Results 1 - 10
of
14
Multimedia forensics is not computer forensics
- in Computational Forensics, Third International Workshop, IWCF 2009, The Hague
"... Abstract. The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics ..."
Abstract
-
Cited by 12 (3 self)
- Add to MetaCart
(Show Context)
Abstract. The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigator’s view on (parts of) reality, which itself is not fully cognizable. Important consequences on the reliability of probative facts emerge with regard to available counter-forensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments. 1
Blind methods for detecting image fakery
- Proc. IEEE International Conference on Security Technology
, 2008
"... Abstract- In today’s digital age, it is possible to ef-fortlessly create image forgeries without leaving any ob-vious traces of tampering. In this paper we bring a brief review of existing blind methods for detecting image fak-ery. Blind methods are regarded as a new direction and work without using ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
(Show Context)
Abstract- In today’s digital age, it is possible to ef-fortlessly create image forgeries without leaving any ob-vious traces of tampering. In this paper we bring a brief review of existing blind methods for detecting image fak-ery. Blind methods are regarded as a new direction and work without using any prior information about the image being investigated or its source.
IMAGE DIVERSITY ANALYSIS: CONTEXT, OPINION AND BIAS
"... Abstract. The diffusion of new Internet and web technologies has increased the distribution of different digital content, such as text, sounds, images and videos. In this paper we focus on images and their role in the analysis of diversity. We consider diversity as a concept that takes into account ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
(Show Context)
Abstract. The diffusion of new Internet and web technologies has increased the distribution of different digital content, such as text, sounds, images and videos. In this paper we focus on images and their role in the analysis of diversity. We consider diversity as a concept that takes into account the wide variety of information sources, and their differences in perspective and viewpoint. We describe a number of different dimensions of diversity; in particular, we analyze the dimensions related to image searches and context analysis, emotions conveyed by images and opinion mining, and bias analysis. 1
Reverse engineering of double compressed images in the presence of contrast enhancement
- in Proc. IEEE Workshop Multimedia Signal Process
, 2013
"... Abstract-A comparison between two forensic techniques for the reverse engineering of a chain composed by a double JPEG compression interleaved by a linear contrast enhancement is presented here. The first approach is based on the well known peak-to-valley behavior of the histogram of double-quantiz ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
Abstract-A comparison between two forensic techniques for the reverse engineering of a chain composed by a double JPEG compression interleaved by a linear contrast enhancement is presented here. The first approach is based on the well known peak-to-valley behavior of the histogram of double-quantized DCT coefficients, while the second approach is based on the distribution of the first digit of DCT coefficients. These methods have been extended to the study of the considered processing chain, for both the chain detection and the estimation of its parameters. More specifically, the proposed approaches provide an estimation of the quality factor of the previous JPEG compression and the amount of linear contrast enhancement.
Survey on Pixel and Format Based Image Forgery Detection Techniques Anil Dada Warbhe
"... In recent years, digital forensics emerged as a powerful and promising discipline to identify, detect and authenticate the digital images. This could be the authentic ground to present a proof of tempering as evidence in the court of law. The trust we have had till now in believing what we see start ..."
Abstract
- Add to MetaCart
(Show Context)
In recent years, digital forensics emerged as a powerful and promising discipline to identify, detect and authenticate the digital images. This could be the authentic ground to present a proof of tempering as evidence in the court of law. The trust we have had till now in believing what we see started eroding. This is all happening due to the availability of the low cost, sophisticated yet easy to use tools and techniques. Due to the availability of these tools tempering the digital photographs getting easier and easier but at the same time it’s very difficult to detect traces, if viewed by necked eye. Image forensic tools are mainly classified based on the approach used; active or passive. We here present a survey on pixel-based and format-based techniques, which comes under the realm of passive approach for digital image forgery detection.
Shift Recompression-Based Feature Mining for Detecting Content-Aware Scaled Forgery in JPEG Images
"... Content-aware image resizing, also known as image retargeting, seam carving, content-aware scaling, is originally proposed to automatically remove the paths of least importance, known as seams, to reduce image size or insert seams to extend it, in order to display images without distortion on variou ..."
Abstract
- Add to MetaCart
(Show Context)
Content-aware image resizing, also known as image retargeting, seam carving, content-aware scaling, is originally proposed to automatically remove the paths of least importance, known as seams, to reduce image size or insert seams to extend it, in order to display images without distortion on various media especially on mobile devices, such as smartphones and PDAs. Content-aware scaling also allows removing entire objects from photographs without observed clues, and hence it has been used to tamper images. Due to the ubiquity of JPEG images on various mobile devices, it is increasingly necessary to authenticate these JPEG images for legitimate purposes. To detect the content-aware-based forgery in JPEG images, in this paper, we merge shift-recompression-based characteristic features in spatial domain and shift-recompression-based neighboring joint density in DCT domain together; an ensemble classifier is used to discriminate forged JPEG images from intact JPEG images. We also transfer other popular JPEG-based steganalysis methods to detecting the forgery. Experimental results show that steganalysis methods are effective in detecting context-aware-based JPEG forgery and our method is superior to other compared detection methods.
Author's personal copy A bibliography on blind methods for identifying image forgery
"... a b s t r a c t Verifying the integrity of digital images and detecting the traces of tampering without using any protecting pre-extracted or pre-embedded information have become an important and hot research field. The popularity of this field and the rapid growth in papers published during the la ..."
Abstract
- Add to MetaCart
(Show Context)
a b s t r a c t Verifying the integrity of digital images and detecting the traces of tampering without using any protecting pre-extracted or pre-embedded information have become an important and hot research field. The popularity of this field and the rapid growth in papers published during the last years have put considerable need on creating a complete bibliography addressing published papers in this area. In this paper, an extensive list of blind methods for detecting image forgery is presented. By the word blind we refer to those methods that use only the image function. An attempt has been made to make this paper complete by listing most of the existing references and by providing a detailed classification group.
General
"... This paper adds a new perspective to the analysis and detection of periodic interpolation artifacts in resized digital images. Instead of relying on a single, global predictor, we discuss how the specific structure of resized images can be explicitly modeled by a series of linear predictors. Charact ..."
Abstract
- Add to MetaCart
(Show Context)
This paper adds a new perspective to the analysis and detection of periodic interpolation artifacts in resized digital images. Instead of relying on a single, global predictor, we discuss how the specific structure of resized images can be explicitly modeled by a series of linear predictors. Characteristic periodic correlations between neighboring pixels are then measured in the estimated predictor coefficients itself. Experimental results on a large database of images suggest a superior detection performance compared to state-of-the-art methods.