An overview on image forensics
A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …
area of image forensics. These techniques have been designed to identify the source of a …
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …
This resulted into both human and financial losses at all IoT levels especially individual and …
Temporal forensics and anti-forensics for motion compensated video
Due to the ease with which digital information can be altered, many digital forensic
techniques have been developed to authenticate multimedia content. Similarly, a number of …
techniques have been developed to authenticate multimedia content. Similarly, a number of …
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy
Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the
digital forensic community. Thus, new research initiatives and strategies must be formulated …
digital forensic community. Thus, new research initiatives and strategies must be formulated …
Adversarial multimedia forensics: Overview and challenges ahead
In recent decades, a significant research effort has been devoted to the development of
forensic tools for retrieving information and detecting possible tampering of multimedia …
forensic tools for retrieving information and detecting possible tampering of multimedia …
The source identification game: An information-theoretic perspective
We introduce a theoretical framework in which to cast the source identification problem.
Thanks to the adoption of a game-theoretic approach, the proposed framework permits us to …
Thanks to the adoption of a game-theoretic approach, the proposed framework permits us to …
Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations
The number of cyber attacks has increased tremendously in the last few years. This resulted
into both human and financial losses at the individual and organization levels. Recently …
into both human and financial losses at the individual and organization levels. Recently …
Videofact: detecting video forgeries using attention, scene context, and forensic traces
Fake videos represent an important misinformation threat. While existing forensic networks
have demonstrated strong performance on image forgeries, recent results reported on the …
have demonstrated strong performance on image forgeries, recent results reported on the …
Game-theoretic decision support for cyber forensic investigations
The use of anti-forensic techniques is a very common practice that stealthy adversaries may
deploy to minimise their traces and make the investigation of an incident harder by evading …
deploy to minimise their traces and make the investigation of an incident harder by evading …
A universal technique to hide traces of histogram-based image manipulations
We propose a universal counter-forensic technique for concealing traces left on the image
histogram by any processing tool. Under the assumption that the forensic analysis relies on …
histogram by any processing tool. Under the assumption that the forensic analysis relies on …