Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,587 Hits in 5.6 sec

A Hashing Based Approach to Detect Object Tampering

Harshita Gour
2018 HELIX  
Firstly, different images of the same object are taken from different angles. Furthermore, each image of the object will then be processed to localize the region of tampering in the object.  ...  In this paper, we presented a method of object tampering detection which will generate the results showing the tampered images of the object.  ...  [1] Chi-Man Pun, Caiping Yan, and Xiao-Chen Yuan proposed a design of Image Alignment based Multi Region Matching (IAMRM) algorithm for object level tampering detection.  ... 
doi:10.29042/2018-3741-3745 fatcat:yx2htudnejgzppctqhf7np3kki

A Smart and Robust Automatic Inspection of Printed Labels Using an Image Hashing Technique

Mehshan Ahmed Khan, Fawad Ahmed, Muhammad Danial Khan, Jawad Ahmad, Harish Kumar, Nikolaos Pitropakis
2022 Electronics  
To overcome this issue, a robust image hashing approach for the detection of erroneous labels has been developed.  ...  Image hashing techniques are generally used in image authentication, social event detection and image copy detection.  ...  transformations and sensitive to detect minute level tampering.  ... 
doi:10.3390/electronics11060955 fatcat:lq6kjuneurgztml7cvnsaxewpe

Fighting Malicious Media Data: A Survey on Tampering Detection and Deepfake Detection [article]

Junke Wang, Zhenxin Li, Chao Zhang, Jingjing Chen, Zuxuan Wu, Larry S. Davis, Yu-Gang Jiang
2022 arXiv   pre-print
Accordingly, the means of defense include image tampering detection and Deepfake detection, which share a wide variety of properties.  ...  In this paper, we provide a comprehensive review of the current media tampering detection approaches, and discuss the challenges and trends in this field for future research.  ...  We particularly focus on multi-modal object editing (i.e. text-based [27] , [29] , [45] , sound-based [28] ) in this part.  ... 
arXiv:2212.05667v1 fatcat:iuqs2d3qhbay3gryewjlbk75jm

Digital Image Forgeries and Passive Image Authentication Techniques: A Survey

Saba Mushtaq, Ajaz Hussain Mir
2014 International Journal of Advanced Science and Technology  
Digital images are present everywhere on magazine covers, in newspapers, in courtrooms as evidences, and all over the Internet signifying one of the major ways for communication nowadays.  ...  Digital image forensics is the latest research field which intends to authorize the genuineness of images.  ...  This technique works well on uncompressed images and compressed highresolution images. Accuracy also depends on area of the tampered region for high-level compressed images.  ... 
doi:10.14257/ijast.2014.73.02 fatcat:r3nprjpe6je4pkc72pytsnndmy

Deep Learning Based Image Forgery Detection Methods

Liang Xiu-jian, Sun He
2022 Journal of Cyber Security  
detection method of image tampering based on deep learning. 3) This paper is driven by the needs of tampering targets, so it pays more attention to sorting out methods for different tampering detection  ...  This paper mainly sorts out the relevant knowledge and latest methods in the field of image tampering detection based on deep learning.  ...  [56] proposed a multi-task image passive forensic framework (MFCN) based on edge reinforcement for pixel-level tampered region segmentation.  ... 
doi:10.32604/jcs.2022.032915 fatcat:jneg3xibm5daxnra66f4y2ccpm

JPEG compression model in copy-move forgery detection

Adam Novozamsky, Michal Sorel
2017 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)  
We derive a JPEG-based constraint that any pair of patches must satisfy to be considered a valid candidate for tampered area.  ...  In this paper, we describe a new idea for the detection of this type of forgery in JPEG images, where the compression significantly degrades detection by popular algorithms.  ...  On the other hand, reusing the same object in one image can be detected and is what is looked for by the majority of copy-move forgery detection (CMFD) techniques.  ... 
doi:10.1109/ipta.2017.8310139 dblp:conf/ipta/NovozamskyS17 fatcat:6byyyazmvjdezatbasgfz3xz2y

Forensic Detection of Digital Image Tampering Using Statistical Analysis

Md. Zahurul Haque, Md. Mahedi Hasan
2020 Zenodo  
An efficient statistical technique have also been presented for detecting region duplication, one of the most common forgeries on digital image.  ...  On the other hand, for this reason digital image forensics has emerged as a new research field that aims to reveal tampering operations in digital images and to verify images authenticity.  ...  the image to search for clues of tampering.  ... 
doi:10.5281/zenodo.4130382 fatcat:fge5ohafybbtnma4ckcchpzg5a

Image Splicing Location Based on Illumination Maps and Cluster Region Proposal Network

Ye Zhu, Xiaoqian Shen, Shikun Liu, Xiaoli Zhang, Gang Yan
2021 Applied Sciences  
Splicing is the most common operation in image forgery, where the tampered background regions are imported from different images.  ...  Illumination maps are inherent attribute of images and provide significant clues when searching for splicing locations.  ...  Since the pristine and tampered regions are from different images, the inconsistency in illumination maps is a critical clue for splicing detection.  ... 
doi:10.3390/app11188437 fatcat:mpe43yuz7jhxzbdzxjbnomuq7e

