Skip to main content
Figure 10 | EURASIP Journal on Advances in Signal Processing

Figure 10

From: Detection of shifted double JPEG compression by an adaptive DCT coefficient model

Figure 10

Tampering detection results using our approach compared with two recent state-of-the-art approaches. (a) Another example of JPEG image forgery. (b) Ground truth of (a), the tampered region are bounded by the highlighted contour. (c1 to c3) Tampered region detection by Bianchi I's method with {QF1,QF2} = (c1) {50,90}, (c2) {50,70}, (c3) {50,50}, respectively. (d1 to d3) Tampered region detection by Bianchi II's method with {QF1,QF2} = (d1) {50,90}, (d2) {50,70}, (d3) {50,50}, respectively. (e1 to e3) Tampering region detection by the proposed method with {QF1,QF2} = (e1) {50,90}, (e2) {50,70}, (e3) {50,50}, respectively.

Back to article page