Media forensics and deepfakes: an overview

L Verdoliva - IEEE journal of selected topics in signal …, 2020 - ieeexplore.ieee.org
With the rapid progress in recent years, techniques that generate and manipulate
multimedia content can now provide a very advanced level of realism. The boundary …

Digital image forgery detection using passive techniques: A survey

GK Birajdar, VH Mankar - Digital investigation, 2013 - Elsevier
Today manipulation of digital images has become easy due to powerful computers,
advanced photo-editing software packages and high resolution capturing devices. Verifying …

Using AI and social media multimodal content for disaster response and management: Opportunities, challenges, and future directions

M Imran, F Ofli, D Caragea, A Torralba - Information Processing & …, 2020 - Elsevier
Abstract People increasingly use Social Media (SM) platforms such as Twitter and Facebook
during disasters and emergencies to post situational updates including reports of injured or …

Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition

J Galbally, S Marcel, J Fierrez - IEEE transactions on image …, 2013 - ieeexplore.ieee.org
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured
synthetic or reconstructed sample is a significant problem in biometric authentication, which …

An overview on image forensics

A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …

Information forensics: An overview of the first decade

MC Stamm, M Wu, KJR Liu - IEEE access, 2013 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …

Image forgery detection

H Farid - IEEE Signal processing magazine, 2009 - ieeexplore.ieee.org
We are undoubtedly living in an age where we are exposed to a remarkable array of visual
imagery. While we may have historically had confidence in the integrity of this imagery …

Determining image origin and integrity using sensor noise

M Chen, J Fridrich, M Goljan… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
In this paper, we provide a unified framework for identifying the source digital camera from
its images and for revealing digitally altered images using photo-response nonuniformity …

Multi-scale analysis strategies in PRNU-based tampering localization

P Korus, J Huang - IEEE Transactions on Information Forensics …, 2016 - ieeexplore.ieee.org
Accurate unsupervised tampering localization is one of the most challenging problems in
digital image forensics. In this paper, we consider a photo response non-uniformity analysis …

Contrast enhancement-based forensics in digital images

G Cao, Y Zhao, R Ni, X Li - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
As a retouching manipulation, contrast enhancement is typically used to adjust the global
brightness and contrast of digital images. Malicious users may also perform contrast …