A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Component forensics
2009
IEEE Signal Processing Magazine
steganalysis and for image acquisition forensic analysis is how to model the ground truth original image data. ...
The EM algorithm generates two outputs: a two-dimensional probability map indicating the likelihood of the pixel belonging to the two models and the weighting coefficients. ...
doi:10.1109/msp.2008.931076
fatcat:ooopmq42iba35on2yiliiynsj4
Counter-Forensics: Attacking Image Forensics
[chapter]
2012
Digital Image Forensics
, and the role of image models with regard to the epistemic underpinning of the forensic decision problem. ...
This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images. ...
Acknowledgements Thanks are due to Gang Cao, Thomas Gloe, and Miroslav Goljan for sharing the data of their original research papers. ...
doi:10.1007/978-1-4614-0757-7_12
fatcat:amg3sagivbd7ho4fgmg5yehwha
Digital image forensics via intrinsic fingerprints
2008
IEEE Transactions on Information Forensics and Security
This paper introduces a new methodology for the forensic analysis of digital camera images. ...
The intrinsic fingerprints of the various in-camera processing operations can be estimated through a detailed imaging model and its component analysis. ...
Gou for her valuable discussions and help on scanner forensics. ...
doi:10.1109/tifs.2007.916010
fatcat:np7jilngk5cthme3mag46s7akq
Forensic Science Research Summary for Forgery Detection of Digital Images
2020
International Journal of Engineering and Advanced Technology
Digital image analysis includes image recovery and surveillance for image information improvement. ...
The goal of forgery detection is to maximize the extraction of information from manipulated images, particularly noisy and post-processed images. ...
JPEG Anti-Forensic Method: Good for identifying traces of JPEG image compression using discrete cosine transformation (DCT) domain with a reasonable loss of image quality and shows improved trade-off between ...
doi:10.35940/ijeat.b2563.029320
fatcat:mwjziifk3ncerodbndirvbk5aq
Information Forensics: An Overview of the First Decade
2013
IEEE Access
The goal of this paper is to provide an overview on what has been done over the last decade in the new and emerging field of information forensics regarding theories, methodologies, state-of-the-art techniques ...
for legitimate purposes, and to be able to forensically prove with high confidence when otherwise. ...
This probabilistic model can be used to jointly obtain a maximum likelihood estimate of the contrast enhancement mapping used to alter an image as well as the image's pixel value histogram before contrast ...
doi:10.1109/access.2013.2260814
fatcat:l3hs7vh2nzakpkihwmkubh24dy
On the exploitation of DCT statistics for cropping detectors
[article]
2024
arXiv
pre-print
This work opens new perspectives in the field, with potential to transform image analysis and usage across multiple domains. ...
image manipulations and enhancing qualitative image assessment. ...
The work of Francesco Guarnera has been supported by MUR in the framework of PNRR PE0000013, under project "Future Artificial Intelligence Research -FAIR". ...
arXiv:2403.14789v1
fatcat:i3emn3fidfab7fgfsxnfpjbkna
Discrete Cosine Transform Residual Feature Based Filtering Forgery and Splicing Detection in JPEG Images
2018
2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
Filtering forgery detection and splicing detection are two of the most important problems in digital image forensics. ...
Digital images are one of the primary modern media for information interchange. ...
Hence, detection of whether an image had undergone such filtering enhancement is important for forensic analysis, and complements the content forgery detection techniques (e.g. those that detect copy-move ...
doi:10.1109/cvprw.2018.00205
dblp:conf/cvpr/RoyTCN18
fatcat:l2be5q44qjbmlpbcwg44shl56e
Recent Advances in Digital Image and Video Forensics, Anti-forensics and Counter Anti-forensics
[article]
2024
arXiv
pre-print
Image and video forensics have recently gained increasing attention due to the proliferation of manipulated images and videos, especially on social media platforms, such as Twitter and Instagram, which ...
We therefore further cover both anti-forensics and counter anti-forensics techniques in image and video. Finally, we conclude this survey by highlighting some open problems in this domain. ...
