25.3.10.2 Tamper Detection, Forensics

Chapter Contents (Back)
Watermark. Tamper Detection. Image Forensics. Forensics. Mostly not watermark based tamper detction, but it can be.
See also Forgery Detection for Images. Specifically copy-move:
See also Copy-Move Tamper Detection, Forensics.
See also Double Compression, Double JPEG Detection, Forensics.
See also Deepfakes, Face Synthesis, Fake News, Generation, Detection.

Yang, C.K.[Chen-Kuei], Huang, C.S.[Chang-Sheng],
A Novel Watermarking Technique for Tampering Detection in Digital Images,
ELCVIA(3), No. 1, 2004, pp. 1-12.
DOI Link 0402
BibRef

Knowles, H.D., Winne, D.A., Canagarajah, C.N., Bull, D.R.,
Image tamper detection and classification using support vector machines,
VISP(151), No. 4, August 2004, pp. 322-328.
IEEE Abstract. 0411
BibRef

Lin, P.L.[Phen Lan], Hsieh, C.K.[Chung-Kai], Huang, P.W.[Po-Whei],
A hierarchical digital watermarking method for image tamper detection and recovery,
PR(38), No. 12, December 2005, pp. 2519-2529.
Elsevier DOI 0510
BibRef

Chang, C.C.[Chin-Chen], Hu, Y.S.[Yih-Shin], Lu, T.C.[Tzu-Chuen],
A watermarking-based image ownership and tampering authentication scheme,
PRL(27), No. 5, 1 April 2006, pp. 439-446.
Elsevier DOI 0604
Image authentication; Ownership protection; Tampering detection BibRef

Chan, C.S.[Chi-Shiang], Chang, C.C.[Chin-Chen],
An efficient image authentication method based on Hamming code,
PR(40), No. 2, February 2007, pp. 681-690.
Elsevier DOI 0611
Image authentication; Tamper proofing; Hamming code; Torus automorphism BibRef

Peng, X.X.[Xin-Xin], Lu, J.F.[Jian-Feng], Li, L.[Li], Chang, C.C.[Chin-Chen], Zhou, Q.[Qili],
A New Card Authentication Scheme Based on Image Watermarking and Encryption,
IWDW16(358-369).
Springer DOI 1703
BibRef

Chan, C.S.[Chi-Shiang],
An image authentication method by applying Hamming code on rearranged bits,
PRL(32), No. 14, 15 October 2011, pp. 1679-1690.
Elsevier DOI 1110
Image authentication; Tamper proofing; Hamming code BibRef

Yang, H.J.[Hui-Juan], Kot, A.C.[Alex C.],
Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier,
SPLetters(13), No. 12, December 2006, pp. 741-744.
IEEE DOI 0701
BibRef

Chang, C.C.[Chin-Chen], Fan, Y.H.[Yi-Hsuan], Tai, W.L.[Wei-Liang],
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery,
PR(41), No. 2, February 2008, pp. 654-661.
Elsevier DOI 0711
Fragile watermarking; Image authentication; Tamper detection BibRef

Phan, R.C.W.[Raphael C.W.],
Tampering with a watermarking-based image authentication scheme,
PR(41), No. 11, November 2008, pp. 3493-3496.
Elsevier DOI 0808
Encoding; Watermarking; Information hiding; Digital rights management; Image authentication; Watermarking; Tampering; Ownership BibRef

Lee, T.Y.[Tien-You], Lin, S.D.[Shinfeng D.],
Dual watermark for image tamper detection and recovery,
PR(41), No. 11, November 2008, pp. 3497-3506.
Elsevier DOI 0808
Dual watermark; Tamper recovery; Second chance; Partner-block BibRef

Qi, X.J.[Xiao-Jun], Xin, X.[Xing],
A quantization-based semi-fragile watermarking scheme for image content authentication,
JVCIR(22), No. 2, February 2011, pp. 187-200.
Elsevier DOI 1102
Authentication measures; Error map; Quantization; Semi-fragile watermarking; Wavelet transform; Tampered error pixels; Tampering detection sensitivity; Localization capability BibRef

Qi, X.J.[Xiao-Jun], Xin, X.[Xing],
A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization,
JVCIR(30), No. 1, 2015, pp. 312-327.
Elsevier DOI 1507
Adaptive quantization BibRef

Qi, X.J.[Xiao-Jun], Xin, X.[Xing], Chang, R.[Ran],
Image authentication and tamper detection using two complementary watermarks,
ICIP09(4257-4260).
IEEE DOI 0911
BibRef

Chuang, J.C.[Jun-Chou], Hu, Y.C.[Yu-Chen],
An adaptive image authentication scheme for vector quantization compressed image,
JVCIR(22), No. 5, July 2011, pp. 440-449.
Elsevier DOI 1106
Tamper detection; Image authentication; Watermark; Image compression; Vector quantization; Index table; Random values; Random seed BibRef

Kim, K.S.[Kyung-Su], Lee, M.J.[Min-Jeong], Lee, J.W.[Ji-Won], Oh, T.W.[Tae-Woo], Lee, H.Y.[Hae-Yeoun],
Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging,
CVIU(115), No. 9, September 2011, pp. 1308-1323.
Elsevier DOI 1107
Content authentication; Homogeneity analysis; Quad-tree decomposition; Tampering detection; Tampering recovery BibRef

Oh, T.W.[Tae-Woo], Kim, K.S.[Kyung-Su], Lee, H.Y.[Hae-Yeon], Lee, J.W.[Ji-Won], Lee, H.K.[Heung-Kyu],
Enhancing perceptual quality of watermarked high-definition video through composite mask,
IPTA10(161-165).
IEEE DOI 1007
BibRef

Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
Improved watermark detection robust to camcorder capture based on quadrangle estimation,
ICIP09(101-104).
IEEE DOI 0911
BibRef

Kim, H.D.[Hee-Dong], Oh, T.W.[Tae-Woo], Lee, J.W.[Ji-Won], Lee, H.K.[Heung-Kyu],
A hybrid watermarking scheme for CCL-applied video contents,
EUVIP11(199-204).
IEEE DOI 1110
BibRef

Oh, T.W.[Tae-Woo], Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Yoon, Y.S.[Young-Suk], Lee, H.K.[Heung-Kyu],
Spatial self-synchronizing video watermarking technique,
ICIP09(4233-4236).
IEEE DOI 0911
BibRef

Lee, M.J.[Min-Jeong], Kim, K.S.[Kyung-Su], Lee, H.Y.[Hae-Yeoun], Oh, T.W.[Tae-Woo], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
Robust watermark detection against D-A/A-D conversion for digital cinema using local auto-correlation function,
ICIP08(425-428).
IEEE DOI 0810
BibRef

