A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Large-Scale Image Retrieval Based on Compressed Camera Identification
2015
IEEE transactions on multimedia
Recent works showed that random projections can be used to significantly compress the PRNU, enabling operation on very large scales, previously impossible due to the size of the PRNU and to the complexity ...
Index Terms-Image forensics, image search and retrieval, photo response non-uniformity (PRNU), random projections. ...
, or with other PRNU compression methods not based on random projections. ...
doi:10.1109/tmm.2015.2455417
fatcat:rhpyqshxuvhnda3kci76klkl5i
Image retrieval based on compressed camera sensor fingerprints
2015
2015 IEEE International Conference on Multimedia and Expo (ICME)
We examine recent advances in compression of such fingerprints, which allow to address the previously unexplored image retrieval problem on large scales. ...
Proceeding] Image retrieval based on compressed camera sensor fingerprints Original Citation: Valsesia, Diego; Coluccia, Giulio; Bianchi, Tiziano; Magli, Enrico (2015). ...
Finally, the random projections technique uses compressed query and test fingerprints with m = 512000 binary-quantized random projections. ...
doi:10.1109/icme.2015.7177454
dblp:conf/icmcs/ValsesiaCBM15
fatcat:rmm5uvnu4jct5avpncmsda5l7a
Accurate and Scalable Image Clustering Based On Sparse Representation of Camera Fingerprint
[article]
2018
arXiv
pre-print
Moreover, our framework is scalable to the number of images and robust against double JPEG compression as well as the presence of outliers, owning big potential for real-world applications. ...
Such dependencies are encoded under sparse representations which are obtained by solving a LASSO problem with non-negativity constraint. ...
Therefore, we test the robustness of LS-SSC on images coming from 20 cameras of Vision, further compressed using convert tool provided by ImageMagick. ...
arXiv:1810.07945v2
fatcat:ac2niv4w7rhxnoz6ybx6qovpge
Hybrid reference-based Video Source Identification
2019
Sensors
Currently, the most promising technology to achieve this task exploits unique traces left by the camera sensor into the visual content. ...
Multimedia Forensics allows us to determine whether videos or images have been captured with the same device, and thus, possibly, by the same person. ...
authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Air Force Research Laboratory and the Defense Advanced Research Projects ...
doi:10.3390/s19030649
fatcat:oyacl627ynfn7dtlxqmvxs64py
2011 Index IEEE Transactions on Information Forensics and Security Vol. 6
2011
IEEE Transactions on Information Forensics and Security
., +, TIFS June 2011
513
Fingerprint Matching Incorporating Ridge Features With Minutiae. ...
I., +, TIFS Dec. 2011 1315-1322
Fingerprint Matching Incorporating Ridge Features With Minutiae. ...
doi:10.1109/tifs.2011.2176153
fatcat:i2wz3suxbnemvbinhkvjwesq2y
Author Index
2010
2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition
Live Dense Reconstruction with a Single Moving Camera Scalable Active Matching Demo: Live Dense Reconstruction with a Single Moving Camera de Campos, Teófilo Unified Graph Matching in Euclidean Spaces ...
Visual Search, Linking Printed Documents to Digital Media
Liu, Yan
Large-Scale Image Retrieval with Compressed Fisher Vectors
Large-Scale Image Categorization with Explicit Data Embedding
Liu, ...
doi:10.1109/cvpr.2010.5539913
fatcat:y6m5knstrzfyfin6jzusc42p54
A Hybrid Approach to Video Source Identification
[article]
2017
arXiv
pre-print
Multimedia Forensics allows to determine whether videos or images have been captured with the same device, and thus, eventually, by the same person. ...
Currently, the most promising technology to achieve this task, exploits the unique traces left by the camera sensor into the visual content. ...
Recently, authors of [17] addressed the problem of reducing the computational complexity of fingerprint matching, both in terms of time and memory, through the use of random projections to compress the ...
arXiv:1705.01854v1
fatcat:pqxs5zr4rvbitantjr4b4nl5aa
Information Forensics: An Overview of the First Decade
2013
IEEE Access
recent decades, we have witnessed the evolution of information technologies from the development of VLSI technologies, to communication and networking infrastructure, to the standardization of multimedia compression ...
issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users for legitimate purposes, and to be able to forensically prove with ...
When using these features, the quantization parameters can be adjusted to balance the tradeoff between robustness and matching accuracy. ...
doi:10.1109/access.2013.2260814
fatcat:l3hs7vh2nzakpkihwmkubh24dy
Web Photo Source Identification based on Neural Enhanced Camera Fingerprint
[article]
2023
arXiv
pre-print
The codes for fingerprint extraction network and benchmark dataset with modern smartphone cameras photos are all publicly available at https://github.com/PhotoNecf/PhotoNecf. ...
Source camera identification of web photos aims to establish a reliable linkage from the captured images to their source cameras, and has a broad range of applications, such as image copyright protection ...
Instead of directly sending the fingerprint consisting millions of real numbers, the system first compresses it by previously mentioned binarization and random projection [54] . ...
arXiv:2302.09228v1
fatcat:f4vmointxje7zpkfmwgglz7ovy
Object Reacquisition and Tracking in Large-Scale Smart Camera Networks
2007
2007 First ACM/IEEE International Conference on Distributed Smart Cameras
Object reacquisition or reidentification is the process of matching objects between images taken from separate cameras. ...
The entire system is implemented and evaluated with regard to a typical embedded smart camera platform featuring one single Texas Instruments TM fixed-point DSP. ...
., and highly relies on robust matching methods, it has the advantage of being partially robust to image scale, rotation, affine distortion, addition of noise and illumination changes. ...
doi:10.1109/icdsc.2007.4357519
dblp:conf/icdsc/ArthLB07
fatcat:yep4giaopzfdxomz5333jl2yx4
Multimedia Forensics Before the Deep Learning Era
[chapter]
2022
Advances in Computer Vision and Pattern Recognition
We will focus on methods that rely on the extraction of a camera fingerprint and need some prior information on pristine data, for example, through a collection of images taken from the camera of interest ...
Then we will shift to blind methods that do not require any prior knowledge and reveal inconsistencies with respect to some well-defined hypotheses. ...
This work is also supported by the PREMIER project, funded by the Italian Ministry of Education, University, and Research within the PRIN 2017 program and by a Google gift. ...
doi:10.1007/978-3-030-87664-7_3
fatcat:zj25humyyzbqxa6qntz25wvvse
On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation
2017
IEEE Transactions on Information Forensics and Security
A more thorough study in fingerprint compression can be found in [46] based on random projection. ...
Inspired by [45] and the 1-bit compressive sensing [49] , the authors also considered binarizing the compressed PRNU, which could be seen as a generalized case of [45] with identity projecting matrix ...
doi:10.1109/tifs.2016.2640938
fatcat:jfloyoohrzctje2nourc5bkuxi
A large-scale audio and video fingerprints-generated database of TV repeated contents
2014
2014 12th International Workshop on Content-Based Multimedia Indexing (CBMI)
Keywords-TV repeats, audio and video fingerprint, multimedia data mining. I. ...
January 2010 (380,000 hours); the detection independently uses audio and video fingerprints. ...
ACKNOWLEDGEMENTS The authors wish to thank Rakia Jaziri, Elisabeth Chapalain, Marc Tarin, Paul Tomi, for their participation in the project, and Frédéric Dumas and Florent Lioret for their useful assistance ...
doi:10.1109/cbmi.2014.6849818
dblp:conf/cbmi/ChenotD14
fatcat:uqroh7itlrc35piqqoqr4jilua
Digital image forgery detection using passive techniques: A survey
2013
Digital Investigation. The International Journal of Digital Forensics and Incident Response
The present status of image forgery detection technique is discussed along with a recommendation for future research. ...
A detection reliability of 91% for a Panasonic camera and 99.8% for Canon with camera fingerprints estimated from 10 images is obtained. ...
A method has good accuracy on different kind of post image processing like JPEG compression, rotation, noise, scaling and is also robust to compound image processing. ...
doi:10.1016/j.diin.2013.04.007
fatcat:pqlzh2yciveqxgw2pbwfnay7nq
Texture to the Rescue
2017
ACM Transactions on Privacy and Security
We show these patterns can be easily captured by a commodity camera and condensed into to a compact 2048bit fingerprint code. ...
in the paper with varying opacities. ...
The random micro-structural patterns are captured by using a mobile phone camera with macro lens mounted. ...
doi:10.1145/3092816
fatcat:fvmshzosfvdcnlfzlm6wvkcgii
« Previous
Showing results 1 — 15 out of 2,032 results