{"id":"https://openalex.org/W4308237011","doi":"https://doi.org/10.1109/icip46576.2022.9897697","title":"AI-Based Compression: A New Unintended Counter Attack on JPEG-Related Image Forensic Detectors?","display_name":"AI-Based Compression: A New Unintended Counter Attack on JPEG-Related Image Forensic Detectors?","publication_year":2022,"publication_date":"2022-10-16","ids":{"openalex":"https://openalex.org/W4308237011","doi":"https://doi.org/10.1109/icip46576.2022.9897697"},"language":"en","primary_location":{"id":"doi:10.1109/icip46576.2022.9897697","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icip46576.2022.9897697","pdf_url":null,"source":{"id":"https://openalex.org/S4363607719","display_name":"2022 IEEE International Conference on Image Processing (ICIP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Image Processing (ICIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043907590","display_name":"Alexandre Berthet","orcid":"https://orcid.org/0000-0002-0594-6327"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Alexandre Berthet","raw_affiliation_strings":["EURECOM,Digital Security,Biot,France","Digital Security, EURECOM, Biot, France"],"affiliations":[{"raw_affiliation_string":"EURECOM,Digital Security,Biot,France","institution_ids":["https://openalex.org/I1902872"]},{"raw_affiliation_string":"Digital Security, EURECOM, Biot, France","institution_ids":["https://openalex.org/I1902872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055361726","display_name":"Jean\u2010Luc Dugelay","orcid":"https://orcid.org/0000-0003-3151-4330"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Luc Dugelay","raw_affiliation_strings":["EURECOM,Digital Security,Biot,France","Digital Security, EURECOM, Biot, France"],"affiliations":[{"raw_affiliation_string":"EURECOM,Digital Security,Biot,France","institution_ids":["https://openalex.org/I1902872"]},{"raw_affiliation_string":"Digital Security, EURECOM, Biot, France","institution_ids":["https://openalex.org/I1902872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5043907590"],"corresponding_institution_ids":["https://openalex.org/I1902872"],"apc_list":null,"apc_paid":null,"fwci":0.3581,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.6767899,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"3426","last_page":"3430"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.8118056058883667},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7600429654121399},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6919536590576172},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6419028043746948},{"id":"https://openalex.org/keywords/lossless-jpeg","display_name":"Lossless JPEG","score":0.6119073033332825},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.582156777381897},{"id":"https://openalex.org/keywords/compression-artifact","display_name":"Compression artifact","score":0.5482257008552551},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.525281548500061},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.5243527889251709},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.5212265253067017},{"id":"https://openalex.org/keywords/jpeg-2000","display_name":"JPEG 2000","score":0.49668389558792114},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.46727192401885986},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.4187878966331482},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.38350895047187805},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.25541746616363525},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08651408553123474}],"concepts":[{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.8118056058883667},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7600429654121399},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6919536590576172},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6419028043746948},{"id":"https://openalex.org/C8384606","wikidata":"https://www.wikidata.org/wiki/Q2190356","display_name":"Lossless JPEG","level":5,"score":0.6119073033332825},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.582156777381897},{"id":"https://openalex.org/C57654395","wikidata":"https://www.wikidata.org/wiki/Q1097775","display_name":"Compression artifact","level":5,"score":0.5482257008552551},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.525281548500061},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.5243527889251709},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.5212265253067017},{"id":"https://openalex.org/C69216139","wikidata":"https://www.wikidata.org/wiki/Q931783","display_name":"JPEG 