An overview of recent work in media forensics: Methods and threats
In this paper, we review recent work in media forensics for digital images, video, audio
(specifically speech), and documents. For each data modality, we discuss synthesis and …
(specifically speech), and documents. For each data modality, we discuss synthesis and …
An overview of recent work in multimedia forensics
An Overview of Recent Work in Multimedia Forensics Toggle navigation IEEE Computer
Society Digital Library Jobs Tech News Resource Center Press Room Advertising About Us …
Society Digital Library Jobs Tech News Resource Center Press Room Advertising About Us …
CNN-based fast source device identification
Source identification is an important topic in image forensics, since it allows to trace back the
origin of an image. This represents a precious information to claim intellectual property but …
origin of an image. This represents a precious information to claim intellectual property but …
SPN-CNN: boosting sensor-based source camera attribution with deep learning
M Kirchner, C Johnson - 2019 IEEE international workshop on …, 2019 - ieeexplore.ieee.org
We explore means to advance source camera identification based on sensor noise in a data-
driven framework. Our focus is on improving the sensor pattern noise (SPN) extraction from …
driven framework. Our focus is on improving the sensor pattern noise (SPN) extraction from …
DIPPAS: A deep image prior PRNU anonymization scheme
Source device identification is an important topic in image forensics since it allows to trace
back the origin of an image. Its forensics counterpart is source device anonymization, that is …
back the origin of an image. Its forensics counterpart is source device anonymization, that is …
PRNU estimation of linear CMOS image sensors that allows nonuniform illumination
Photo response nonuniformity (PRNU) is a crucial parameter in evaluating and choosing
CMOS image sensors. The current methods and standards use the integrating sphere to …
CMOS image sensors. The current methods and standards use the integrating sphere to …
A systematic literature review on face morphing attack detection (mad)
Morphing attacks involve generating a single artificial facial photograph that represents two
distinct qualities and utilizing it as a reference photograph on a document. The high quality …
distinct qualities and utilizing it as a reference photograph on a document. The high quality …
Source Camera Identification with a Robust Device Fingerprint: Evolution from Image-Based to Video-Based Approaches
With the increasing prevalence of digital multimedia content, the need for reliable and
accurate source camera identification has become crucial in applications such as digital …
accurate source camera identification has become crucial in applications such as digital …
Computational sensor fingerprints
Analysis of imaging sensors is one of the most reliable photo forensic techniques, but it is
increasingly challenged by complex image processing in modern cameras. The underlying …
increasingly challenged by complex image processing in modern cameras. The underlying …
Amplitude SAR imagery splicing localization
Synthetic Aperture Radar (SAR) images are a valuable asset for a wide variety of tasks. In
the last few years, many websites have been offering them for free in the form of easy to …
the last few years, many websites have been offering them for free in the form of easy to …