Additionally, the authors in [206] proposed an algorithm based on the analysis of DCT coefficients that can detect multiple JPEG compressions to determine forgeries. ...
arXiv:2402.02089v1
fatcat:sugmqvnwz5f47j5gtz7xm2f4ma
Machine Learning Techniques for Image Forensics in Adversarial Setting
2020
Zenodo
By focusing on Image Forensics and image manipulation detection, in particular, this thesis contributes to the above mission by developing novel techniques for enhancing the security of binary manipulation ...
The analysis of the security of machine learning-based techniques in the presence of an adversary attempting to impede the forensic analysis, and the development of new solutions capable to improve the ...
Prior Art on ML-Based Image Forensics
27 DCT coefficients. ...
doi:10.5281/zenodo.4559666
fatcat:itun24lqq5blxfrvmg67pa7ddq
Image anonymization for PRNU forensics: A set theoretic framework addressing compression resilience
2016
2016 IEEE International Conference on Image Processing (ICIP)
A feasible anonymized image is then obtained via the method of projections onto convex sets using the inherent convexity of several constraints and convex approximations for the others. ...
Image forensics using sensor photo-response nonuniformity (PRNU) provides a powerful method for associating an image with the camera that captured the image. ...
Several counter-forensics measures have previously been proposed against PRNU forensics for both image anonymization and for false-attribution via PRNU copy attack [5, 6] . ...
doi:10.1109/icip.2016.7533092
dblp:conf/icip/ElliethyS16
fatcat:xvbwfa6zxrbvfnfb3blxxuibpe
Robust Median Filtering Forensics Using Image Deblocking and Filtered Residual Fusion
2019
IEEE Access
First, relying on the analysis of the influence on median filtered images caused by JPEG compression, we effectively suppress the interference using image deblocking. ...
The existing MF forensic methods, however, ignore how JPEG compression affects median filtered images, resulting in heavy performance degradation when detecting filtered images stored in the JPEG format ...
[19] used the coefficients in image frequency domain as a feature set. ...
doi:10.1109/access.2019.2894981
fatcat:p3c2vhdzard2ndh7kapqnk2o34
GRAFT: Unsupervised Adaptation to Resizing for Detection of Image Manipulation
2020
IEEE Access
A large number of methods for forensics of image manipulation relies on detecting fingerprints in residuals or noises. ...
Adaptation is performed in an unsupervised fashion, i.e., without using any ground-truth label in the pre-resized testing domain, for the detection of image manipulation on very small patches. ...
This will be shown to enhance both the descriptive power by maximizing the log-likelihood and the discriminative capability by choosing separate coefficients for original/manipulated classes. ...
doi:10.1109/access.2020.2980992
fatcat:ucx37j3pxfeenmlvyqz3mzodje
A survey of passive technology for digital image forensics
2007
Frontiers of Computer Science in China
In this paper, we will discuss this new forensics technology and give an overview of the prior literatures. ...
This may give rise to some problems such as image authentication. A new passive technology for image forensics has evolved quickly during the last few years. ...
Yunqing Shi for providing us some sample images from their works, and Yi Situ for proofreading the paper. ...
doi:10.1007/s11704-007-0017-0
fatcat:whb2wqrgijfe3oxaz6iblgnnbi
Double JPEG compression forensics based on a convolutional neural network
2016
EURASIP Journal on Information Security
Double JPEG compression detection has received considerable attention in blind image forensics. However, only few techniques can provide automatic localization. ...
The CNN is designed to classify histograms of discrete cosine transform (DCT) coefficients, which differ between single-compressed areas (tampered areas) and double-compressed areas (untampered areas). ...
Acknowledgements This work is supported by the National Nature Science Foundation of China under Grant No.61331020. ...
doi:10.1186/s13635-016-0047-y
fatcat:k3tkxto23zbhfa6p2h2glddnga
Digital image forensics: a booklet for beginners
2010
Multimedia tools and applications
Nowadays, thanks to the promising results attained by early studies and to the always growing number of applications, digital image forensics represents an appealing investigation domain for many researchers ...
Digital image forensics is a brand new research field which aims at validating the authenticity of images by recovering information about their history. ...
The well known JPEG compression standard transforms 8x8 pixels blocks of the image in the DCT domain. ...
doi:10.1007/s11042-010-0620-1
fatcat:47qhse4ucrdezkxqvulmv53gui
« Previous
Showing results 1 — 15 out of 173 results