An overview on image forensics

A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …

Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman, A Chehab - Internet of Things, 2022 - Elsevier
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …

Temporal forensics and anti-forensics for motion compensated video

MC Stamm, WS Lin, KJR Liu - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Due to the ease with which digital information can be altered, many digital forensic
techniques have been developed to authenticate multimedia content. Similarly, a number of …

Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy

K Conlan, I Baggili, F Breitinger - Digital investigation, 2016 - Elsevier
Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the
digital forensic community. Thus, new research initiatives and strategies must be formulated …

Adversarial multimedia forensics: Overview and challenges ahead

M Barni, MC Stamm, B Tondi - 2018 26th European signal …, 2018 - ieeexplore.ieee.org
In recent decades, a significant research effort has been devoted to the development of
forensic tools for retrieving information and detecting possible tampering of multimedia …

The source identification game: An information-theoretic perspective

M Barni, B Tondi - IEEE Transactions on Information Forensics …, 2013 - ieeexplore.ieee.org
We introduce a theoretical framework in which to cast the source identification problem.
Thanks to the adoption of a game-theoretic approach, the proposed framework permits us to …

Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman… - arxiv preprint arxiv …, 2021 - arxiv.org
The number of cyber attacks has increased tremendously in the last few years. This resulted
into both human and financial losses at the individual and organization levels. Recently …

Videofact: detecting video forgeries using attention, scene context, and forensic traces

TD Nguyen, S Fang, MC Stamm - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
Fake videos represent an important misinformation threat. While existing forensic networks
have demonstrated strong performance on image forgeries, recent results reported on the …

Game-theoretic decision support for cyber forensic investigations

A Nisioti, G Loukas, S Rass, E Panaousis - Sensors, 2021 - mdpi.com
The use of anti-forensic techniques is a very common practice that stealthy adversaries may
deploy to minimise their traces and make the investigation of an incident harder by evading …

A universal technique to hide traces of histogram-based image manipulations

M Barni, M Fontani, B Tondi - Proceedings of the on Multimedia and …, 2012 - dl.acm.org
We propose a universal counter-forensic technique for concealing traces left on the image
histogram by any processing tool. Under the assumption that the forensic analysis relies on …