Digital image forgery detection using passive techniques: A survey
Today manipulation of digital images has become easy due to powerful computers,
advanced photo-editing software packages and high resolution capturing devices. Verifying …
advanced photo-editing software packages and high resolution capturing devices. Verifying …
An overview on image forensics
A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …
area of image forensics. These techniques have been designed to identify the source of a …
Digital image forensics: a booklet for beginners
Digital visual media represent nowadays one of the principal means for communication.
Lately, the reliability of digital visual information has been questioned, due to the ease in …
Lately, the reliability of digital visual information has been questioned, due to the ease in …
An overview on video forensics
The broad availability of tools for the acquisition and processing of multimedia signals has
recently led to the concern that images and videos cannot be considered a trustworthy …
recently led to the concern that images and videos cannot be considered a trustworthy …
Digital image integrity–a survey of protection and verification techniques
P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …
computational imaging and adoption of artificial intelligence have spawned new editing …
A bibliography on blind methods for identifying image forgery
B Mahdian, S Saic - Signal Processing: Image Communication, 2010 - Elsevier
Verifying the integrity of digital images and detecting the traces of tampering without using
any protecting pre-extracted or pre-embedded information have become an important and …
any protecting pre-extracted or pre-embedded information have become an important and …
Digital image authentication from JPEG headers
It is often desirable to determine if an image has been modified in any way from its original
recording. The JPEG format affords engineers many implementation trade-offs which give …
recording. The JPEG format affords engineers many implementation trade-offs which give …
[HTML][HTML] Recent advances in passive digital image security forensics: A brief review
With the development of sophisticated image editing and manipulation tools, the originality
and authenticity of a digital image is usually hard to determine visually. In order to detect …
and authenticity of a digital image is usually hard to determine visually. In order to detect …
Exposing digital forgeries from 3-D lighting environments
When creating a photographic composite, it can be difficult to match lighting conditions. We
describe a technique for measuring lighting conditions in an image, and describe its use in …
describe a technique for measuring lighting conditions in an image, and describe its use in …
Exposing photo manipulation with inconsistent shadows
We describe a geometric technique to detect physically inconsistent arrangements of
shadows in an image. This technique combines multiple constraints from cast and attached …
shadows in an image. This technique combines multiple constraints from cast and attached …