Digital image forgery detection using passive techniques: A survey

GK Birajdar, VH Mankar - Digital investigation, 2013 - Elsevier
Today manipulation of digital images has become easy due to powerful computers,
advanced photo-editing software packages and high resolution capturing devices. Verifying …

An overview on image forensics

A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …

Digital image forensics: a booklet for beginners

JA Redi, W Taktak, JL Dugelay - Multimedia Tools and Applications, 2011 - Springer
Digital visual media represent nowadays one of the principal means for communication.
Lately, the reliability of digital visual information has been questioned, due to the ease in …

An overview on video forensics

S Milani, M Fontani, P Bestagini, M Barni… - … Transactions on Signal …, 2012 - cambridge.org
The broad availability of tools for the acquisition and processing of multimedia signals has
recently led to the concern that images and videos cannot be considered a trustworthy …

Digital image integrity–a survey of protection and verification techniques

P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …

A bibliography on blind methods for identifying image forgery

B Mahdian, S Saic - Signal Processing: Image Communication, 2010 - Elsevier
Verifying the integrity of digital images and detecting the traces of tampering without using
any protecting pre-extracted or pre-embedded information have become an important and …

Digital image authentication from JPEG headers

E Kee, MK Johnson, H Farid - IEEE transactions on information …, 2011 - ieeexplore.ieee.org
It is often desirable to determine if an image has been modified in any way from its original
recording. The JPEG format affords engineers many implementation trade-offs which give …

[HTML][HTML] Recent advances in passive digital image security forensics: A brief review

X Lin, JH Li, SL Wang, F Cheng, XS Huang - Engineering, 2018 - Elsevier
With the development of sophisticated image editing and manipulation tools, the originality
and authenticity of a digital image is usually hard to determine visually. In order to detect …

Exposing digital forgeries from 3-D lighting environments

E Kee, H Farid - 2010 IEEE International Workshop on …, 2010 - ieeexplore.ieee.org
When creating a photographic composite, it can be difficult to match lighting conditions. We
describe a technique for measuring lighting conditions in an image, and describe its use in …

Exposing photo manipulation with inconsistent shadows

E Kee, JF O'Brien, H Farid - ACM Transactions on Graphics (ToG), 2013 - dl.acm.org
We describe a geometric technique to detect physically inconsistent arrangements of
shadows in an image. This technique combines multiple constraints from cast and attached …