Kim, K.S.[Kyung-Su], Im, D.H.[Dong-Hyuck], Suh, Y.H.[Young-Ho], Lee, H.K.[Heung-Kyu],
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack,
DW07(323-334).
Springer DOI 0712
BibRef

He, Z.W.[Zhong-Wei], Sun, W.[Wei], Lu, W.[Wei], Lu, H.T.[Hong-Tao],
Digital image splicing detection based on approximate run length,
PRL(32), No. 12, 1 September 2011, pp. 1591-1597.
Elsevier DOI 1108
Image splicing detection; Digital image forensics; Approximate run length; Edge detection; Characteristic function BibRef

Zhang, Q.B.[Qing-Bo], Lu, W.[Wei], Weng, J.[Jian],
Joint image splicing detection in DCT and Contourlet transform domain,
JVCIR(40, Part B), No. 1, 2016, pp. 449-458.
Elsevier DOI 1610
Image splicing detection BibRef

He, Z.W.[Zhong-Wei], Lu, W.[Wei], Sun, W.[Wei],
Improved Run Length Based Detection of Digital Image Splicing,
IWDW11(349-360).
Springer DOI 1208
BibRef

He, Z.W.[Zhong-Wei], Lu, W.[Wei], Sun, W.[Wei], Huang, J.W.[Ji-Wu],
Digital image splicing detection based on Markov features in DCT and DWT domain,
PR(45), No. 12, December 2012, pp. 4292-4299.
Elsevier DOI 1208
Image splicing detection; Digital image forensics; Discrete cosine transform; Discrete wavelet transform; Markov; SVM-RFE BibRef

Feng, X., Cox, I.J., Doerr, G.,
Normalized Energy Density-Based Forensic Detection of Resampled Images,
MultMed(14), No. 3, 2012, pp. 536-545.
IEEE DOI 1202
BibRef

Faridul, H.S.[Hasan Sheikh], Doerr, G.[Gwenael],
Outlier aggregation to pick up scattered watermark energy,
ICIP15(2485-2489)
IEEE DOI 1511
Cross-correlation BibRef

Lee, J.W.[Ji-Won], Lee, M.J.[Min-Jeong], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Screenshot identification by analysis of directional inequality of interlaced video,
JIVP(2012), No. 1 2012, pp. xx-yy.
DOI Link 1202
BibRef

Wang, X.F.[Xiao-Feng], Xue, J.R.[Jian-Ru], Zheng, Z.Q.[Zhen-Qiang], Liu, Z.L.[Zhen-Li], Li, N.[Ning],
Image forensic signature for content authenticity analysis,
JVCIR(23), No. 5, July 2012, pp. 782-797.
Elsevier DOI 1205
Forensic signature; Robust image hash; Content authenticity analysis; Geometric transform estimation; Tampering detection; Tampering localization; Adaptive Harris corner detection; Fisher criterion BibRef

Barni, M., Costanzo, A.,
A fuzzy approach to deal with uncertainty in image forensics,
SP:IC(27), No. 9, October 2012, pp. 998-1010.
Elsevier DOI 1210
Image forensics; Tampering detection; Fuzzy logic; Data fusion BibRef

Sencar, H.T.[Husrev Taha], Memon, N.[Nasir], (Eds.)
Digital Image Forensics: There is More to a Picture than Meets the Eye,
Springer2013 ISBN 978-1-4614-0756-0


WWW Link. 1211
BibRef

Memon, N.[Nasir],
Photo Forensics: There Is More to a Picture than Meets the Eye,
IWDW11(2).
Springer DOI 1208
BibRef
And: AVSBS11(3).
IEEE DOI 1111
Keynote, summary of ideas. BibRef

Tong, X.J.[Xiao-Jun], Liu, Y.[Yang], Zhang, M.[Miao], Chen, Y.[Yue],
A novel chaos-based fragile watermarking for image tampering detection and self-recovery,
SP:IC(28), No. 3, March 2013, pp. 301-308.
Elsevier DOI 1303
Chaos; Image security; Fragile watermarking; Tampering localization; Self-recovery BibRef

Singh, D.[Durgesh], Shivani, S.[Shivendra], Agarwal, S.[Suneeta],
Quantization-Based Fragile Watermarking Using Block-Wise Authentication and Pixel-Wise Recovery Scheme for Tampered Image,
IJIG(13), No. 2, April 2013, pp. 1340002.
DOI Link 1308
BibRef
Earlier: A2, A1, A3:
DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme,
IbPRIA13(640-647).
Springer DOI 1307
BibRef

Chen, C.L.[Cheng-Long], Ni, J.Q.[Jiang-Qun], Huang, J.W.[Ji-Wu],
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach,
IP(22), No. 12, 2013, pp. 4699-4710.
IEEE DOI 1312
BibRef
Earlier: A1, A2, Only:
Median Filtering Detection Using Edge Based Prediction Matrix,
IWDW11(361-375).
Springer DOI 1208
image coding BibRef

Tokuda, E.[Eric], Pedrini, H.[Helio], Rocha, A.[Anderson],
Computer generated images vs. digital photographs: A synergetic feature and classifier combination approach,
JVCIR(24), No. 8, 2013, pp. 1276-1292.
Elsevier DOI 1312
Digital forensics BibRef

Ryu, S.J.[Seung-Jin], Lee, H.K.[Heung-Kyu],
Estimation of linear transformation by analyzing the periodicity of interpolation,
PRL(36), No. 1, 2014, pp. 89-99.
Elsevier DOI 1312
Image forensics BibRef

Kannammal, A., Rani, S.S.[S. Subha],
Two level security for medical images using watermarking/encryption algorithms,
IJIST(24), No. 1, 2014, pp. 111-120.
DOI Link 1403
digital imaging and communications in medicine BibRef

Ryu, S.J.[Seung-Jin], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Detecting Trace of Seam Carving for Forensic Analysis,
IEICE(E97-D), No. 5, May 2014, pp. 1304-1311.
WWW Link. 1405
BibRef

Yang, B.J.[Ben-Juan], Liu, B.Y.[Ben-Yong],
Feature Fusion for Blurring Detection in Image Forensics,
IEICE(E97-D), No. 6, June 2014, pp. 1690-1693.
WWW Link. 1407
BibRef

Chang, T.Y.[Tang-You], Tai, S.C.[Shen-Chuan], Lin, G.S.[Guo-Shiang],
A passive multi-purpose scheme based on periodicity analysis of CFA artifacts for image forensics,
JVCIR(25), No. 6, 2014, pp. 1289-1298.
Elsevier DOI 1407
Image forensics BibRef

