detection of quantization artifacts and its applications to transform encoder identification
文献类型:期刊论文
作者 | Luo Weiqi ; Wang Yuangen ; Huang Jiwu |
刊名 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
![]() |
出版日期 | 2010 |
卷号 | 5期号:4页码:810-815 |
关键词 | Digital image forensics quantization artifacts source encoder identification |
ISSN号 | 1556-6013 |
学科主题 | Computer Science, Theory & Methods; Engineering, Electrical & Electronic |
收录类别 | SCI,EI,ACM |
语种 | 英语 |
公开日期 | 2011-05-23 |
附注 | Quantization is one of the commonly used techniques in most lossy image source encoders. It is observed that the quantization operation usually introduces some obvious artifacts into the histogram of the corresponding transform coefficients under various compression schemes. By investigating such inherent artifacts over all candidate transform coefficients, it is possible to identify the transform, as well as some parameters previously employed in the transform-based encoder from a decompressed image. In this paper, we first analyze the properties of the quantized coefficients and present a simple yet effective way to detect the quantization artifacts, and then we propose an approach to identify the transform-based encoder based on the quantization artifacts detection. The simulation results evaluated on thousands of natural images with some popular compression schemes demonstrate the effectiveness of our method. |
源URL | [http://124.16.136.157/handle/311060/9696] ![]() |
专题 | 软件研究所_软件所图书馆_期刊论文 |
推荐引用方式 GB/T 7714 | Luo Weiqi,Wang Yuangen,Huang Jiwu. detection of quantization artifacts and its applications to transform encoder identification[J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,2010,5(4):810-815. |
APA | Luo Weiqi,Wang Yuangen,&Huang Jiwu.(2010).detection of quantization artifacts and its applications to transform encoder identification.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,5(4),810-815. |
MLA | Luo Weiqi,et al."detection of quantization artifacts and its applications to transform encoder identification".IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 5.4(2010):810-815. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。