An overview on image forensics

A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …

Digital image integrity–a survey of protection and verification techniques

P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …

Contrast enhancement-based forensics in digital images

G Cao, Y Zhao, R Ni, X Li - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
As a retouching manipulation, contrast enhancement is typically used to adjust the global
brightness and contrast of digital images. Malicious users may also perform contrast …

Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection

Y Wu, W Abd-Almageed, P Natarajan - Proceedings of the 25th ACM …, 2017 - dl.acm.org
Image splicing is a very common image manipulation technique that is sometimes used for
malicious purposes. A splicing detection and localization algorithm usually takes an input …

Adversarial multimedia forensics: Overview and challenges ahead

M Barni, MC Stamm, B Tondi - 2018 26th European signal …, 2018 - ieeexplore.ieee.org
In recent decades, a significant research effort has been devoted to the development of
forensic tools for retrieving information and detecting possible tampering of multimedia …

The source identification game: An information-theoretic perspective

M Barni, B Tondi - IEEE Transactions on Information Forensics …, 2013 - ieeexplore.ieee.org
We introduce a theoretical framework in which to cast the source identification problem.
Thanks to the adoption of a game-theoretic approach, the proposed framework permits us to …

CNN-based detection of generic contrast adjustment with JPEG post-processing

M Barni, A Costanzo, E Nowroozi… - 2018 25th IEEE …, 2018 - ieeexplore.ieee.org
Detection of contrast adjustments in the presence of JPEG post processing is known to be a
challenging task. JPEG post processing is often applied innocently, as JPEG is the most …

On the vulnerability of deep learning to adversarial attacks for camera model identification

F Marra, D Gragnaniello, L Verdoliva - Signal Processing: Image …, 2018 - Elsevier
Camera model identification is a fundamental task for many investigative activities, and is
drawing great attention in the research community. In this context, convolutional neural …

[HTML][HTML] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords

ZM Saadi, AT Sadiq, OZ Akif, AK Farhan - Electronics, 2024 - mdpi.com
As technology advances and develops, the need for strong and simple authentication
mechanisms that can help protect data intensifies. The contemporary approach to giving …

JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality

W Fan, K Wang, F Cayre, Z **ong - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper proposes a JPEG anti-forensic method, which aims at removing from a given
image the footprints left by JPEG compression, in both the spatial domain and DCT domain …