Vellaisamy, S., Ramesh, V.,
Inversion attack resilient zero-watermarking scheme for medical image authentication,
IET-IPR(8), No. 12, 2014, pp. 718-727.
DOI Link 1412
image watermarking BibRef

Bian, S.[Shan], Luo, W.Q.[Wei-Qi], Huang, J.W.[Ji-Wu],
Exposing Fake Bit Rate Videos and Estimating Original Bit Rates,
CirSysVideo(24), No. 12, December 2014, pp. 2144-2154.
IEEE DOI 1412
BibRef
Earlier:
Exposing fake bitrate video and its original bitrate,
ICIP13(4492-4496)
IEEE DOI 1402
Feature extraction. Digital Video Forensics; Fake Bitrate Video; Video Bitrate Estimation BibRef

de Rosa, A., Fontani, M., Massai, M., Piva, A., Barni, M.,
Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics,
SPLetters(22), No. 8, August 2015, pp. 1132-1136.
IEEE DOI 1502
digital forensics BibRef

Chu, X., Stamm, M.C.[Matthew C.], Chen, Y., Liu, K.J.R.[K. J. Ray],
On Antiforensic Concealability With Rate-Distortion Tradeoff,
IP(24), No. 3, March 2015, pp. 1087-1100.
IEEE DOI 1502
Detectors BibRef

Stamm, M.C.[Matthew C.], Tjoa, S.K.[Steven K.], Lin, W.S.[W. Sabrina], Liu, K.J.R.[K. J. Ray],
Undetectable image tampering through JPEG compression anti-forensics,
ICIP10(2109-2112).
IEEE DOI 1009
BibRef

Zhao, X., Wang, S., Li, S., Li, J.,
Passive Image-Splicing Detection by a 2-D Noncausal Markov Model,
CirSysVideo(25), No. 2, February 2015, pp. 185-199.
IEEE DOI 1502
Analytical models BibRef

Yoshida, M.[Maki], Ohkita, K.[Kazuya], Fujiwara, T.[Toru],
Individual Restoration of Tampered Pixels for Statistical Fragile Watermarking,
IEICE(E98-D), No. 1, January 2015, pp. 58-64.
WWW Link. 1503
BibRef

Ohkita, K.[Kazuya], Yoshida, M.[Maki], Kitamura, I.[Itaru], Fujiwara, T.[Toru],
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking,
DW09(279-293).
Springer DOI 0908
BibRef

Lee, S.W.[Sang-Wook], Song, J.E.[Ji Eun], Lee, W.Y.[Wan Yeon], Ko, Y.W.[Young Woong], Lee, H.[Heejo],
Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations,
IEICE(E98-D), No. 1, January 2015, pp. 95-97.
WWW Link. 1503
BibRef

Eswaraiah, R., Reddy, E.S.[E. Sreenivasa],
Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest,
IET-IPR(9), No. 8, 2015, pp. 615-625.
DOI Link 1506
Internet BibRef

Khan, Z.[Zohaib], Shafait, F.[Faisal], Mian, A.[Ajmal],
Automatic ink mismatch detection for forensic document analysis,
PR(48), No. 11, 2015, pp. 3615-3626.
Elsevier DOI 1506
BibRef
Earlier:
Hyperspectral Document Imaging: Challenges and Perspectives,
CBDAR13(150-163).
Springer DOI 1404
BibRef
Earlier:
Hyperspectral Imaging for Ink Mismatch Detection,
ICDAR13(877-881)
IEEE DOI 1312
Hyperspectral imaging. document image processing BibRef

Khan, Z.[Zohaib], Shafait, F.[Faisal], Mian, A.[Ajmal],
Joint Group Sparse PCA for Compressed Hyperspectral Imaging,
IP(24), No. 12, December 2015, pp. 4934-4942.
IEEE DOI 1512
compressed sensing BibRef

Hou, J.[Jun], Cheng, Y.[Yan],
Expose Spliced Photographic Basing on Boundary and Noise Features,
IEICE(E98-D), No. 7, July 2015, pp. 1426-1429.
WWW Link. 1508
BibRef

Chen, J.S.[Jian-Sheng], Kang, X.G.[Xian-Gui], Liu, Y.[Ye], Wang, Z.J.,
Median Filtering Forensics Based on Convolutional Neural Networks,
SPLetters(22), No. 11, November 2015, pp. 1849-1853.
IEEE DOI 1509
digital forensics BibRef

Botta, M.[Marco], Cavagnino, D.[Davide], Pomponiu, V.[Victor],
Optimization techniques to transform fragile watermarking,
SPIE(Newsroom), July 11, 2015
DOI Link 1511
An algorithm alters image pixels to enable insertion of a watermark into the coefficients of a transformed domain, without the need for inverse transformation. BibRef

Carvalho, T.[Tiago],
Illumination Inconsistency Sleuthing for Exposing Fauxtography and Uncovering Composition Telltales in Digital Images,
ELCVIA(14), No. 3, 2015, pp. xx-yy.
DOI Link 1601
Thesis summary. Is the image real or composed. BibRef

Mittal, A., Saad, M.A., Bovik, A.C.,
A Completely Blind Video Integrity Oracle,
IP(25), No. 1, January 2016, pp. 289-300.
IEEE DOI 1601
Databases BibRef

Korus, P., Huang, J.,
Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk,
SPLetters(23), No. 1, January 2016, pp. 169-173.
IEEE DOI 1601
Detectors BibRef

Korus, P., Huang, J.,
Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images,
IP(25), No. 3, March 2016, pp. 1312-1326.
IEEE DOI 1602
Authentication BibRef

Pasquini, C.[Cecilia],
Statistical and deterministic approaches for multimedia forensics,
ELCVIA(15), No. 2, 2016, pp. 16-18.
DOI Link 1611
BibRef

Iuliani, M.[Massimo], Fanfani, M.[Marco], Colombo, C.[Carlo], Piva, A.[Alessandro],
Reliability assessment of principal point estimates for forensic applications,
JVCIR(42), No. 1, 2017, pp. 65-77.
Elsevier DOI 1701
camera principal point. Image Forensics BibRef

Liu, Q.Z.[Qing-Zhong],
An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics,
PR(65), No. 1, 2017, pp. 35-46.
Elsevier DOI 1702
BibRef
Earlier:
Exposing seam carving forgery under recompression attacks by hybrid large feature mining,
ICPR16(1041-1046)
IEEE DOI 1705
Discrete cosine transforms, Feature extraction, Forgery, Image coding, Image forensics, Medical services, Transform coding, big feature mining, image forgery, recompression, seam carving. BibRef

