An overview on image forensics
A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …
area of image forensics. These techniques have been designed to identify the source of a …
Digital image integrity–a survey of protection and verification techniques
P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …
computational imaging and adoption of artificial intelligence have spawned new editing …
Contrast enhancement-based forensics in digital images
As a retouching manipulation, contrast enhancement is typically used to adjust the global
brightness and contrast of digital images. Malicious users may also perform contrast …
brightness and contrast of digital images. Malicious users may also perform contrast …
Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection
Image splicing is a very common image manipulation technique that is sometimes used for
malicious purposes. A splicing detection and localization algorithm usually takes an input …
malicious purposes. A splicing detection and localization algorithm usually takes an input …
Adversarial multimedia forensics: Overview and challenges ahead
In recent decades, a significant research effort has been devoted to the development of
forensic tools for retrieving information and detecting possible tampering of multimedia …
forensic tools for retrieving information and detecting possible tampering of multimedia …
The source identification game: An information-theoretic perspective
We introduce a theoretical framework in which to cast the source identification problem.
Thanks to the adoption of a game-theoretic approach, the proposed framework permits us to …
Thanks to the adoption of a game-theoretic approach, the proposed framework permits us to …
CNN-based detection of generic contrast adjustment with JPEG post-processing
Detection of contrast adjustments in the presence of JPEG post processing is known to be a
challenging task. JPEG post processing is often applied innocently, as JPEG is the most …
challenging task. JPEG post processing is often applied innocently, as JPEG is the most …
On the vulnerability of deep learning to adversarial attacks for camera model identification
Camera model identification is a fundamental task for many investigative activities, and is
drawing great attention in the research community. In this context, convolutional neural …
drawing great attention in the research community. In this context, convolutional neural …
[HTML][HTML] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
As technology advances and develops, the need for strong and simple authentication
mechanisms that can help protect data intensifies. The contemporary approach to giving …
mechanisms that can help protect data intensifies. The contemporary approach to giving …
JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality
This paper proposes a JPEG anti-forensic method, which aims at removing from a given
image the footprints left by JPEG compression, in both the spatial domain and DCT domain …
image the footprints left by JPEG compression, in both the spatial domain and DCT domain …