Digital image forgery detection using passive techniques: A survey
GK Birajdar, VH Mankar - Digital investigation, 2013 - Elsevier
Today manipulation of digital images has become easy due to powerful computers,
advanced photo-editing software packages and high resolution capturing devices. Verifying …
advanced photo-editing software packages and high resolution capturing devices. Verifying …
An overview on image forensics
A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …
area of image forensics. These techniques have been designed to identify the source of a …
Image splicing localization using a multi-task fully convolutional network (MFCN)
In this work, we propose a technique that utilizes a fully convolutional network (FCN) to
localize image splicing attacks. We first evaluated a single-task FCN (SFCN) trained only on …
localize image splicing attacks. We first evaluated a single-task FCN (SFCN) trained only on …
Image tampering localization using a dense fully convolutional network
The emergence of powerful image editing software has substantially facilitated digital image
tampering, leading to many security issues. Hence, it is urgent to identify tampered images …
tampering, leading to many security issues. Hence, it is urgent to identify tampered images …
Tampering detection and localization through clustering of camera-based CNN features
Due to the rapid proliferation of image capturing devices and user-friendly editing software
suites, image manipulation is at everyone's hand. For this reason, the forensic community …
suites, image manipulation is at everyone's hand. For this reason, the forensic community …
Aligned and non-aligned double JPEG detection using convolutional neural networks
Due to the wide diffusion of JPEG coding standard, the image forensic community has
devoted significant attention to the development of double JPEG (DJPEG) compression …
devoted significant attention to the development of double JPEG (DJPEG) compression …
Information forensics: An overview of the first decade
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …
development of VLSI technologies, to communication and networking infrastructure, to the …
Image forgery localization via block-grained analysis of JPEG artifacts
In this paper, we propose a forensic algorithm to discriminate between original and forged
regions in JPEG images, under the hypothesis that the tampered image presents a double …
regions in JPEG images, under the hypothesis that the tampered image presents a double …
Exposing digital image forgeries by illumination color classification
TJ De Carvalho, C Riess… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
For decades, photographs have been used to document space-time events and they have
often served as evidence in courts. Although photographers are able to create composites of …
often served as evidence in courts. Although photographers are able to create composites of …
Rotation invariant localization of duplicated image regions based on Zernike moments
This paper proposes a forensic technique to localize duplicated image regions based on
Zernike moments of small image blocks. We exploit rotation invariance properties to reliably …
Zernike moments of small image blocks. We exploit rotation invariance properties to reliably …