Shen, X.J.[Xuan-Jing], Shi, Z.[Zenan], Chen, H.P.[Hai-Peng],
Splicing image forgery detection using textural features based on the grey level co-occurrence matrices,
IET-IPR(11), No. 1, January 2017, pp. 44-53.
DOI Link 1703
BibRef

Chen, C., Ni, J., Shen, Z., Shi, Y.Q.,
Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications,
IP(26), No. 6, June 2017, pp. 2811-2824.
IEEE DOI 1705
frequency-domain analysis, image forensics, image sampling, blind forensics, characteristic resampling peaks, digital images, frequency domain, image authentication, image forgery detection, image geometric transformation, image security, periodic artifacts, repeated resizing, repeated rotation, resizing-rotation, second-order statistics, spectral method, successive geometric transformation, undergone single-geometric transformation, Digital images, Forensics, Forgery, Image coding, Image reconstruction, Interpolation, Transform coding, Digital image forensics, geometric transformations, image forgery detection, interpolation detection, resampling, detection BibRef

Hou, J.U., Lee, H.K.,
Detection of Hue Modification Using Photo Response Nonuniformity,
CirSysVideo(27), No. 8, August 2017, pp. 1826-1832.
IEEE DOI 1708
Algorithm design and analysis, Correlation, Digital images, Estimation, Forensics, Forgery, Image color analysis, Color filter array (CFA), digital image forensics, hue, photo response nonuniformity (PRNU), sensor, pattern, noise BibRef

Zhang, D.Y.[Deng-Yong], Yin, T.[Ting], Yang, G.B.[Gao-Bo], Xia, M.[Ming], Li, L.[Leida], Sun, X.M.[Xing-Ming],
Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies,
JVCIR(48), No. 1, 2017, pp. 281-291.
Elsevier DOI 1708
Image forensics BibRef

Ding, F.[Feng], Zhu, G.P.[Guo-Pu], Dong, W.Q.[Wei-Qiang], Shi, Y.Q.[Yun-Qing],
An efficient weak sharpening detection method for image forensics,
JVCIR(50), No. 1, 2018, pp. 93-99.
Elsevier DOI 1712
Image forensics BibRef

Feng, C., Xu, Z., Jia, S., Zhang, W., Xu, Y.,
Motion-Adaptive Frame Deletion Detection for Digital Video Forensics,
CirSysVideo(27), No. 12, December 2017, pp. 2543-2554.
IEEE DOI 1712
Forensics, Histograms, Jitter, Lighting, Motion measurement, Vibrations, Video sequences, Fluctuation feature, frame deletion, video forensics BibRef

Li, H., Luo, W., Qiu, X., Huang, J.,
Identification of Various Image Operations Using Residual-Based Features,
CirSysVideo(28), No. 1, January 2018, pp. 31-45.
IEEE DOI 1801
Cameras, Correlation, Feature extraction, Forensics, Image coding, Transform coding, Countering anti-forensics, image forensics, image residuals BibRef

Su, L., Li, C., Lai, Y., Yang, J.,
A Fast Forgery Detection Algorithm Based on Exponential-Fourier Moments for Video Region Duplication,
MultMed(20), No. 4, April 2018, pp. 825-840.
IEEE DOI 1804
Algorithm design and analysis, Computational efficiency, Detection algorithms, Feature extraction, Forensics, Forgery, region duplication BibRef

Sun, J.Y.[Jee-Young], Kim, S.W.[Seung-Wook], Lee, S.W.[Sang-Won], Ko, S.J.[Sung-Jea],
A novel contrast enhancement forensics based on convolutional neural networks,
SP:IC(63), 2018, pp. 149-160.
Elsevier DOI 1804
Digital image forensics, Contrast enhancement, Convolutional neural networks, Deep learning, Gray level co-occurrence matrix BibRef

Han, J.G.[Jong Goo], Park, T.H.[Tae Hee], Moon, Y.H.[Yong Ho], Eom, I.K.[Il Kyu],
Quantization-based Markov feature extraction method for image splicing detection,
MVA(29), No. 3, April 2018, pp. 543-552.
WWW Link. 1804
BibRef

Akhtar, Z.[Zeeshan], Khan, E.[Ekram],
Revealing the traces of histogram equalisation in digital images,
IET-IPR(12), No. 5, May 2018, pp. 760-768.
DOI Link 1804
BibRef

Iakovidou, C.[Chryssanthi], Zampoglou, M.[Markos], Papadopoulos, S.[Symeon], Kompatsiaris, Y.[Yiannis],
Content-aware detection of JPEG grid inconsistencies for intuitive image forensics,
JVCIR(54), 2018, pp. 155-170.
Elsevier DOI 1806
Image forensics, JPEG artifacts, Forgery localization, Splicing BibRef

Park, J.S.[Jin-Seok], Kim, H.G.[Hyeon-Gi], Kim, D.G.[Do-Guk], Yu, I.J.[In-Jae], Lee, H.K.[Heung-Kyu],
Paired mini-batch training: A new deep network training for image forensics and steganalysis,
SP:IC(67), 2018, pp. 132-139.
Elsevier DOI 1808
Deep learning, Deep convolutional neural networks, Mini-batch, Image forensics, Steganalysis BibRef

Yang, B.[Bin], Sun, X.M.[Xing-Ming], Cao, E.[Enguo], Hu, W.F.[Wei-Feng], Chen, X.Y.[Xian-Yi],
Convolutional neural network for smooth filtering detection,
IET-IPR(12), No. 8, August 2018, pp. 1432-1438.
DOI Link 1808
Detect smoothing that is used to hide changes. BibRef

Wang, P.[Ping], Liu, F.L.[Fen-Lin], Yang, C.F.[Chun-Fang], Luo, X.Y.[Xiang-Yang],
Blind forensics of image gamma transformation and its application in splicing detection,
JVCIR(55), 2018, pp. 80-90.
Elsevier DOI 1809
Blind forensics, Gamma transformation, Manipulation detection, Splicing, Tampered area location BibRef

Rocha, A.[Anderson], Li, S.J.[Shu-Jun], Kuo, C.C.J.[C.C. Jay], Piva, A.[Alessandro], Huang, J.W.[Ji-Wu],
Data-driven multimedia forensics and security,
JVCIR(55), 2018, pp. 447-448.
Elsevier DOI 1809
BibRef