Image Forgery Detection: A Low Computational-Cost and Effective Data-Driven Model

Thuong Le-Tien, The authors are with the Department of Electrical and Electronics Engineering, University of Technology, National University of Ho Chi Minh city, Vietnam, Hanh Phan-Xuan, Thuy Nguyen-Chinh, Thien Do-Tieu
2019 International Journal of Machine Learning and Computing  
In overall, almost conventional methods just focus on identifying specific features in tampered images, therefore, such methods cannot cover whole possible cases in reality.  ...  Nowadays, Image Forgery Detection contributes an indispensable role in digital forensics, while there are increasingly more sophisticated forgery methods.  ...  This method contains two stages, the first one detects suspect regions by searching similar blocks, and then a new method, Multi-Region Relation, is applied to identify tampered regions from output regions  ... 
doi:10.18178/ijmlc.2019.9.2.784 fatcat:rq6eqqoqvfgy7odjddekwreqja

Constrained R-CNN: A general image manipulation detection model [article]

Chao Yang, Huizhou Li, Fangting Lin, Bin Jiang, Hao Zhao
2020 arXiv   pre-print
Recently, deep learning-based models have exhibited remarkable performance for image manipulation detection.  ...  Finally, the coarse localization information guides the model to further learn the finer local features and segment out the tampered region.  ...  Sun, "A sorted neighborhood approach for detecting duplicated regions in image forgeries based on dwt and svd," in ICME, 2007, pp. 1750-1753.  ... 
arXiv:1911.08217v3 fatcat:qvlorztjtbfonj7melfypz665q

A Survey on Keypoint Based Copy-paste Forgery Detection Techniques

Anil Dada Warbhe, R.V. Dharaskar, V.M. Thakare
2016 Procedia Computer Science  
The block-based methods are good at detecting the forged regions with high accuracy but is having tremendously high computational complexity.  ...  Copy-Move forgery is the most common image tampering method to create forged images. The images may be forged to conceal or change the meaning of the photographs.  ...  The author proposed a method for detecting distinctive invariant features from images that can be later used to perform reliable matching between different views of an object or scene.  ... 
doi:10.1016/j.procs.2016.02.011 fatcat:6l2fo7ciijf3feqsscl5ayx2di

Digital Image Forensics vs. Image Composition: An Indirect Arms Race [article]

Victor Schetinger, Massimo Iuliani, Alessandro Piva, Manuel M. Oliveira
2016 arXiv   pre-print
We show that even though research in forensics seems unaware of the advanced forms of image composition, it possesses the basic tools to detect it.  ...  The field of image composition is constantly trying to improve the ways in which an image can be altered and enhanced.  ...  We also thank all the authors that provided us with images and material to perform our tests.  ... 
arXiv:1601.03239v1 fatcat:sowebdgc3bcjlgr5fmqy3zu5ba

TAMPAR: Visual Tampering Detection for Parcel Logistics in Postal Supply Chains [article]

Alexander Naumann, Felix Hertlein, Laura Dörr, Kai Furmans
2023 arXiv   pre-print
Experiments with multiple classical and deep learning-based change detection approaches are performed on our newly collected TAMpering detection dataset for PARcels, called TAMPAR.  ...  Our evaluation shows promising results for keypoint (Keypoint AP 75.76) and tampering detection (81% accuracy, F1-Score 0.83) on real images.  ...  [1] present a multi-camera system for damage and tampering detection in postal supply chains. Damages are detected by finding the parallelepiped which best aligns with the captured images.  ... 
arXiv:2311.03124v1 fatcat:whsqb5ooqrhy5ctxk6ikyqqdue

Digital image forgery detection using passive techniques: A survey

Gajanan K. Birajdar, Vijay H. Mankar
2013 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
The present status of image forgery detection technique is discussed along with a recommendation for future research.  ...  Verifying the integrity of images and detecting traces of tampering without requiring extra prior knowledge of the image content or any embedded watermarks is an important research field.  ...  Acknowledgment The authors would like to thank the anonymous reviewers for their valuable and insightful comments on the earlier version of this manuscript.  ... 
doi:10.1016/j.diin.2013.04.007 fatcat:pqlzh2yciveqxgw2pbwfnay7nq

Exploiting Reference Images in Exposing Geometrical Distortions

Rimba Whidiana Ciptasari, Kouichi Sakurai
2013 The International Journal of Multimedia & Its Applications  
We then proposed clustering technique to identify the tampered region based on distinctive keypoints. In contrast to k-means algorithm, our technique does not require the initialization of k value.  ...  Therefore, constructing a scientific and automatic way for evaluating image authenticity is an important task, which is the aim of this paper.  ...  ACKNOWLEDGEMENTS Research support for the first author is provided by the Directorate General of Higher Education, Ministry of National Education, Indonesia.  ... 
doi:10.5121/ijma.2013.5301 fatcat:ipxpdxrqtvgj7ivgzylgxokrca
« Previous Showing results 1 — 15 out of 2,587 results