Hybrid lstm and encoder–decoder architecture for detection of image forgeries

JH Bappy, C Simons, L Nataraj… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
With advanced image journaling tools, one can easily alter the semantic meaning of an
image by exploiting certain manipulation techniques such as copy clone, object splicing …

Exploiting spatial structure for localizing manipulated image regions

JH Bappy, AK Roy-Chowdhury… - Proceedings of the …, 2017 - openaccess.thecvf.com
The advent of high-tech journaling tools facilitates an image to be manipulated in a way that
can easily evade state-of-the-art image tampering detection approaches. The recent …

Image tampering localization using a dense fully convolutional network

P Zhuang, H Li, S Tan, B Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The emergence of powerful image editing software has substantially facilitated digital image
tampering, leading to many security issues. Hence, it is urgent to identify tampered images …

A comprehensive survey on image authentication for tamper detection with localization

HR Chennamma, B Madhushree - Multimedia Tools and Applications, 2023 - Springer
The data that is stored or transmitted in digital form is susceptible to be attacked. Digital
images are particularly vulnerable to unauthorized access and illicit alterations. As a result …

A survey on image tampering and its detection in real-world photos

L Zheng, Y Zhang, VLL Thing - Journal of Visual Communication and …, 2019 - Elsevier
Editing a real-world photo through computer software or mobile applications is one of the
easiest things one can do today before sharing the doctored image on one's social …

Image region forgery detection: A deep learning approach

Y Zhang, J Goh, LL Win, V Thing - Proceedings of the Singapore …, 2016 - ebooks.iospress.nl
In digital forensics, the detection of the presence of tampered images is of significant
importance. The problem with the existing literature is that majority of them identify certain …

Double JPEG compression forensics based on a convolutional neural network

Q Wang, R Zhang - EURASIP Journal on Information Security, 2016 - Springer
Double JPEG compression detection has received considerable attention in blind image
forensics. However, only few techniques can provide automatic localization. To address this …

Self-supervised image local forgery detection by JPEG compression trace

X Bi, W Yan, B Liu, B Xiao, W Li, X Gao - Proceedings of the AAAI …, 2023 - ojs.aaai.org
For image local forgery detection, the existing methods require a large amount of labeled
data for training, and most of them cannot detect multiple types of forgery simultaneously. In …

Multi-scale fusion for improved localization of malicious tampering in digital images

P Korus, J Huang - IEEE Transactions on Image Processing, 2016 - ieeexplore.ieee.org
A sliding window-based analysis is a prevailing mechanism for tampering localization in
passive image authentication. It uses existing forensic detectors, originally designed for a full …

A novel color image tampering detection and self-recovery based on fragile watermarking

X Xia, S Zhang, K Wang, T Gao - Journal of Information Security and …, 2023 - Elsevier
In industrial applications, sensing devices' image data must be accurately identified and
recovered to prevent economic losses. Nevertheless, most industrial image watermarking …