2, Xin CHENG3(), Jiawei ZHANG4, Hao WU5, Xiangyang LUO5, Bin MA6   

  1. 1.School of Automation,Nanjing University of Science and Technology,Nanjing Jiangsu 210094,China
    2.College of Cryptology and Cyber Science,Nankai University,Tianjin 300350,China
    3.School of Computer Science,Cyber Science and Engineering,Nanjing University of Information Science and Technology,Nanjing Jiangsu 210044,China
    4.School of Cyber Security and Information Law,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
    5.State Key Laboratory of Mathematical Engineering and Advanced Computing (Information Engineering University),Zhengzhou Henan 450001,China
    6.School of Cyber Security,Qilu University of Technology,Jinan Shandong 250353,China
  • Received:2024-11-13 Revised:2024-12-06 Accepted:2024-12-20 Online:2025-01-03 Published:2025-11-10
  • Contact: Xin CHENG
  • About author:WANG Hao, born in 1995, Ph. D., lecturer. His research interests include information security, JPEG compression forensics.
    WANG Jinwei, born in 1978, Ph. D., professor. His research interests include artificial intelligence security, multimedia forensics.
    ZHANG Jiawei, born in 1996, Ph. D., lecturer. His research interests include adversarial sample forensics, JPEG compression forensics.
    WU Hao, born in1999, Ph. D. candidate. His research interests include adversarial sample forensics, JPEG compression forensics.
    LUO Xiangyang, born in 1978, Ph. D., professor. His research interests include image steganography, steganalysis.
    MA Bin, born in 1973, Ph. D., professor. His research interests include reversible information hiding, multimedia forensics, steganography and steganalysis.
  • Supported by:
    National Natural Science Foundation of China(62472229);Postgraduate Research and Practice Innovation Program of Jiangsu Province(KYCX24_1513);Open Foundation of the State Key Laboratory of Tibetan Intelligent Information Processing and Application(Key Laboratory of Tibetan Information Processing, Ministry of Education)(2024-Z-003)

彩色图像JPEG重压缩取证综述

王昊1, 王金伟1,2, 程鑫3(), 张家伟4, 吴昊5, 罗向阳5, 马宾6   

  1. 1.南京理工大学 自动化学院,南京 210094
    2.南开大学 网络空间安全学院,天津 300350
    3.南京信息工程大学 计算机学院、网络空间安全学院,南京 210044
    4.重庆邮电大学 网络空间安全与信息法学院,重庆 400065
    5.数学工程与先进计算国家重点实验室(信息工程大学),郑州 450001
    6.齐鲁工业大学 网络空间安全学院,济南 250353
  • 通讯作者: 程鑫
  • 作者简介:王昊(1995—),男,江苏连云港人,讲师,博士,主要研究方向:信息安全、JPEG压缩取证
    王金伟(1978—),男,山东烟台人,教授,博士,主要研究方向:人工智能安全、多媒体取证
    张家伟(1996—),男,江苏南京人,讲师,博士,主要研究方向:对抗样本取证、JPEG压缩取证
    吴昊(1999—),男,江苏南京人,博士研究生,主要研究方向:对抗样本取证、JPEG压缩取证
    罗向阳(1978—),男,湖北荆门人,教授,博士,主要研究方向:图像隐写、隐写分析
    马宾(1973—),男,山东济南人,教授,博士,主要研究方向:可逆信息隐藏、多媒体取证、隐写与隐写分析。
  • 基金资助:
    国家自然科学基金资助项目(62472229);江苏省研究生研究与实际创新项目(KYCX24_1513);省部共建藏语智能信息处理及应用国家重点实验室(藏文信息处理教育部重点实验室)开放课题(2024-Z-003)

Abstract:

The JPEG (Joint Photographic Experts Group) compression is one of the most widely used image compression standards and is involved in various forensic scenarios and security models such as image operation chain forensics, image source forensics, steganography, steganalysis, and JPEG anti-forensics. Researchers have conducted extensive studies on JPEG recompression forensics based on the characteristics of JPEG images, discovering that it not only provides prior knowledge for image forensics but also can be directly applied in forensic scenarios. Therefore, JPEG recompression forensics for color images was reviewed. Firstly, the research background of recompression forensics was introduced, and recompression forensics were classified into three types: non-aligned, aligned asynchronous, and aligned synchronous. Secondly, the basic knowledge required for recompression forensics was detailed, including the JPEG compression process, convergence error, error images, and algorithm evaluation metrics. Furthermore, existing methods for each type of problem were thoroughly reviewed and systematized. Additionally, since fields such as image steganography and adversarial examples involved robustness studies related to JPEG recompression, the applications of JPEG recompression features in these domains were highlighted, and common algorithms were compared to summarize their advantages and disadvantages. Finally, open challenges and future research directions in JPEG recompression forensics were discussed.

Key words: digital forensics, JPEG recompression forensics, JPEG compression process, error image, convergence error

摘要:

JPEG(Joint Photographic Experts Group)压缩是当前应用最为广泛的图像压缩标准之一,它涉及诸如图像操作链取证、图像源取证、隐写与隐写分析和JPEG反取证等多种取证场景和安全模型。研究者针对JPEG图像特性开展了诸多有关JPEG重压缩取证的研究,发现JPEG重压缩取证不仅为图像取证提供先验知识,也可以直接应用到取证场景中。因此,对彩色图像JPEG重压缩取证进行综述。首先,介绍了重压缩取证的研究背景,并将重压缩取证分成了非对齐、对齐异步和对齐同步3种重压缩问题;其次,详细介绍了JPEG压缩的流程、收敛误差、误差图像、算法评价指标等用于重压缩取证的基础知识;再次,对每类问题的现有方法进行了详细的介绍和梳理。此外,由于图像隐写、对抗样本等都涉及关于JPEG重压缩的鲁棒性研究,因此,列举了JPEG重压缩特征特性在上述领域中的应用,并选取了常见的算法进行对比,总结归纳它们的优缺点。最后,展望了JPEG重压缩取证中有待进一步解决的问题和发展趋势。

关键词: 数字取证, JPEG重压缩取证, JPEG压缩流程, 误差图像, 收敛误差

CLC Number: