Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








500 Hits in 4.2 sec

Improving re-sampling detection by adding noise

Lakshmanan Nataraj, Anindya Sarkar, B. S. Manjunath, Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, Edward J. Delp III
2010 Media Forensics and Security II  
Current image re-sampling detectors can reliably detect re-sampling in JPEG images only up to a Quality Factor (QF) of 95 or higher.  ...  At lower QFs, periodic JPEG blocking artifacts interfere with periodic patterns of re-sampling. We add a controlled amount of noise to the image before the re-sampling detection step.  ...  INTRODUCTION Digital Image Forensics is a recent field aimed at detecting manipulations in digital images.  ... 
doi:10.1117/12.839086 dblp:conf/mediaforensics/NatarajSM10 fatcat:rwsnqccgwnfg3fay626bkxceze

Global Contrast Enhancement Based Image Forensics Using Statistical Features

Neetu Singh, Abhinav Gupta, Roop Chand Jain
2017 Advances in Electrical and Electronic Engineering  
In our work, we have employed statistical distribution of block variance and AC DCT coefficients of an image to detect global contrast enhancement in an image.  ...  In the process of image editing, contrast enhancement is a very common technique to hide visual traces of tampering.  ...  These manipulations result in introduction of specific correlations in the statistics of images, which on detection can serve as a sign of digital tampering at detector.  ... 
doi:10.15598/aeee.v15i3.2189 fatcat:5sp4vgwu3vcedmgh6gwuu3sgoy

Proving Authenticity and Integrity of Digital Images using Image Forensics

Riya Ramchandra Naik
2020 International Journal for Research in Applied Science and Engineering Technology  
As JPEG is widespread de facto image format, Most of the images available in computer systems, electronic devices and in the Web are in JPEG format hence forgery detection techniques in JPEG may explore  ...  If these images were originally of different JPEG compression quality, then the digital composite may contain a trace of the original compression qualities.  ...  The MatLab function imwrite was utilized to keep images in the JPEG format.  ... 
doi:10.22214/ijraset.2020.7078 fatcat:fxjjfaw5p5du3mdugusayo6v5i

Statistical and deterministic approaches for multimedia forensics

Cecilia Pasquini
2016 ELCVIA Electronic Letters on Computer Vision and Image Analysis  
The main contributions of our work are detailed as follows: I Detection of JPEG compression traces in uncompressed format images.  ...  Intrinsic statistical properties of natural uncompressed images are used in image forensics for detecting traces of previous processing operations.  ...  A pictorial example of the capability of the method is reported in Fig. 1 (blue case). II Detection of multiple JPEG compression traces in JPEG images.  ... 
doi:10.5565/rev/elcvia.984 fatcat:gu2susje7za63hmzoiqrpasgp4

Anti-forensics of digital image compression

Matthew C. Stamm, K.J. Ray Liu
2011 IEEE Transactions on Information Forensics and Security  
Additionally, we propose a technique to remove statistical traces of the blocking artifacts left by image compression algorithms that divide an image into segments during processing.  ...  Through a series of experiments, we demonstrate that our anti-forensic techniques are capable of removing forensically detectable traces of image compression without significantly impacting an image's  ...  Additionally, we propose an anti-forensic operation to remove statistical traces of blocking artifacts from JPEG compressed images.  ... 
doi:10.1109/tifs.2011.2119314 fatcat:2m52cotd2za3tlnxadw57s2qhi

Image Compression Using Anti-Forensics Method

Sreelakshmi M.S, Venkataraman D
2013 International Journal of Computer Science Engineering and Applications  
In this paper anti-forensics method for digital image compression has been proposed. This anti-forensics method is capable of removing the traces of image compression.  ...  This method is targeted to remove the compression fingerprints of JPEG compression.  ...  FORENSICS METHODS TO DETECT JPEG COMPRESSION JPEG image format is popularly used in most digital cameras and image processing software.  ... 
doi:10.5121/ijcsea.2013.3108 fatcat:4lktmzpouncqpgda4jauxwpnj4

Image compression using anti-forensics method [article]

M.S.Sreelakshmi, D. Venkataraman
2013 arXiv   pre-print
In this paper anti-forensics method for digital image compression has been proposed. This anti-forensics method is capable of removing the traces of image compression.  ...  This method is targeted to remove the compression fingerprints of JPEG compression.  ...  FORENSICS METHODS TO DETECT JPEG COMPRESSION JPEG image format is popularly used in most digital cameras and image processing software.  ... 
arXiv:1303.2330v1 fatcat:yk7etmqmwrcfdjt66xg7lqajpm

Bibliography of digital image anti-forensics and anti-anti-forensics techniques

MUHAMMAD ALI QURESHI, El-Sayed El-Alfy
2019 IET Image Processing  
alongside the advancements in digital imaging and processing software.  ...  The goal is to be able to verify authenticity, ownership, and copyright of an image and detect changes to the original image.  ...  AFTs for double compression: The image after modifications or tampering is saved again in a compressed format. Detection of double JPEG compression is also widely used in image forensics. Huang et al.  ... 
doi:10.1049/iet-ipr.2018.6587 fatcat:mdgb7i7uxvgz3pqvoggldutufu

Digital image forensic approach to counter the JPEG anti-forensic attacks

Amit Kumar, Gurinder Singh, Ankush Kansal, Kulbir Singh
2020 IEEE Access  
The investigation of JPEG compression footprints can play an important role in image tampering detection. In this paper, a novel method is proposed to detect the JPEG compression.  ...  It becomes a hot issue about the security and threat to society with increasing growth of social media. JPEG compression format has been widely used in most of the digital cameras.  ...  The theoretical analysis of Benford-Fourier coefficients has been extended in [16] to present the forensic detector based on JPEG compression traces in an uncompressed format.  ... 
doi:10.1109/access.2020.3048246 fatcat:y6iihrpmgbax5puabqwatr5htm

The game of countering JPEG anti-forensics based on the noise level estimation

Yunwen Jiang, Hui Zeng, Xiangui Kang, Li Liu
2013 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference  
It's well known that JPEG image compression can result in quantization artifacts and blocking artifacts.  ...  The experimental results show that our method obtains an average detection accuracy of 98% on the UCID image database.  ...  JPEG compression detection is an important part of digital image forensics.  ... 
doi:10.1109/apsipa.2013.6694156 dblp:conf/apsipa/JiangZKL13 fatcat:j4uwqf5utndd3fm64afoyerxbi

End-to-end Anti-forensics Network of Single and Double JPEG Detection

Dohyun Kim, Wonhyuk Ahn, Heung-Kyu Lee
2021 IEEE Access  
In addition, identifying traces of JPEG compression and double JPEG compression (DJPEG) is crucial in the image forensics field.  ...  We demonstrate that existing anti-forensics of JPEG detection can deceive both JPEG and DJPEG detectors well but perform poorly in non-aligned cases and degrade the image quality.  ...  JPEG DETECTION AND ANTI-FORENSICS Many researchers have developed JPEG compression detection techniques by discovering statistical differences between uncompressed and JPEG images. Fan et al.  ... 
doi:10.1109/access.2021.3051678 fatcat:kjhxzw34mvcntiexquz4y43swa

Undetectable image tampering through JPEG compression anti-forensics

M C Stamm, S K Tjoa, W S Lin, K J R Liu
2010 2010 IEEE International Conference on Image Processing  
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting image forgeries.  ...  in decoded images, determine an image's origin, detect double JPEG compression, and identify cut-and-paste image forgeries.  ...  Methods designed to detect previous instances of JPEG compression in images saved using uncompressed or losslessly compressed file formats have been developed [1] , [2] , as well as an algorithm capable  ... 
doi:10.1109/icip.2010.5652553 dblp:conf/icip/StammTLL10 fatcat:2yhjvdsixngqxiuwf4u6ejhdju

Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact

Shuiming Ye, Qibin Sun, Ee-Chien Chang
2007 Multimedia and Expo, 2007 IEEE International Conference on  
In this paper, we describe a passive approach to detect digital forgeries by checking inconsistencies of blocking artifact.  ...  Given a digital image, we find that the blocking artifacts introduced during JPEG compression could be used as a "natural authentication code".  ...  JPEG image format is popularly used in most digital cameras and image processing software. Usually JPEG compression introduces blocking artifacts.  ... 
doi:10.1109/icme.2007.4284574 dblp:conf/icmcs/YeSC07 fatcat:dxidfndo5vhd7a2puuiau5b7ba

Median Filtering Forensics based on Convolutional Neural Network and Local Optimal Oriented Patterns

Ali Ahmad Aminu, Nwojo Nnanna Agwu, Nzurumike Obianuju
2020 International Journal of Computer Applications  
To create a convincing image manipulation, Forgers often apply median filtering to destroy statistical traces introduced during image manipulation, hence, median filtering detection has gained wide attention  ...  from digital image forensics researchers recently.  ...  ACKNOWLEDGMENTS We sincerely thank the National Information Technology Development Agency (NITDA) of Nigeria, for funding this research.  ... 
doi:10.5120/ijca2020920957 fatcat:mormbvaklnbinpi4cmaxsbahqy

CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing [article]

Mauro Barni, Andrea Costanzo, Ehsan Nowroozi, Benedetta Tondi
2018 arXiv   pre-print
Detection of contrast adjustments in the presence of JPEG postprocessing is known to be a challenging task.  ...  JPEG post processing is often applied innocently, as JPEG is the most common image format, or it may correspond to a laundering attack, when it is purposely applied to erase the traces of manipulation.  ...  with recompression and saving in uncompressed formats), we look for the well known problem of detection of contrast adjusted images  ... 
arXiv:1805.11318v1 fatcat:o4z5w6fdgjglzeagkbxipbfyoi
« Previous Showing results 1 — 15 out of 500 results