A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Illuminant-based Transformed Spaces for Image Forensics
[article]
2016
Figshare
Instructions for downloading database and source code associated with the paper "Illuminant-based Transformed Spaces for Image Forensics" ...
To extract image descriptors from illuminant maps (IIC and GGE) of all of the images into ./database/images/ folder, for an specific descriptor, execute the function . ...
Before to be continues point the steps to extract image descriptors from your illuminant maps, it is necessary to highlight that, for each image in your data, you need to provide a .txt file with the same ...
doi:10.6084/m9.figshare.1593104.v4
fatcat:ctod7jpafjflxcl3tzl2nrlp3m
Illuminant-Based Transformed Spaces for Image Forensics
2016
IEEE Transactions on Information Forensics and Security
In this paper, we explore transformed spaces, represented by image illuminant maps, to propose a methodology for selecting complementary forms of characterizing visual properties for an effective and automated ...
We focus on detecting image forgeries containing people and present a method for locating the forgery, specifically, the face of a person in an image. ...
Illuminant-Based Transformed Spaces for Image Forensics This verification might be as simple as checking whether an image has been touched up for exhibition improvement purposes (e.g., brightness or contrast ...
doi:10.1109/tifs.2015.2506548
fatcat:rqhnm6y2uzfd5gtud4chdsbjoa
Illuminant-based Transformed Spaces for Image Forensics
[article]
2015
Figshare
Instructions for downloading database and source code associated with the paper "Illuminant-based Transformed Spaces for Image Forensics" ...
Before to be continues point the steps to extract image descriptors from your illuminant maps, it is necessary to highlight that, for each image in your data, you need to provide a .txt file with the same ...
In addition to all datasets, we are also providing all the illuminant maps (calculated from IIC and GGE method) and the faces positions and labels for each image inside the dataset. ...
doi:10.6084/m9.figshare.1593104.v3
fatcat:ip4qsvs2bngrfjgjsksbv6d2ru
Exposing Digital Image Forgeries by Illumination Color Classification
English
2014
International Journal of Engineering Trends and Technoloy
English
In this work, we make an significant step towards reducing user interaction for an illuminant-based tampering decision making. ...
Initially we identify the illuminant map in the image. We find the face from the photography. For the face detect here we use the violo john method. ...
RELATED WORK Illumination-based approaches for forgery detection are either color-based or geometry-based. ...
doi:10.14445/22315381/ijett-v18p255
fatcat:ejh46ufbongdbfq3lp643tmpyu
Scene Illumination as an Indicator of Image Manipulation
[chapter]
2010
Lecture Notes in Computer Science
The goal of blind image forensics is to distinguish original and manipulated images. We propose illumination color as a new indicator for the assessment of image authenticity. ...
Experiments show that these illumination maps provide a useful and very general forensics tool for the analysis of color images. ...
Illuminant Color for Image Forensics Once the illuminant color estimates for the user-annotated regions are computed, the whole image can be examined for illumination color inconsistencies, as described ...
doi:10.1007/978-3-642-16435-4_6
fatcat:cqndxtqblvgijdb6apepn6l5mm
Exposing Digital Image Forgeries by Illumination Color Classification using Sift Algorithm
2017
International Journal of Computer Applications
For implementation of this both IE we make use scale invariant feature transform(SIFT)algorithm in Matlab programming language. ...
To achieve this, we incorporate information from "physics" and "statistical-based" illuminant estimators on image regions of similar material. ...
Illumination-based methods for forgery detection are either geometry-based or color-based. ...
doi:10.5120/ijca2017915436
fatcat:hewnzs6tuvdadmwz7n77heax4a
Detecting Image Forgery Based On Color Phenomenology
2019
Computer Vision and Pattern Recognition
We propose White Point-Illuminant Consistency (WPIC) algorithm that detects manipulations in images based on the phenomenology of color. ...
In manipulated images, the chromaticity coordinates will have a shifted illuminant color relative to the EXIF-reported white point. ...
We thank the authors of [5] for providing access to the DSO-1 dataset. ...
dblp:conf/cvpr/StantonHM19
fatcat:kxq7ke2gtfcdri43hadwvs4snq
A Survey on Heterogeneous Face Recognition: Sketch, Infra-red, 3D and Low-resolution
[article]
2014
arXiv
pre-print
Moreover, we offer a detailed account of datasets and benchmarks commonly used for evaluation. We finish by assessing the state of the field and discussing promising directions for future research. ...
In the LRBP framework, face images are first transformed into Radon space, then transformed face images are encoded by Local Binary Pattern (LBP). ...