Singh, P., Raman, B., Agarwal, N.,
Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud,
CirSysVideo(28), No. 9, September 2018, pp. 2116-2130.
IEEE DOI 1809
Cryptography, Authentication, Cloud computing, Servers, Multimedia communication, Watermarking, Streaming media, encrypted domain BibRef

Sheng, H.[Hongda], Shen, X.J.[Xuan-Jing], Lyu, Y.D.[Ying-Da], Shi, Z.[Zenan], Ma, S.Y.[Shu-Yang],
Image splicing detection based on Markov features in discrete octonion cosine transform domain,
IET-IPR(12), No. 10, October 2018, pp. 1815-1823.
DOI Link 1809
BibRef

Shi, Z.N.[Ze-Nan], Shen, X.J.[Xuan-Jing], Chen, H.P.[Hai-Peng], Lyu, Y.D.[Ying-Da],
Global Semantic Consistency Network for Image Manipulation Detection,
SPLetters(27), 2020, pp. 1755-1759.
IEEE DOI 2010
Feature extraction, Semantics, Decoding, Encoding, Convolution, Bidirectional control, Convolutional codes, deep learning BibRef

Zhu, N.[Nan], Li, Z.[Zhao],
Blind image splicing detection via noise level function,
SP:IC(68), 2018, pp. 181-192.
Elsevier DOI 1810
Image forensics, Image splicing detection, Noise level function, Noise variance estimation BibRef

Bhardwaj, D.[Dinesh], Pankajakshan, V.[Vinod],
A JPEG blocking artifact detector for image forensics,
SP:IC(68), 2018, pp. 155-161.
Elsevier DOI 1810
Blocking artifacts, Image forensics, JPEG compression BibRef

Ye, J.Y.[Jing-Yu], Shen, Z.Y.[Zhang-Yi], Behrani, P.[Piyush], Ding, F.[Feng], Shi, Y.Q.[Yun-Qing],
Detecting USM image sharpening by using CNN,
SP:IC(68), 2018, pp. 258-264.
Elsevier DOI 1810
Image sharpening, Image forensics, Unsharp Masking, Convolutional neural network, Edge perpendicular ternary coding BibRef

Cattaneo, G.[Giuseppe], Roscigno, G.[Gianluca], Petrillo, U.F.[Umberto Ferraro],
Improving the experimental analysis of tampered image detection algorithms for biometric systems,
PRL(113), 2018, pp. 93-101.
Elsevier DOI 1810
Image integrity, Biometric systems, Image analysis, Performance analysis, Digital image forensics, Tampered image detection BibRef

Zhao, W.[Wei], Yang, P.P.[Peng-Peng], Ni, R.R.[Rong-Rong], Zhao, Y.[Yao], Wu, H.R.[Hao-Rui],
Security Consideration for Deep Learning-Based Image Forensics,
IEICE(E101-D), No. 12, December 2018, pp. 3263-3266.
WWW Link. 1812
BibRef

Shan, W.Y.[Wu-Yang], Yi, Y.H.[Yao-Hua], Huang, R.G.[Rong-Gang], Xie, Y.[Yong],
Robust contrast enhancement forensics based on convolutional neural networks,
SP:IC(71), 2019, pp. 138-146.
Elsevier DOI 1901
Contrast enhancement, Convolutional neural networks, Robust forensics, Composite image, JPEG compression BibRef

Qin, C., Ji, P., Chang, C., Dong, J., Sun, X.,
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery,
MultMedMag(25), No. 3, July 2018, pp. 36-48.
IEEE DOI 1901
Watermarking, Image coding, Image reconstruction, Authentication, Iterative decoding, Visualization, Multimedia communication, content recovery BibRef

Guan, H., Kozak, M., Robertson, E., Lee, Y., Yates, A.N., Delgado, A., Zhou, D., Kheyrkhah, T., Smith, J., Fiscus, J.,
MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation,
IVF19(63-72)
IEEE DOI 1902
Electromagnetic interference BibRef

Singh, P.[Priyanka], Atrey, P.K.[Pradeep K.],
Recovering tampered regions in encrypted video using POB number system,
SP:IC(74), 2019, pp. 96-109.
Elsevier DOI 1904
Permutation ordered binary (POB) number system, Secret sharing, Encrypted domain BibRef

Qiao, T.[Tong], Shi, R.[Ran], Luo, X.Y.[Xiang-Yang], Xu, M.[Ming], Zheng, N.[Ning], Wu, Y.M.[Yi-Ming],
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication,
MultMed(21), No. 5, May 2019, pp. 1077-1092.
IEEE DOI 1905
Authenticate a re-sampled image. image coding, image sampling, image texture, statistical analysis, statistical testing, texture weight map, hypothesis testing BibRef

Chen, Y.F.[Yi-Fang], Kang, X.G.[Xian-Gui], Shi, Y.Q.[Yun Q.], Wang, Z.J.[Z. Jane],
A multi-purpose image forensic method using densely connected convolutional neural networks,
RealTimeIP(16), No. 3, June 2019, pp. 725-740.
Springer DOI
WWW Link. 1906
BibRef

Yu, J.J.[Jing-Jing], Zhan, Y.F.[Yi-Feng], Yang, J.H.[Jian-Hua], Kang, X.G.[Xian-Gui],
A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks,
IWDW16(3-15).
Springer DOI 1703
BibRef

Ye, J.Y.[Jing-Yu], Shi, Y.Q.[Yun-Qing],
A Hybrid Feature Model for Seam Carving Detection,
IWDW17(77-89).
Springer DOI 1708
BibRef
Earlier:
A Local Derivative Pattern Based Image Forensic Framework for Seam Carving Detection,
IWDW16(172-184).
Springer DOI 1703
BibRef

Gao, S.D.[Shang-De], Liao, X.[Xin], Liu, X.C.[Xu-Chong],
Real-time detecting one specific tampering operation in multiple operator chains,
RealTimeIP(16), No. 3, June 2019, pp. 741-750.
WWW Link. 1906
BibRef

Yao, H.C.[Hai-Chao], Ni, R.R.[Rong-Rong], Zhao, Y.[Yao],
An approach to detect video frame deletion under anti-forensics,
RealTimeIP(16), No. 3, June 2019, pp. 751-764.
WWW Link. 1906
BibRef

Hosseini, M.D.M.[Morteza Darvish Morshedi], Kirchner, M.[Matthias],
Unsupervised Image Manipulation Localization With Non-Binary Label Attribution,
SPLetters(26), No. 7, July 2019, pp. 976-980.
IEEE DOI 1906
feature extraction, image classification, image coding, image colour analysis, image representation, image retrieval, Heating systems BibRef

