A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions

ST Nabi, M Kumar, P Singh, N Aggarwal, K Kumar - Multimedia Systems, 2022 - Springer
With the advent of Internet, images and videos are the most vulnerable media that can be
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …

Digital image forgery detection: a systematic scrutiny

S Walia, K Kumar - Australian Journal of Forensic Sciences, 2019 - Taylor & Francis
Image manipulation has eroded our trust of digital images, with more subtle forgery methods
posing an ever-increasing challenge to the integrity of images and their authenticity. Over …

[Retracted] Efficient Approach towards Detection and Identification of Copy Move and Image Splicing Forgeries Using Mask R‐CNN with MobileNet V1

KD Kadam, S Ahirrao, K Kotecha - Computational Intelligence …, 2022 - Wiley Online Library
With the technological advancements of the modern era, the easy availability of image
editing tools has dramatically minimized the costs, expense, and expertise needed to exploit …

Dual image based secured reversible data hiding scheme exploiting huffman compression tree combining bit-reversal permutation technique

K Datta, B Jana, MD Chakraborty - Multimedia Tools and Applications, 2024 - Springer
In the area of data hiding and information security, the greater need is to ensure high
embedding capacity of the stego media without hampering the visual quality while ensuring …

Unmasking the digital deception-a comprehensive survey on image forgery and detection techniques

S Bharathiraja, B Rajesh Kanna, S Geetha… - Australian Journal of …, 2023 - Taylor & Francis
In today's digital landscape, digital images are widely used for communication across
various platforms, but they are also vulnerable to tampering and deception. The proliferation …

A review on machine learning-based approaches for image forgery detection

S Mehta, P Shukla - International Joint Conference on Advances in …, 2022 - Springer
With the advent of widespread handheld devices supporting high-speed internet and social
media applications, the cases of tampered and forged images have also risen manifold. The …

A CNN based architecture for forgery detection in administrative documents

K Maamouli, H Benhamza, A Djeffal… - … Informatics of Biskra …, 2022 - ieeexplore.ieee.org
The use of digital documents is knowing a widespread in different daily administrative and
economic transactions. Simultaneously, the forgery of many documents becomes a crime …

Active image forgery detection using cellular automata

AP Tafti, H Hassannia - Cellular Automata in Image Processing and …, 2014 - Springer
The adequate potential of digital images and the ease in their storage and distribution is
such that they are more and more exploited to supply information in this digital epoch. As a …

A Dual-Image Based Secured Reversible Data Hiding Scheme Exploiting Weighted Matrix and Cellular Automata

K Datta, S Banerjee, B Jana, M Dalui - Asian Symposium on Cellular …, 2024 - Springer
In the era of advanced communication technology, security of confidential data during
transmission through public media is an important issue. To curtail the risk of attacks, a …

[PDF][PDF] An Active Algorithm to Gray-scale Digital Image Forgery Detection based on Cellular Automata and LU Decomposition

MAM Far, F Rohani, E Brhravesh - J Comput Sci Softw Dev, 2015 - academia.edu
A reliable active method for grayscale digital image forgery detection presents in this paper.
Our method is based on LU decomposition (Lower Upper Triangular Matrix) of the original …