Digital image forgery detection using passive techniques: A survey

GK Birajdar, VH Mankar - Digital investigation, 2013 - Elsevier
Today manipulation of digital images has become easy due to powerful computers,
advanced photo-editing software packages and high resolution capturing devices. Verifying …

An overview on image forensics

A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …

Image splicing localization using a multi-task fully convolutional network (MFCN)

R Salloum, Y Ren, CCJ Kuo - Journal of Visual Communication and Image …, 2018 - Elsevier
In this work, we propose a technique that utilizes a fully convolutional network (FCN) to
localize image splicing attacks. We first evaluated a single-task FCN (SFCN) trained only on …

Image tampering localization using a dense fully convolutional network

P Zhuang, H Li, S Tan, B Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The emergence of powerful image editing software has substantially facilitated digital image
tampering, leading to many security issues. Hence, it is urgent to identify tampered images …

Tampering detection and localization through clustering of camera-based CNN features

L Bondi, S Lameri, D Güera, P Bestagini… - … IEEE Conference on …, 2017 - ieeexplore.ieee.org
Due to the rapid proliferation of image capturing devices and user-friendly editing software
suites, image manipulation is at everyone's hand. For this reason, the forensic community …

Aligned and non-aligned double JPEG detection using convolutional neural networks

M Barni, L Bondi, N Bonettini, P Bestagini… - Journal of Visual …, 2017 - Elsevier
Due to the wide diffusion of JPEG coding standard, the image forensic community has
devoted significant attention to the development of double JPEG (DJPEG) compression …

Information forensics: An overview of the first decade

MC Stamm, M Wu, KJR Liu - IEEE access, 2013 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …

Image forgery localization via block-grained analysis of JPEG artifacts

T Bianchi, A Piva - IEEE Transactions on Information Forensics …, 2012 - ieeexplore.ieee.org
In this paper, we propose a forensic algorithm to discriminate between original and forged
regions in JPEG images, under the hypothesis that the tampered image presents a double …

Exposing digital image forgeries by illumination color classification

TJ De Carvalho, C Riess… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
For decades, photographs have been used to document space-time events and they have
often served as evidence in courts. Although photographers are able to create composites of …

Rotation invariant localization of duplicated image regions based on Zernike moments

SJ Ryu, M Kirchner, MJ Lee… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper proposes a forensic technique to localize duplicated image regions based on
Zernike moments of small image blocks. We exploit rotation invariance properties to reliably …