Zhang, Q.[Qin], Xiao, H.M.[Hui-Mei], Xue, F.[Fei], Lu, W.[Wei], Liu, H.M.[Hong-Mei], Huang, F.J.[Fang-Jun],
Digital image forensics of non-uniform deblurring,
SP:IC(76), 2019, pp. 167-177.
Elsevier DOI 1906
Digital image forensics, Non-uniform deblurring localization, Multi-derivative gray level co-occurrence matrix (MGLCM), Top-down multi-scale boundary fusion (TMBF) BibRef

Liu, Q.,
An Improved Approach to Exposing JPEG Seam Carving Under Recompression,
CirSysVideo(29), No. 7, July 2019, pp. 1907-1918.
IEEE DOI 1907
Transform coding, Forgery, Feature extraction, Image coding, Correlation, Mathematical model, Medical services, JPEG, recompression BibRef

Vatansever, S.[Saffet], Dirik, A.E.[Ahmet Emir], Memon, N.[Nasir],
Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach,
SPLetters(24), No. 10, October 2017, pp. 1463-1467.
IEEE DOI 1710
Electrical network frequency. brightness, image forensics, video cameras, video signal processing, ENF signal presence detection method, BibRef

Kumar, M.[Manoj], Rani, A.[Anuj], Srivastava, S.[Sangeet],
Image Forensics Based on Lighting Estimation,
IJIG(19), No. 3 2019, pp. 1950014.
DOI Link 1908
BibRef

Tariang, D.B., Chakraborty, R.S., Naskar, R.,
A Robust Residual Dense Neural Network For Countering Antiforensic Attack on Median Filtered Images,
SPLetters(26), No. 8, August 2019, pp. 1132-1136.
IEEE DOI 1908
data compression, image classification, image coding, image filtering, image forensics, residual dense network (RDN) BibRef

Wang, J., Li, T., Luo, X., Shi, Y., Jha, S.K.,
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain,
CirSysVideo(29), No. 9, September 2019, pp. 2775-2785.
IEEE DOI 1909
Quaternions, Discrete wavelet transforms, Color, Image color analysis, Forensics, forensics BibRef

Qureshi, M.A.[Muhammad Ali], El-Alfy, E.S.M.[El-Sayed M.],
Bibliography of digital image anti-forensics and anti-anti-forensics techniques,
IET-IPR(13), No. 11, 19 September 2019, pp. 1811-1823.
DOI Link 1909
Survey, Forensics. BibRef

Pal, P.[Pabitra], Jana, B.[Biswapati], Bhaumik, J.[Jaydeb],
Robust watermarking scheme for tamper detection and authentication exploiting CA,
IET-IPR(13), No. 12, October 2019, pp. 2116-2129.
DOI Link 1911
BibRef

Du, L.[Ling], Ho, A.T.S.[Anthony T.S.], Cong, R.[Runmin],
Perceptual hashing for image authentication: A survey,
SP:IC(81), 2020, pp. 115713.
Elsevier DOI 1912
Survey, Tamper Detection. Tamper detection, Perceptual image hashing, Content authenticity analysis, Security BibRef

Yang, B.[Bin], Li, Z.Y.[Zhen-Yu], Zhang, T.[Tao],
A real-time image forensics scheme based on multi-domain learning,
RealTimeIP(17), No. 1, February 2020, pp. 29-40.
WWW Link. 2002
BibRef

Sharma, S.[Shishir], Ravi, H.[Hareesh], Subramanyam, A.V., Emmanuel, S.[Sabu],
Anti-forensics of median filtering and contrast enhancement,
JVCIR(66), 2020, pp. 102682.
Elsevier DOI 2003
Anti-forensics, Median filtering, Contrast enhancement, Huber Markov random field BibRef

Duan, G.[Guiduo], Miao, J.Y.[Jia-Yu], Huang, T.X.[Tian-Xi],
Median Filtering Detection of Small-size Image Using Alexcaps-network,
IWDW19(126-140).
Springer DOI 2003
BibRef

Cheng, H., Wei, J., Lin, C., Ye, J.,
Detecting Seam-Carved Image by Extreme Learning Machines Using Patch Analysis Method, Jury Voting, and Combinatorial Fusion,
SMCS(50), No. 5, May 2020, pp. 1850-1864.
IEEE DOI 2005
Support vector machines, Feature extraction, Task analysis, Training, Testing, Neurons, Nonlinear distortion, support vector machine (SVM) BibRef

Dansena, P.[Prabhat], Pal, R.[Rajarshi], Bag, S.[Soumen],
Quantitative assessment of capabilities of colour models for pen ink discrimination in handwritten documents,
IET-IPR(14), No. 8, 19 June 2020, pp. 1594-1604.
DOI Link 2005
BibRef

Abhishek, Jindal, N.[Neeru],
Hybrid deep learning and machine learning approach for passive image forensic,
IET-IPR(14), No. 10, August 2020, pp. 1952-1959.
DOI Link 2008
BibRef

Wang, P.[Ping], Liu, F.L.[Fen-Lin], Yang, C.F.[Chun-Fang],
Thresholding binary coding for image forensics of weak sharpening,
SP:IC(88), 2020, pp. 115956.
Elsevier DOI 2009
Image forensics, Texture pattern mapping, Thresholding binary coding, Unsharp mask, Weak sharpening BibRef

Kumawat, C.[Chothmal], Pankajakshan, V.[Vinod],
A robust JPEG compression detector for image forensics,
SP:IC(89), 2020, pp. 116008.
Elsevier DOI 2010
JPEG compression artifacts, JPEG forensics, JPEG anti-forensics, Calibration BibRef

Hatoum, M.W.[Makram W.], Couchot, J.F.[Jean-François], Couturier, R.[Raphaël], Darazi, R.[Rony],
Using Deep learning for image watermarking attack,
SP:IC(90), 2021, pp. 116019.
Elsevier DOI 2012
Image denoising, Deep learning, Digital watermarking, Robustness, Fidelity BibRef

Yuan, X.C.[Xiao-Chen], Li, X.H.[Xin-Hang], Liu, T.[Tong],
Gauss-Jordan elimination-based image tampering detection and self-recovery,
SP:IC(90), 2021, pp. 116038.
Elsevier DOI 2012
Improved check bits generation, Image tampering detection, Morphological processing-based enhancement, Gauss-Jordan Elimination-Based Self-Recovery BibRef

Mazumdar, A.[Aniruddha], Bora, P.K.[Prabin Kumar],
Siamese convolutional neural network-based approach towards universal image forensics,
IET-IPR(14), No. 13, November 2020, pp. 3105-3116.
DOI Link 2012
BibRef

