An overview on image forensics

A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …

A survey of deep learning-based source image forensics

P Yang, D Baracchi, R Ni, Y Zhao, F Argenti, A Piva - Journal of Imaging, 2020 - mdpi.com
Image source forensics is widely considered as one of the most effective ways to verify in a
blind way digital image authenticity and integrity. In the last few years, many researchers …

A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD

G Li, Q Wu, D Tu, S Sun - 2007 IEEE international conference …, 2007 - ieeexplore.ieee.org
The presence of duplicated regions in the image can be considered as a tell-tale sign for
image forgery, which belongs to the research field of digital image forensics. In this paper, a …

JPEG error analysis and its applications to digital image forensics

W Luo, J Huang, G Qiu - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
JPEG is one of the most extensively used image formats. Understanding the inherent
characteristics of JPEG may play a useful role in digital image forensics. In this paper, we …

Color image zero-watermarking based on fast quaternion generic polar complex exponential transform

H Yang, S Qi, P Niu, X Wang - Signal Processing: Image Communication, 2020 - Elsevier
As one promising solution, zero-watermarking techniques have been proposed to enhance
the image visual quality and applied to protect the intellectual property rights of the medical …

A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions

ST Nabi, M Kumar, P Singh, N Aggarwal, K Kumar - Multimedia Systems, 2022 - Springer
With the advent of Internet, images and videos are the most vulnerable media that can be
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …

Copy‐move forgery detection technique for forensic analysis in digital images

T Mahmood, T Nawaz, A Irtaza, R Ashraf… - Mathematical …, 2016 - Wiley Online Library
Due to the powerful image editing tools images are open to several manipulations;
therefore, their authenticity is becoming questionable especially when images have …

A survey of passive technology for digital image forensics

W Luo, Z Qu, F Pan, J Huang - Frontiers of Computer Science in China, 2007 - Springer
Over the past years, digital images have been widely used in the Internet and other
applications. Whilst image processing techniques are develo** at a rapid speed …

Analysis and design of secure watermark-based authentication systems

C Fei, D Kundur, RH Kwong - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
This paper focuses on a coding approach for effective analysis and design of secure
watermark-based multimedia authentication systems. We provide a design framework for …

A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain

TS Nguyen, CC Chang, XQ Yang - AEU-International Journal of Electronics …, 2016 - Elsevier
Image authentication technique protects the integrity of images. Many image authentication
schemes have been proposed in recent years. However, in these schemes, the image is …