{"title":"A PSO Based Image Disguise Method","authors":"Shen Wang, X. Niu","doi":"10.1109/IBICA.2011.36","DOIUrl":null,"url":null,"abstract":"When the tampered JPEG image is saved, it was re-compressed. After double compression, the amounts of some DCT coefficient values decrease greatly. The pattern can be easily detected by statistics methods. To defend this forensic method, we established a model to evaluate the security and image quality influenced by the re-compression. Base on the model, an optimized adjustment of the DCT coefficients is achieved by PSO (Particle Swarm Optimization). Results show that the traces of double compression are removed but well preserving the image quality.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBICA.2011.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
When the tampered JPEG image is saved, it was re-compressed. After double compression, the amounts of some DCT coefficient values decrease greatly. The pattern can be easily detected by statistics methods. To defend this forensic method, we established a model to evaluate the security and image quality influenced by the re-compression. Base on the model, an optimized adjustment of the DCT coefficients is achieved by PSO (Particle Swarm Optimization). Results show that the traces of double compression are removed but well preserving the image quality.