Hybrid lstm and encoder–decoder architecture for detection of image forgeries
With advanced image journaling tools, one can easily alter the semantic meaning of an
image by exploiting certain manipulation techniques such as copy clone, object splicing …
image by exploiting certain manipulation techniques such as copy clone, object splicing …
Exploiting spatial structure for localizing manipulated image regions
JH Bappy, AK Roy-Chowdhury… - Proceedings of the …, 2017 - openaccess.thecvf.com
The advent of high-tech journaling tools facilitates an image to be manipulated in a way that
can easily evade state-of-the-art image tampering detection approaches. The recent …
can easily evade state-of-the-art image tampering detection approaches. The recent …
Image tampering localization using a dense fully convolutional network
The emergence of powerful image editing software has substantially facilitated digital image
tampering, leading to many security issues. Hence, it is urgent to identify tampered images …
tampering, leading to many security issues. Hence, it is urgent to identify tampered images …
A comprehensive survey on image authentication for tamper detection with localization
HR Chennamma, B Madhushree - Multimedia Tools and Applications, 2023 - Springer
The data that is stored or transmitted in digital form is susceptible to be attacked. Digital
images are particularly vulnerable to unauthorized access and illicit alterations. As a result …
images are particularly vulnerable to unauthorized access and illicit alterations. As a result …
A survey on image tampering and its detection in real-world photos
Editing a real-world photo through computer software or mobile applications is one of the
easiest things one can do today before sharing the doctored image on one's social …
easiest things one can do today before sharing the doctored image on one's social …
Image region forgery detection: A deep learning approach
In digital forensics, the detection of the presence of tampered images is of significant
importance. The problem with the existing literature is that majority of them identify certain …
importance. The problem with the existing literature is that majority of them identify certain …
Double JPEG compression forensics based on a convolutional neural network
Q Wang, R Zhang - EURASIP Journal on Information Security, 2016 - Springer
Double JPEG compression detection has received considerable attention in blind image
forensics. However, only few techniques can provide automatic localization. To address this …
forensics. However, only few techniques can provide automatic localization. To address this …
Self-supervised image local forgery detection by JPEG compression trace
For image local forgery detection, the existing methods require a large amount of labeled
data for training, and most of them cannot detect multiple types of forgery simultaneously. In …
data for training, and most of them cannot detect multiple types of forgery simultaneously. In …
Multi-scale fusion for improved localization of malicious tampering in digital images
A sliding window-based analysis is a prevailing mechanism for tampering localization in
passive image authentication. It uses existing forensic detectors, originally designed for a full …
passive image authentication. It uses existing forensic detectors, originally designed for a full …
A novel color image tampering detection and self-recovery based on fragile watermarking
X Xia, S Zhang, K Wang, T Gao - Journal of Information Security and …, 2023 - Elsevier
In industrial applications, sensing devices' image data must be accurately identified and
recovered to prevent economic losses. Nevertheless, most industrial image watermarking …
recovered to prevent economic losses. Nevertheless, most industrial image watermarking …