In matching across resolution, existing approaches can be categorized into synthesis based and projection-based. Synthesis based approaches, attempt to transform LR into HR images for matching. ...
arXiv:1409.5114v2
fatcat:pytctlmtonf6bhb4z3pszxoove
A survey on heterogeneous face recognition: Sketch, infra-red, 3D and low-resolution
2016
Image and Vision Computing
Moreover, we offer a detailed account of datasets and benchmarks commonly used for evaluation. We finish by assessing the state of the field and discussing promising directions for future research. ...
Relative Geometry [6] Global Holistic Whole image [7, 8, 9] Whole image [10, 11, 12] Whole image [13, 14, 15] Whole image [16, 17, 18] Whole image [19, 20, 21] Whole image [17, 22, 23] Whole image with ...
In the LRBP framework, face images are first transformed into Radon space, then transformed face images are encoded by Local Binary Pattern (LBP). ...
doi:10.1016/j.imavis.2016.09.001
fatcat:hy666szkk5bgfoazyxgwy6hli4
A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection
SIFT 기반 카피-무브 위조 검출에 대한 타켓 카운터-포렌식 기법
2014
KIPS Transactions on Computer and Communication Systems
SIFT 기반 카피-무브 위조 검출에 대한 타켓 카운터-포렌식 기법
The Scale Invariant Feature Transform (SIFT) has been widely used in a lot of applications for image feature matching. ...
In this paper, we propose a targeted counter-forensics method for impeding SIFT-based copy-move forgery detection by applying a semantically admissible distortion in the processing tool. ...
[8] , keypoints and features based on the scale invariant feature transform [9] are used to account for illumination changes in the detection of copy-move region duplication. ...
doi:10.3745/ktccs.2014.3.5.163
fatcat:djo2bv2cqrbr7ikplp62t2vc5i
Deep Metric Color Embeddings for Splicing Localization in Severely Degraded Images
[article]
2022
arXiv
pre-print
As such, this work resides at the intersection of physics-based and statistical forensics with benefits from both sides. ...
One common task in image forensics is to detect spliced images, where multiple source images are composed to one output image. ...
Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. ...
arXiv:2206.10737v1
fatcat:xjklwkjdvfanbm34ubcrh6ur6y
Pose Variability Compensation Using Projective Transformation for Forensic Face Recognition
2015
2015 International Conference of the Biometrics Special Interest Group (BIOSIG)
We evaluate the influence of this projective transformation over a baseline system based on principal component analysis and support vector machines (PCA-SVM) for the SCface database. ...
This paper proves the value of the projective transformation as a simple tool to compensate the pose distortion present in surveillance images in forensic scenarios. ...
This fact leads to images with any kind of variation: illumination, pose, expression, occlusion etc. ...
doi:10.1109/biosig.2015.7314615
dblp:conf/biosig/Gonzalez-SosaVF15
fatcat:i2uvtq5rkbe4tfvsrbsohmt7bi
Face Matching and Retrieval in Forensics Applications
2012
IEEE Multimedia
Acknowledgments We thank Shengcai Liao for providing facial- ...
Variations in the feature space alter the facial texture, shape, pose, and the 3D illumination model. ...
Park and Jain developed an automatic facialmark detection method based on the Laplacian of Gaussian operator, r 2 G(x, y, s), in scale space. 11 A scale-space representation, D(x, y, s), is obtained by ...
doi:10.1109/mmul.2012.4
fatcat:nugt44q43ndkzajxvgvj567x64
An Image Forgery Detection using SIFT-PCA
2020
International Journal of Engineering Research and
The SIFT (Scale Invariant Feature Transform) algorithm is used for extracting the invariant features from an image and then extract blocks by using PCA. ...
Copy-move Image Forgery Detection is one of the forensic techniques in which selected area of an image is get copied and then moved onto the other portion of the image. ...
LITERATURE SURVEY In [2] , author has proposed new methodology based on Transform Invariant Features. The main is based on MPEG-7 image signature tools that forms a part of MPEG-7 standard. ...
doi:10.17577/ijertv9is060127
fatcat:acp3vmm3ovbn3jjdw2nxrnerby
Forensic Detection of Digital Image Tampering Using Statistical Analysis
2020
Zenodo
On the other hand, for this reason digital image forensics has emerged as a new research field that aims to reveal tampering operations in digital images and to verify images authenticity. ...
One of the primary goals of digital image forensics is to identify images and image regions which have undergone some form of manipulation or alteration. ...
Image forensic methods can be divided into only two simple categories: semantics-based detection and nonsemantics-based detection. ...
doi:10.5281/zenodo.4130382
fatcat:fge5ohafybbtnma4ckcchpzg5a
« Previous
Showing results 1 — 15 out of 6,387 results