Quantization Step Estimation for JPEG Image Forensics

Author(s):  
Wenjie Li ◽  
Xiaolong Li ◽  
Rongrong Ni ◽  
Yao Zhao
2017 ◽  
Vol 12 (1) ◽  
pp. 123-133 ◽  
Author(s):  
Thanh Hai Thai ◽  
Remi Cogranne ◽  
Florent Retraint ◽  
Thi-Ngoc-Canh Doan

2021 ◽  
Vol 11 (23) ◽  
pp. 11482
Author(s):  
Diana Crișan ◽  
Alexandru Irimia ◽  
Dan Gota ◽  
Liviu Miclea ◽  
Adela Puscasiu ◽  
...  

The Newcomb–Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as image forensics. In this article, we study JPEG compression from the point of view of Benford’s law. The article focuses on ways to detect fraudulent images and JPEG quality factors. Moreover, using the image’s luminance channel and JPEG coefficients, we describe a technique for determining the quality factor with which a JPEG image is compressed. The algorithm’s results are described in considerably more depth in the article’s final sections. Furthermore, the proposed idea is applicable to any procedure that involves the analysis of digital images and in which it is strongly suggested that the image authenticity be verified prior to beginning the analyzing process.


2020 ◽  
Vol 2020 (4) ◽  
pp. 116-1-116-7
Author(s):  
Raphael Antonius Frick ◽  
Sascha Zmudzinski ◽  
Martin Steinebach

In recent years, the number of forged videos circulating on the Internet has immensely increased. Software and services to create such forgeries have become more and more accessible to the public. In this regard, the risk of malicious use of forged videos has risen. This work proposes an approach based on the Ghost effect knwon from image forensics for detecting forgeries in videos that can replace faces in video sequences or change the mimic of a face. The experimental results show that the proposed approach is able to identify forgery in high-quality encoded video content.


2009 ◽  
Vol 34 (12) ◽  
pp. 1458-1466 ◽  
Author(s):  
Qiong WU ◽  
Guo-Hui LI ◽  
Dan TU ◽  
Shao-Jie SUN

Author(s):  
Mohd Dilshad Ansari ◽  
Ekbal Rashid ◽  
S Siva Skandha ◽  
Suneet Kumar Gupta

Background: image forensics deal with the problem of authentication of pictures or their origins. There are two types of forensics techniques namely active and passive. Passive forgery is also known as blind forensics technique. In passive forgery, copy-move (cloning) image forensics is most common forgery technique. In this approach, an object or region of a picture is copied and positioned somewhere else in the same image. Active method used watermarking to solve picture genuineness problem. It has limitations like human involvement or particularly equipped cameras. To overwhelm these limitations, numerous passive authentication approaches have been developed. Moreover, both approaches do not require any prior information about the picture. Objective: The prime objective of this survey is to provide an inclusive summary as well as recent advancement, challenges and future direction in image forensics. In Today’s digital era the digital pictures and videos are having great impact on our life as well as society, as they became the important source of information. Though earlier it was very difficult to doctor the picture, nowadays digital pictures can be doctored easily with the help of editing tools and internet. These practices make pictures as well as videos genuineness deceptive. Conclusion: This paper presents the current state-of- the-art of passive (cloning) image forensics techniques, challenges and future direction of this research domain. Further, the major open issues in developing a robust cloning image forensics detector with their performance are discussed. Lastly, the available benchmark datasets are also discussed


Sign in / Sign up

Export Citation Format

Share Document