2000","level":5,"score":0.49668389558792114},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.46727192401885986},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.4187878966331482},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.38350895047187805},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.25541746616363525},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08651408553123474},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icip46576.2022.9897697","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icip46576.2022.9897697","pdf_url":null,"source":{"id":"https://openalex.org/S4363607719","display_name":"2022 IEEE International Conference on Image Processing (ICIP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Image Processing (ICIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W200526583","https://openalex.org/W1985729543","https://openalex.org/W1994743750","https://openalex.org/W2050991548","https://openalex.org/W2055745001","https://openalex.org/W2071018220","https://openalex.org/W2093512257","https://openalex.org/W2169439181","https://openalex.org/W2531817238","https://openalex.org/W2618530766","https://openalex.org/W2743750471","https://openalex.org/W2785562966","https://openalex.org/W2891698925","https://openalex.org/W2895286859","https://openalex.org/W2909929587","https://openalex.org/W2963149687","https://openalex.org/W2964098744","https://openalex.org/W3012651334","https://openalex.org/W3014641072","https://openalex.org/W3014840603","https://openalex.org/W3113800003","https://openalex.org/W3197106219","https://openalex.org/W4212774754","https://openalex.org/W6780365925"],"related_works":["https://openalex.org/W3190486427","https://openalex.org/W4243959093","https://openalex.org/W1998280942","https://openalex.org/W1992410481","https://openalex.org/W2441603424","https://openalex.org/W2026465795","https://openalex.org/W2145138541","https://openalex.org/W2132503095","https://openalex.org/W1996073382","https://openalex.org/W3137515556"],"abstract_inverted_index":{"The":[0,114,178],"detection":[1,70,201],"of":[2,18,55,64,71,88],"forged":[3,39],"images":[4],"is":[5,76,102,116,180,231],"an":[6,77,144],"important":[7,78],"topic":[8,79],"in":[9,61,91,214,242],"digital":[10,110],"image":[11,28,82,92,111,130,203,207,226,246],"forensics.":[12],"There":[13],"are":[14,25],"two":[15],"main":[16],"types":[17],"forgery:":[19],"copy-move":[20,158],"and":[21,46,148,157,171,189,202],"splicing.":[22],"These":[23],"forgeries":[24],"created":[26],"with":[27,109],"editors":[29],"that":[30,58,153],"apply":[31],"JPEG":[32,66,73,172],"compression":[33,51,74,95,108,121,146,230],"by":[34],"default,":[35],"when":[36],"saving":[37],"the":[38,44,62,69,86,103,139,149,198],"images.":[40],"As":[41],"a":[42,124,212,232],"result,":[43],"authentic":[45],"falsified":[47],"areas":[48],"have":[49,97],"different":[50,175,183],"statistics,":[52],"including":[53],"histograms":[54],"DCT":[56],"coefficients":[57],"show":[59],"inconsistencies":[60],"case":[63],"double":[65,72],"compression.":[67],"Therefore,":[68],"(DJPEG-C)":[75],"for":[80,128],"JPEG-related":[81,129],"forensic":[83,131,247],"detectors.":[84,132,248],"Since":[85],"emergence":[87],"deep":[89],"learning":[90],"processing,":[93],"AI-based":[94,107,120,145,170,209,229],"methods":[96],"been":[98],"proposed.":[99],"This":[100],"paper":[101],"first":[104],"to":[105,117,142,193],"consider":[106],"analysis":[112],"tools.":[113],"objective":[115],"understand":[118],"whether":[119],"can":[122,237],"be":[123,240],"new":[125,233],"unintended":[126,234],"counter-attack":[127],"To":[133],"verify":[134],"our":[135,164],"hypothesis,":[136],"we":[137],"selected":[138],"best":[140],"detector":[141],"date,":[143],"method":[147],"Casia":[150],"v2":[151],"database":[152],"contains":[154],"both":[155,197],"splicing":[156],"(all":[159],"publicly":[160],"available).":[161],"We":[162],"focused":[163],"experiment":[165],"on":[166,200,245],"benign":[167],"post-processing":[168],"operations:":[169],"recompressions":[173],"(with":[174],"quality":[176],"levels).":[177],"evaluation":[179],"performed":[181],"using":[182],"metrics":[184],"(average":[185],"precision,":[186],"F1":[187],"score":[188],"accuracy,":[190],"PSNR,":[191],"SSIM)":[192],"take":[194],"into":[195],"account":[196],"impact":[199],"quality.":[204,227],"At":[205],"similar":[206],"quality,":[208],"recompression":[210],"achieves":[211],"decrease":[213],"performance":[215],"at":[216],"least":[217],"twice":[218],"higher":[219],"than":[220],"JPEG,":[221],"while":[222],"preserving":[223],"high":[224],"visual":[225],"Thus,":[228],"counter-attack,":[235],"which":[236],"no":[238],"longer":[239],"ignored":[241],"future":[243],"studies":[244]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
