Large-scale evaluation of splicing localization algorithms for web images
With the proliferation of smartphones and social media, journalistic practices are
increasingly dependent on information and images contributed by local bystanders through …
increasingly dependent on information and images contributed by local bystanders through …
Adversarial learning for constrained image splicing detection and localization based on atrous convolution
Y Liu, X Zhu, X Zhao, Y Cao - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Constrained image splicing detection and localization (CISDL), which investigates two input
suspected images and identifies whether one image has suspected regions pasted from the …
suspected images and identifies whether one image has suspected regions pasted from the …
Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection
Image splicing is a very common image manipulation technique that is sometimes used for
malicious purposes. A splicing detection and localization algorithm usually takes an input …
malicious purposes. A splicing detection and localization algorithm usually takes an input …
Image origin classification based on social network provenance
Recognizing information about the origin of a digital image has been individuated as a
crucial task to be tackled by the image forensic scientific community. Understanding …
crucial task to be tackled by the image forensic scientific community. Understanding …
Image provenance analysis at scale
Prior art has shown it is possible to estimate, through image processing and computer vision
techniques, the types and parameters of transformations that have been applied to the …
techniques, the types and parameters of transformations that have been applied to the …
Morphological filter detector for image forensics applications
Mathematical morphology provides a large set of powerful non-linear image operators,
widely used for feature extraction, noise removal or image enhancement. Although …
widely used for feature extraction, noise removal or image enhancement. Although …
Image splicing detection, localization and attribution via JPEG primary quantization matrix estimation and clustering
Detection of inconsistencies of double JPEG artifacts across different image regions is often
used to detect local image manipulations, like image splicing, and to localize them. In this …
used to detect local image manipulations, like image splicing, and to localize them. In this …
Automatic discovery of political meme genres with diverse appearances
Forms of human communication are not static---we expect some evolution in the way
information is conveyed over time because of advances in technology. One example of this …
information is conveyed over time because of advances in technology. One example of this …
Benchmarking unsupervised near-duplicate image detection
Unsupervised near-duplicate detection has many practical applications ranging from social
media analysis and web-scale retrieval, to digital image forensics. It entails running a …
media analysis and web-scale retrieval, to digital image forensics. It entails running a …
Beyond pixels: Image provenance analysis leveraging metadata
Creative works, whether paintings or memes, follow unique journeys that result in their final
form. Understanding these journeys, a process known as" provenance analysis," provides …
form. Understanding these journeys, a process known as" provenance analysis," provides …