A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions

ST Nabi, M Kumar, P Singh, N Aggarwal, K Kumar - Multimedia Systems, 2022 - Springer
With the advent of Internet, images and videos are the most vulnerable media that can be
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …

[HTML][HTML] Recent advances in passive digital image security forensics: A brief review

X Lin, JH Li, SL Wang, F Cheng, XS Huang - Engineering, 2018 - Elsevier
With the development of sophisticated image editing and manipulation tools, the originality
and authenticity of a digital image is usually hard to determine visually. In order to detect …

Hybrid lstm and encoder–decoder architecture for detection of image forgeries

JH Bappy, C Simons, L Nataraj… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
With advanced image journaling tools, one can easily alter the semantic meaning of an
image by exploiting certain manipulation techniques such as copy clone, object splicing …

Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection

B Bayar, MC Stamm - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Identifying the authenticity and processing history of an image is an important task in
multimedia forensics. By analyzing traces left by different image manipulations, researchers …

Image tampering localization using a dense fully convolutional network

P Zhuang, H Li, S Tan, B Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The emergence of powerful image editing software has substantially facilitated digital image
tampering, leading to many security issues. Hence, it is urgent to identify tampered images …

Robust detection of image operator chain with two-stream convolutional neural network

X Liao, K Li, X Zhu, KJR Liu - IEEE Journal of Selected Topics …, 2020 - ieeexplore.ieee.org
Many forensic techniques have recently been developed to determine whether an image
has undergone a specific manipulation operation. When multiple consecutive operations are …

Exploiting spatial structure for localizing manipulated image regions

JH Bappy, AK Roy-Chowdhury… - Proceedings of the …, 2017 - openaccess.thecvf.com
The advent of high-tech journaling tools facilitates an image to be manipulated in a way that
can easily evade state-of-the-art image tampering detection approaches. The recent …

Detection and localization of image forgeries using resampling features and deep learning

J Bunk, JH Bappy, TM Mohammed… - … IEEE conference on …, 2017 - ieeexplore.ieee.org
Resampling is an important signature of manipulated images. In this paper, we propose two
methods to detect and localize image manipulations based on a combination of resampling …

Perceptual hashing for image authentication: A survey

L Du, ATS Ho, R Cong - Signal Processing: Image Communication, 2020 - Elsevier
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …

By leaps and bounds: An exclusive look at how boston dynamics is redefining robot agility

E Guizzo - IEEE Spectrum, 2019 - ieeexplore.ieee.org
WITH THEIR JAW-DROPPING agility and animal-like reflexes, Boston Dynamics' bioinspired
robots have always seemed to have no equal. But that preeminence hasn't stopped the …