Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








173 Hits in 7.3 sec

Component forensics

Ashwin Swaminathan, Min Wu, K.J. Ray Liu
2009 IEEE Signal Processing Magazine  
steganalysis and for image acquisition forensic analysis is how to model the ground truth original image data.  ...  The EM algorithm generates two outputs: a two-dimensional probability map indicating the likelihood of the pixel belonging to the two models and the weighting coefficients.  ... 
doi:10.1109/msp.2008.931076 fatcat:ooopmq42iba35on2yiliiynsj4

Counter-Forensics: Attacking Image Forensics [chapter]

Rainer Böhme, Matthias Kirchner
2012 Digital Image Forensics  
, and the role of image models with regard to the epistemic underpinning of the forensic decision problem.  ...  This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images.  ...  Acknowledgements Thanks are due to Gang Cao, Thomas Gloe, and Miroslav Goljan for sharing the data of their original research papers.  ... 
doi:10.1007/978-1-4614-0757-7_12 fatcat:amg3sagivbd7ho4fgmg5yehwha

Digital image forensics via intrinsic fingerprints

Ashwin Swaminathan, Min Wu, K.J. Ray Liu
2008 IEEE Transactions on Information Forensics and Security  
This paper introduces a new methodology for the forensic analysis of digital camera images.  ...  The intrinsic fingerprints of the various in-camera processing operations can be estimated through a detailed imaging model and its component analysis.  ...  Gou for her valuable discussions and help on scanner forensics.  ... 
doi:10.1109/tifs.2007.916010 fatcat:np7jilngk5cthme3mag46s7akq

Forensic Science Research Summary for Forgery Detection of Digital Images

2020 International Journal of Engineering and Advanced Technology  
Digital image analysis includes image recovery and surveillance for image information improvement.  ...  The goal of forgery detection is to maximize the extraction of information from manipulated images, particularly noisy and post-processed images.  ...  JPEG Anti-Forensic Method: Good for identifying traces of JPEG image compression using discrete cosine transformation (DCT) domain with a reasonable loss of image quality and shows improved trade-off between  ... 
doi:10.35940/ijeat.b2563.029320 fatcat:mwjziifk3ncerodbndirvbk5aq

Information Forensics: An Overview of the First Decade

Matthew C. Stamm, Min Wu, K. J. Ray Liu
2013 IEEE Access  
The goal of this paper is to provide an overview on what has been done over the last decade in the new and emerging field of information forensics regarding theories, methodologies, state-of-the-art techniques  ...  for legitimate purposes, and to be able to forensically prove with high confidence when otherwise.  ...  This probabilistic model can be used to jointly obtain a maximum likelihood estimate of the contrast enhancement mapping used to alter an image as well as the image's pixel value histogram before contrast  ... 
doi:10.1109/access.2013.2260814 fatcat:l3hs7vh2nzakpkihwmkubh24dy

On the exploitation of DCT statistics for cropping detectors [article]

Claudio Vittorio Ragaglia, Francesco Guarnera, Sebastiano Battiato
2024 arXiv   pre-print
This work opens new perspectives in the field, with potential to transform image analysis and usage across multiple domains.  ...  image manipulations and enhancing qualitative image assessment.  ...  The work of Francesco Guarnera has been supported by MUR in the framework of PNRR PE0000013, under project "Future Artificial Intelligence Research -FAIR".  ... 
arXiv:2403.14789v1 fatcat:i3emn3fidfab7fgfsxnfpjbkna

Discrete Cosine Transform Residual Feature Based Filtering Forgery and Splicing Detection in JPEG Images

Aniket Roy, Diangarti Bhalang Tariang, Rajat Subhra Chakraborty, Ruchira Naskar
2018 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)  
Filtering forgery detection and splicing detection are two of the most important problems in digital image forensics.  ...  Digital images are one of the primary modern media for information interchange.  ...  Hence, detection of whether an image had undergone such filtering enhancement is important for forensic analysis, and complements the content forgery detection techniques (e.g. those that detect copy-move  ... 
doi:10.1109/cvprw.2018.00205 dblp:conf/cvpr/RoyTCN18 fatcat:l2be5q44qjbmlpbcwg44shl56e

Recent Advances in Digital Image and Video Forensics, Anti-forensics and Counter Anti-forensics [article]

Maryam Al-Fehani, Saif Al-Kuwari
2024 arXiv   pre-print
Image and video forensics have recently gained increasing attention due to the proliferation of manipulated images and videos, especially on social media platforms, such as Twitter and Instagram, which  ...  We therefore further cover both anti-forensics and counter anti-forensics techniques in image and video. Finally, we conclude this survey by highlighting some open problems in this domain.  ...  Additionally, the authors in [206] proposed an algorithm based on the analysis of DCT coefficients that can detect multiple JPEG compressions to determine forgeries.  ... 
arXiv:2402.02089v1 fatcat:sugmqvnwz5f47j5gtz7xm2f4ma

