Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








862 Hits in 4.6 sec

Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts

Pasquale Ferrara, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva
2012 IEEE Transactions on Information Forensics and Security  
The proposed method is based on a new feature measuring the presence of demosaicing artifacts at a local level, and on a new statistical model allowing to derive the tampering probability of each 2 × 2  ...  We make the assumption that the image is acquired using a Color Filter Array, and that tampering removes the artifacts due to the demosaicing algorithm.  ...  only a coarse grained localization of tampering is possible.  ... 
doi:10.1109/tifs.2012.2202227 fatcat:tt6zn75wvzgqxgoujp3kesfs4u

Content-Aware Detection Of Jpeg Grid Inconsistencies For Intuitive Image Forensics (Pre-Review)

Chryssanthi Iakovidou, Markos Zampoglou, Symeon Papadopoulos, Yannis Kompatsiaris
2018 Zenodo  
An image segmentation step is introduced to differentiate between discontinuities produced by tampering and those that are attributed to image content, making the output maps easier to interpret by suppressing  ...  The paper proposes a novel method for detecting indicators of image forgery by locating grid alignment abnormalities in JPEG compressed image bitmaps.  ...  NOI1 [22] Models image noise using wavelet filtering and treats localized variances as possible forgeries.  ... 
doi:10.5281/zenodo.1246420 fatcat:k5kbirvwjvgwxguu66jmakz5vq

Detection of copy–move forgery using a method based on blur moment invariants

Babak Mahdian, Stanislav Saic
2007 Forensic Science International  
In this work we propose a method to automatically detect and localize duplicated regions in digital images.  ...  The presence of duplicated regions in an image may signify a common type of forgery called copy-move forgery.  ...  For example, image splicing in combination with copy-move forgery and localized image retouching techniques.  ... 
doi:10.1016/j.forsciint.2006.11.002 pmid:17161569 fatcat:bwg7nxcg7rdhtc5rm3puyppkbi

Multi-Clue Image Tampering Localization

Lorenzo Gaborini, Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro
2014 2014 IEEE International Workshop on Information Forensics and Security (WIFS)  
In this paper, we propose an algorithm for image tampering localization, based on the fusion of three separate detectors: i) one based on PRNU, working when we have at least a few of pictures shot with  ...  Therefore, an effective strategy for tampering detection and localization requires to merge the output of many different forensic tools.  ...  For this reason, the estimation of the binary tampering localization mask M ND requires thresholding the difference map and optionally processing it with some morphological operators.  ... 
doi:10.1109/wifs.2014.7084315 dblp:conf/wifs/GaboriniBMTT14 fatcat:2c6gjax7ovdx5jykzsjyshrsoa

Detection of Near-Duplicated Image Regions [chapter]

Babak Mahdian, Stanislav Saic
2007 Advances in Soft Computing  
In this work we propose a method to automatically detect and localize near-duplicated regions in digital images.  ...  The presence of nearduplicated regions in an image may signify a common type of forgery called copymove forgery.  ...  In most cases of forgery investigated, they were able to detect duplicated regions in the tampered image despite of the presence of an acceptable amount of noise.  ... 
doi:10.1007/978-3-540-75175-5_24 dblp:series/asc/MahdianS08 fatcat:o3a3nqrcy5aqjgjcc4ffhyfmbq

An Improved Algorithm For Digital Image Authentication and Forgery Localization Using Demosaicing Artifacts

Nhan Le, Florent Retraint
2019 IEEE Access  
This paper focuses on the digital image authentication and forgery localization using demosaicing artifacts.  ...  Finally, a penalized expectation-maximization algorithm is used to localize forged areas in tampered images.  ...  traces left by forgeries are exploited to distinguish between tampered and natural images.  ... 
doi:10.1109/access.2019.2938467 fatcat:3ja2dqfkejc27hc5utyetl7c2y

Robust Copy-Paste Detection Algorithm using SIFT for Digital Image Forensics

2019 International journal of recent technology and engineering  
region as well as creates inefficiency in the accuracy of forgeries.  ...  The proposed approach can detect copy-paste forgeries effectively with high accuracy, reliability, and inconsistencies regardless of the test scenario.  ...  Digital images via digital camera, scanner and computer graphics [2] , the integrity of information are the main requirement as it affects the judgment.  ... 
doi:10.35940/ijrte.d7841.118419 fatcat:titppm5tjvaf5p7pvlyngde25q

Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection [article]

Ahmet Gökhan Poyraz, Ahmet Emir Dirik, Ahmet Karaküçük, Nasir Memon
2020 arXiv   pre-print
For forgeries as small as 100×100 pixel size, the proposed method outperforms the state-of-the-art, which validates the usefulness of fusion for localization of small-size image forgeries.  ...  These two methods also provide solutions to tamper localization problem. In this paper, we propose their combination via a Neural Network to achieve better small-scale tamper detection performance.  ...  We also show that the CNN and NN models trained for the Fusion with specific camera models can be re-used for localization of forgeries on a tampered image captured with a new device from the same camera  ... 
arXiv:2002.10123v2 fatcat:uaoqxym4jrc55ensv4yeclw2ry

Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation

Hui-Yu Huang, Ai-Jhen Ciou
2019 EURASIP Journal on Image and Video Processing  
One type of forgery, known as copy-move duplication, is a specified type that usually involves image tampering.  ...  Then, we refine these coarse forgery regions and remove mistakes or isolated areas. Finally, the forgery regions can be localized more precisely.  ...  [8] used multiresolution local binary patterns (MLBP) for forgery detection.  ... 
doi:10.1186/s13640-019-0469-9 fatcat:q7n63zwrdjgdhmn5azmfhentpa

Fighting Malicious Media Data: A Survey on Tampering Detection and Deepfake Detection [article]

Junke Wang, Zhenxin Li, Chao Zhang, Jingjing Chen, Zuxuan Wu, Larry S. Davis, Yu-Gang Jiang
2022 arXiv   pre-print
Depending on the content of the targeted images, media forgery could be divided into image tampering and Deepfake techniques.  ...  Accordingly, the means of defense include image tampering detection and Deepfake detection, which share a wide variety of properties.  ...  ; 2) spatial forgery localization; 3) video forgery classification; 4) temporal forgery localization.  ... 
arXiv:2212.05667v1 fatcat:iuqs2d3qhbay3gryewjlbk75jm

Multi-spectral Class Center Network for Face Manipulation Detection and Localization [article]

Changtao Miao, Qi Chu, Zhentao Tan, Zhenchao Jin, Wanyi Zhuang, Yue Wu, Bin Liu, Honggang Hu, Nenghai Yu
2023 arXiv   pre-print
Existing forgery localization methods suffer from imprecise and inconsistent pixel-level annotations.  ...  To alleviate these problems, this paper first re-constructs the FaceForensics++ dataset by introducing pixel-level annotations, then builds an extensive benchmark for localizing tampered regions.  ...  Image forensics tasks also aim to detect images as spoof or bona fide and locate the tampering regions, but most image forgery localization methods only focus on fake image datasets rather than real-fake  ... 
arXiv:2305.10794v2 fatcat:nrsw5vx4qbdknfv2rgi6j3fo7q

Learning JPEG Compression Artifacts for Image Manipulation Detection and Localization [article]

Myung-Joon Kwon, Seung-Hun Nam, In-Jae Yu, Heung-Kyu Lee, Changick Kim
2021 arXiv   pre-print
Detecting and localizing image manipulation are necessary to counter malicious use of image editing techniques.  ...  It significantly outperforms traditional and deep neural network-based methods in detecting and localizing tampered regions.  ...  They also achieve forgery localization by integrating imagelevel classification results using an overlapping stride of 8 pixels.  ... 
arXiv:2108.12947v1 fatcat:cscerhw2rreubob7tvos7jgvhq

Copy-Move Forgery Detection Based on Keypoint Clustering and Similar Neighborhood Search Algorithm

Haipeng Chen, Xiwen Yang, Yingda Lyu
2020 IEEE Access  
Copy-move is one of the most commonly used methods of tampering with digital images. Keypoint-based detection is recognized as effective in copy-move forgery detection (CMFD).  ...  This paper proposes an efficient CMFD method via clustering SIFT keypoints and searching the similar neighborhoods to locate tampered regions.  ...  mark the image at pixel level and produce the final tampered localization map.  ... 
doi:10.1109/access.2020.2974804 fatcat:cv3f5ryrkrbanex3bkuwmefmey

Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics

Sajjad Dadkhah, Mario Köppen, Hamid A. Jalab, Somayeh Sadeghi, Azizah Abdul Manaf, Diaa Uliyan
2017 Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods  
Copy-move forgery is a special type of forgery that involves duplicating one region of an image by covering it with a copy of another region from the same image.  ...  In the proposed algorithm, the image is divided into similar non-overlapping blocks, and then the final force for each block is evaluated and used to construct the tampered image features vector.  ...  Tamper localization. The inverse of a procedure is conducted on the transformed image to retrieve the original image with a tampered region map.  ... 
doi:10.5220/0006232206120619 dblp:conf/icpram/DadkhahKJSMU17 fatcat:ev5qjoq22naxrle2mwjvutmfra

An Improved SIFT-Based Copy-Move Forgery Detection Method Using T-Linkage and Multi-Scale Analysis

Yi Fan, Yue-Sheng Zhu, Zhen Liu
2016 Journal of Information Hiding and Multimedia Signal Processing  
The detection of copy-move forgery is an important module in the image authentication. It aims to detect whether an image contains copy-move tampering and where the tampered regions are.  ...  We make a final decision by considering all the localization maps with a voting strategy.  ...  The final localization map will be obtained via a voting process.  ... 
dblp:journals/jihmsp/FanZL16 fatcat:cv227ydtivaf5dyqvt4wdhpzzm
« Previous Showing results 1 — 15 out of 862 results