Chen, B.J.[Bei-Jing], Qi, X.M.[Xiao-Ming], Zhou, Y.[Yang], Yang, G.Y.[Guan-Yu], Zheng, Y.H.[Yu-Hui], Xiao, B.[Bin],
Image splicing localization using residual image and residual-based fully convolutional network,
JVCIR(73), 2020, pp. 102967.
Elsevier DOI 2012
Splicing localization, Fully convolutional network, Residual block, Residual image, Condition random field BibRef

Ding, F., Wu, H., Zhu, G., Shi, Y.Q.,
METEOR: Measurable Energy Map Toward the Estimation of Resampling Rate via a Convolutional Neural Network,
CirSysVideo(30), No. 12, December 2020, pp. 4715-4727.
IEEE DOI 2012
Image forensics, Machine learning, Tools, Estimation, Parameter estimation, History, Image forensics, resampling, convolutional neural network BibRef

Joshi, A.B.[Anand B.], Kumar, D.[Dhanesh], Mishra, D.C.,
Security of Digital Images Based on 3D Arnold Cat Map and Elliptic Curve,
IJIG(21), No. 1 2021, pp. 2150006.
DOI Link 2102
BibRef

Sabir, E.[Ekraam], Jaiswal, A.[Ayush], AbdAlmageed, W.[Wael], Natarajan, P.[Prem],
MEG: Multi-Evidence GNN for Multimodal Semantic Forensics,
ICPR21(9804-9811)
IEEE DOI 2105
Forensics, Scalability, Semantics, Metadata, Graph neural networks BibRef

Chen, J.X.[Jia-Xin], Liao, X.[Xin], Qin, Z.[Zheng],
Identifying tampering operations in image operator chains based on decision fusion,
SP:IC(95), 2021, pp. 116287.
Elsevier DOI 2106
Image forensics, Image operator chain, Tampering operations identification, Decision fusion BibRef

Shah, A.[Atif], El-Alfy, E.S.M.[El-Sayed M.],
Comparative analysis of feature extraction and fusion for blind authentication of digital images using chroma channels,
SP:IC(95), 2021, pp. 116271.
Elsevier DOI 2106
Image forensics, Feature extraction, Dimensionality reduction, Fusion methods, Multimodal, Machine learning, Support vector machines BibRef

Liu, T.[Tong], Yuan, X.C.[Xiao-Chen],
Adaptive Feature Calculation and Diagonal Mapping for Successive Recovery of Tampered Regions,
CirSysVideo(31), No. 7, July 2021, pp. 2617-2630.
IEEE DOI 2107
Watermarking, Authentication, Discrete wavelet transforms, Image coding, Partitioning algorithms, Media, successive content self-recovery BibRef

Wang, X.F.[Xiao-Feng], Zhang, Q.[Qian], Jiang, C.[Chuntao], Xue, J.R.[Jian-Ru],
Perceptual hash-based coarse-to-fine grained image tampering forensics method,
JVCIR(78), 2021, pp. 103124.
Elsevier DOI 2107
Perceptual image hash, Simple linear iterative clustering, Image forging detection, Image tempering localization BibRef

Ribnick, E., Atev, S., Masoud, O.T., Papanikolopoulos, N.P., Voyles, R.,
Real-Time Detection of Camera Tampering,
AVSBS06(10-10).
IEEE DOI 0611
Tampering based on large differences between old and new frames. BibRef

Nam, S.H.[Seung-Hun], Ahn, W.[Wonhyuk], Yu, I.J.[In-Jae], Kwon, M.J.[Myung-Joon], Son, M.[Minseok], Lee, H.K.[Heung-Kyu],
Deep Convolutional Neural Network for Identifying Seam-Carving Forgery,
CirSysVideo(31), No. 8, August 2021, pp. 3308-3326.
IEEE DOI 2108
Forgery, Visualization, Image color analysis, Convolutional neural networks, Image forensics, Distortion, local artifact detection BibRef

Amerini, I.[Irene], Anagnostopoulos, A.[Aris], Maiano, L.[Luca], Celsi, L.R.[Lorenzo Ricciardi],
Deep Learning for Multimedia Forensics,
FTCGV(12), No. 4, 2021, pp. 309-457.
DOI Link 2109
BibRef

Manisha, Karunakar, A.K., Li, C.T.[Chang-Tsun],
Identification of source social network of digital images using deep neural network,
PRL(150), 2021, pp. 17-25.
Elsevier DOI 2109
Image forensics, Social network, Deep learning, Provenance inference, Source identification BibRef

Yang, Q.X.[Quan-Xin], Yu, D.J.[Dong-Jin], Zhang, Z.[Zhuxi], Yao, Y.[Ye], Chen, L.[Linqiang],
Spatiotemporal Trident Networks: Detection and Localization of Object Removal Tampering in Video Passive Forensics,
CirSysVideo(31), No. 10, October 2021, pp. 4131-4144.
IEEE DOI 2110
Feature extraction, Forensics, Spatiotemporal phenomena, Forgery, Streaming media, Detectors, trident network BibRef

Bai, W.M.[Wei-Ming], Zhang, Z.P.[Zhi-Peng], Li, B.[Bing], Wang, P.[Pei], Li, Y.X.[Yang-Xi], Zhang, C.X.[Cong-Xuan], Hu, W.M.[Wei-Ming],
Robust Texture-Aware Computer-Generated Image Forensic: Benchmark and Algorithm,
IP(30), 2021, pp. 8439-8453.
IEEE DOI 2110
Dataset, Image Forensics.
WWW Link. Ddistinguish computer generated from photographic images. Benchmark testing, Feature extraction, Image forensics, Task analysis, computer-generated images forensic BibRef

Grigaliunas, S.[Sarunas], Toldinas, J.[Jevgenijus], Venckauskas, A.[Algimantas], Morkevicius, N.[Nerijus], Damaševicius, R.[Robertas],
Digital Evidence Object Model for Situation Awareness and Decision Making in Digital Forensics Investigation,
IEEE_Int_Sys(36), No. 5, September 2021, pp. 39-48.
IEEE DOI 2110
Digital forensics, Security, Computational modeling, Analytical models, Decision making, Intelligent systems, category theory BibRef

Li, J.L.[Jin-Long], Yuan, X.C.[Xiao-Chen], Feng, L.[Li],
Alteration Detection of Multispectral/Hyperspectral Images Using Dual-Path Partial Recurrent Networks,
RS(13), No. 23, 2021, pp. xx-yy.
DOI Link 2112
BibRef