Machine Learning Techniques for Image Forensics in Adversarial Setting

Ehsan Nowroozi, Mauro Barni, Benedetta Tondi
2020 Zenodo  
By focusing on Image Forensics and image manipulation detection, in particular, this thesis contributes to the above mission by developing novel techniques for enhancing the security of binary manipulation  ...  The analysis of the security of machine learning-based techniques in the presence of an adversary attempting to impede the forensic analysis, and the development of new solutions capable to improve the  ...  Prior Art on ML-Based Image Forensics 27 DCT coefficients.  ... 
doi:10.5281/zenodo.4559666 fatcat:itun24lqq5blxfrvmg67pa7ddq

Image anonymization for PRNU forensics: A set theoretic framework addressing compression resilience

Ahmed Elliethy, Gaurav Sharma
2016 2016 IEEE International Conference on Image Processing (ICIP)  
A feasible anonymized image is then obtained via the method of projections onto convex sets using the inherent convexity of several constraints and convex approximations for the others.  ...  Image forensics using sensor photo-response nonuniformity (PRNU) provides a powerful method for associating an image with the camera that captured the image.  ...  Several counter-forensics measures have previously been proposed against PRNU forensics for both image anonymization and for false-attribution via PRNU copy attack [5, 6] .  ... 
doi:10.1109/icip.2016.7533092 dblp:conf/icip/ElliethyS16 fatcat:xvbwfa6zxrbvfnfb3blxxuibpe

Robust Median Filtering Forensics Using Image Deblocking and Filtered Residual Fusion

WuYang Shan, YaoHua Yi, JunYing Qiu, AiGuo Yin
2019 IEEE Access  
First, relying on the analysis of the influence on median filtered images caused by JPEG compression, we effectively suppress the interference using image deblocking.  ...  The existing MF forensic methods, however, ignore how JPEG compression affects median filtered images, resulting in heavy performance degradation when detecting filtered images stored in the JPEG format  ...  [19] used the coefficients in image frequency domain as a feature set.  ... 
doi:10.1109/access.2019.2894981 fatcat:p3c2vhdzard2ndh7kapqnk2o34

GRAFT: Unsupervised Adaptation to Resizing for Detection of Image Manipulation

Ludovic Darmet, Kai Wang, Francois Cayre
2020 IEEE Access  
A large number of methods for forensics of image manipulation relies on detecting fingerprints in residuals or noises.  ...  Adaptation is performed in an unsupervised fashion, i.e., without using any ground-truth label in the pre-resized testing domain, for the detection of image manipulation on very small patches.  ...  This will be shown to enhance both the descriptive power by maximizing the log-likelihood and the discriminative capability by choosing separate coefficients for original/manipulated classes.  ... 
doi:10.1109/access.2020.2980992 fatcat:ucx37j3pxfeenmlvyqz3mzodje

A survey of passive technology for digital image forensics

Weiqi Luo, Zhenhua Qu, Feng Pan, Jiwu Huang
2007 Frontiers of Computer Science in China  
In this paper, we will discuss this new forensics technology and give an overview of the prior literatures.  ...  This may give rise to some problems such as image authentication. A new passive technology for image forensics has evolved quickly during the last few years.  ...  Yunqing Shi for providing us some sample images from their works, and Yi Situ for proofreading the paper.  ... 
doi:10.1007/s11704-007-0017-0 fatcat:whb2wqrgijfe3oxaz6iblgnnbi

Double JPEG compression forensics based on a convolutional neural network

Qing Wang, Rong Zhang
2016 EURASIP Journal on Information Security  
Double JPEG compression detection has received considerable attention in blind image forensics. However, only few techniques can provide automatic localization.  ...  The CNN is designed to classify histograms of discrete cosine transform (DCT) coefficients, which differ between single-compressed areas (tampered areas) and double-compressed areas (untampered areas).  ...  Acknowledgements This work is supported by the National Nature Science Foundation of China under Grant No.61331020.  ... 
doi:10.1186/s13635-016-0047-y fatcat:k3tkxto23zbhfa6p2h2glddnga

Digital image forensics: a booklet for beginners

Judith A. Redi, Wiem Taktak, Jean-Luc Dugelay
2010 Multimedia tools and applications  
Nowadays, thanks to the promising results attained by early studies and to the always growing number of applications, digital image forensics represents an appealing investigation domain for many researchers  ...  Digital image forensics is a brand new research field which aims at validating the authenticity of images by recovering information about their history.  ...  The well known JPEG compression standard transforms 8x8 pixels blocks of the image in the DCT domain.  ... 
doi:10.1007/s11042-010-0620-1 fatcat:47qhse4ucrdezkxqvulmv53gui
« Previous Showing results 1 — 15 out of 173 results