image forensics
Recently Published Documents


TOTAL DOCUMENTS

263
(FIVE YEARS 91)

H-INDEX

26
(FIVE YEARS 3)

2022 ◽  
pp. 119-147
Author(s):  
Qingzhong Liu ◽  
Tze-Li Hsu

The detection of different types of forgery manipulation including seam-carving in JPEG images is a hot spot in image forensics. Seam carving was originally designed for content-aware image resizing. It is also being used for forgery manipulation. It is still very challenging to effectively identify the seam carving forgery under recompression. To address the highly challenging detection problems, this chapter introduces an effective approach with large feature mining. Ensemble learning is used to deal with the high dimensionality and to avoid overfitting that may occur with some traditional learning classifier for the detection. The experimental results validate the efficacy of proposed approach to detecting JPEG double compression and exposing the seam-carving forgery while the JPEG recompression is proceeded at the same quality and a lower quality, which is generally much harder for traditional detection methods. The methodology introduced in this chapter provides a strategy and realistic approach to resolve the highly challenging problems in image forensics.


2021 ◽  
Vol 11 ◽  
pp. 396-433
Author(s):  
Tina Nikoukhah ◽  
Jérémy Anger ◽  
Miguel Colom ◽  
Jean-Michel Morel ◽  
Rafael Grompone von Gioi
Keyword(s):  

2021 ◽  
Author(s):  
Rony Abecidan ◽  
Vincent Itier ◽  
Jeremie Boulanger ◽  
Patrick Bas

2021 ◽  
Vol 11 (23) ◽  
pp. 11482
Author(s):  
Diana Crișan ◽  
Alexandru Irimia ◽  
Dan Gota ◽  
Liviu Miclea ◽  
Adela Puscasiu ◽  
...  

The Newcomb–Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as image forensics. In this article, we study JPEG compression from the point of view of Benford’s law. The article focuses on ways to detect fraudulent images and JPEG quality factors. Moreover, using the image’s luminance channel and JPEG coefficients, we describe a technique for determining the quality factor with which a JPEG image is compressed. The algorithm’s results are described in considerably more depth in the article’s final sections. Furthermore, the proposed idea is applicable to any procedure that involves the analysis of digital images and in which it is strongly suggested that the image authenticity be verified prior to beginning the analyzing process.


2021 ◽  
Vol 7 (11) ◽  
pp. 242
Author(s):  
Irene Amerini ◽  
Gianmarco Baldini ◽  
Francesco Leotta

Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security more and more [...]


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Yan Wang ◽  
Qindong Sun ◽  
Dongzhu Rong ◽  
Shancang Li ◽  
Li Da Xu

Digital image forensics is a key branch of digital forensics that based on forensic analysis of image authenticity and image content. The advances in new techniques, such as smart devices, Internet of Things (IoT), artificial images, and social networks, make forensic image analysis play an increasing role in a wide range of criminal case investigation. This work focuses on image source identification by analysing both the fingerprints of digital devices and images in IoT environment. A new convolutional neural network (CNN) method is proposed to identify the source devices that token an image in social IoT environment. The experimental results show that the proposed method can effectively identify the source devices with high accuracy.


2021 ◽  
Vol 11 (15) ◽  
pp. 6752
Author(s):  
Changhui You ◽  
Hong Zheng ◽  
Zhongyuan Guo ◽  
Tianyu Wang ◽  
Xiongbin Wu

In recent years, source camera identification has become a research hotspot in the field of image forensics and has received increasing attention. It has high application value in combating the spread of pornographic photos, copyright authentication of art photos, image tampering forensics, and so on. Although the existing algorithms greatly promote the research progress of source camera identification, they still cannot effectively reduce the interference of image content with image forensics. To suppress the influence of image content on source camera identification, a multiscale content-independent feature fusion network (MCIFFN) is proposed to solve the problem of source camera identification. MCIFFN is composed of three parallel branch networks. Before the image is sent to the first two branch networks, an adaptive filtering module is needed to filter the image content and extract the noise features, and then the noise features are sent to the corresponding convolutional neural networks (CNN), respectively. In order to retain the information related to the image color, this paper does not preprocess the third branch network, but directly sends the image data to CNN. Finally, the content-independent features of different scales extracted from the three branch networks are fused, and the fused features are used for image source identification. The CNN feature extraction network in MCIFFN is a shallow network embedded with a squeeze and exception (SE) structure called SE-SCINet. The experimental results show that the proposed MCIFFN is effective and robust, and the classification accuracy is improved by approximately 2% compared with the SE-SCINet network.


Sign in / Sign up

Export Citation Format

Share Document