Zhang, Y.L.[Yong-Liang], Gao, C.H.[Chen-Hao], Li, Z.W.[Zhi-Wei], Lv, Y.[Yufan], Zhu, K.[Keyi],
A method of fingermark anti-counterfeiting for forensic document identification,
PRL(152), 2021, pp. 86-92.
Elsevier DOI 2112
Fingermark, Forensic document, CNN, Patch-Lable, Model fusion BibRef

Mazumdar, A.[Aniruddha], Bora, P.K.[Prabin Kumar],
Two-stream encoder-decoder network for localizing image forgeries,
JVCIR(82), 2022, pp. 103417.
Elsevier DOI 2201
Image forensics, Forgery localization, CNN, Encoder-decoder network BibRef

Jin, X.[Xiao], Su, Y.T.[Yu-Ting], Jing, P.G.[Pei-Guang],
Video frame deletion detection based on time-frequency analysis,
JVCIR(83), 2022, pp. 103436.
Elsevier DOI 2202
Digital video forensics, Frame tampering detection, Nonlinear quantization, S transform BibRef

Yang, J.Q.[Jian-Quan], Zhu, G.P.[Guo-Pu], Luo, Y.[Yao], Kwong, S.[Sam], Zhang, X.P.[Xin-Peng], Zhou, Y.C.[Yi-Cong],
Forensic Analysis of JPEG-Domain Enhanced Images via Coefficient Likelihood Modeling,
CirSysVideo(32), No. 3, March 2022, pp. 1006-1019.
IEEE DOI 2203
Transform coding, Forensics, Image coding, Discrete cosine transforms, Estimation, Quantization (signal), quantization step estimation BibRef

Fernández, E.G.[Edgar González], Orozco, A.L.S.[Ana Lucila Sandoval], Villalba, L.J.G.[Luis Javier García],
Digital Video Manipulation Detection Technique Based on Compression Algorithms,
ITS(23), No. 3, March 2022, pp. 2596-2605.
IEEE DOI 2203
Correlation, Image coding, Cameras, Technological innovation, Support vector machines, Forensics, Transform coding, Compression, support vector machine BibRef

Fanfani, M.[Marco], Piva, A.[Alessandro], Colombo, C.[Carlo],
PRNU registration under scale and rotation transform based on convolutional neural networks,
PR(124), 2022, pp. 108413.
Elsevier DOI 2203
photo response nonuniformity (PRNU). Image forensics, PRNU, Deep learning, CNN, Rotation, Scale BibRef

Zhu, N.[Nan], Liu, Z.Q.[Zhi-Qin],
Recaptured image forensics based on local ternary count of high order prediction error,
SP:IC(104), 2022, pp. 116662.
Elsevier DOI 2204
Image forensics, Recaptured image detection, Recaptured tampered image, Image credibility, Local ternary count BibRef

Qiao, T.[Tong], Luo, X.Y.[Xiang-Yang], Yao, H.W.[Hong-Wei], Shi, R.[Ran],
Classifying between computer generated and natural images: An empirical study from RAW to JPEG format,
JVCIR(85), 2022, pp. 103506.
Elsevier DOI 2205
Image origin forensics, Imaging procedure, Distribution model, Likelihood ratio test BibRef

Yao, Y.[Ye], Zhang, Z.[Zhuxi], Ni, X.[Xuan], Shen, Z.Y.[Zhang-Yi], Chen, L.Q.[Lin-Qiang], Xu, D.[Dawen],
CGNet: Detecting computer-generated images based on transfer learning with attention module,
SP:IC(105), 2022, pp. 116692.
Elsevier DOI 2205
Digital forensics, Computer-generated detection, Transfer learning, Convolutional block attention module BibRef

Sun, Y.[Yu], Ni, R.R.[Rong-Rong], Zhao, Y.[Yao],
ET: Edge-Enhanced Transformer for Image Splicing Detection,
SPLetters(29), 2022, pp. 1232-1236.
IEEE DOI 2206
Image edge detection, Splicing, Transformers, Forgery, Feature extraction, Location awareness, Decoding, Image forensics, feature enhancement BibRef

Zhang, Y.L.[Yu-Lan], Zhu, G.P.[Guo-Pu], Wu, L.G.[Li-Gang], Kwong, S.[Sam], Zhang, H.L.[Hong-Li], Zhou, Y.C.[Yi-Cong],
Multi-Task SE-Network for Image Splicing Localization,
CirSysVideo(32), No. 7, July 2022, pp. 4828-4840.
IEEE DOI 2207
Splicing, Location awareness, Image edge detection, Feature extraction, Streaming media, Forgery, Transform coding, low-level feature fusion BibRef

Li, W.J.[Wen-Jie], Li, X.L.[Xiao-Long], Ni, R.R.[Rong-Rong], Zhao, Y.[Yao],
Quantization Step Estimation for JPEG Image Forensics,
CirSysVideo(32), No. 7, July 2022, pp. 4816-4827.
IEEE DOI 2207
Quantization (signal), Transform coding, Discrete cosine transforms, Estimation, Image coding, Histograms, response function BibRef

Zhang, Y.X.[Yu-Xue], Yan, Y.F.[Yun-Feng], Feng, G.R.[Guo-Rui],
Feature compensation network based on non-uniform quantization of channels for digital image global manipulation forensics,
SP:IC(107), 2022, pp. 116795.
Elsevier DOI 2208
Image manipulation detection, Convolutional neural network, Feature compensation, Importance coefficients of channel, Non-uniform quantization BibRef

Vatansever, S.[Saffet], Dirik, A.E.[Ahmet Emir], Memon, N.[Nasir],
ENF Based Robust Media Time-Stamping,
SPLetters(29), 2022, pp. 1963-1967.
IEEE DOI 2209
Electric Network Frequency. Variations give a time stamp. Media, Noise measurement, Forensics, Recording, Harmonic analysis, Estimation, Signal processing algorithms, ENF, time-stamping BibRef

Lin, X.[Xun], Wang, S.[Shuai], Deng, J.H.[Jia-Hao], Fu, Y.[Ying], Bai, X.[Xiao], Chen, X.L.[Xin-Lei], Qu, X.L.[Xiao-Lei], Tang, W.Z.[Wen-Zhong],
Image manipulation detection by multiple tampering traces and edge artifact enhancement,
PR(133), 2023, pp. 109026.
Elsevier DOI 2210
Image manipulation detection, Transformer, Edge artifact enhancement, Edge supervision BibRef

Liu, X.H.[Xiao-Hong], Liu, Y.J.[Yao-Jie], Chen, J.[Jun], Liu, X.M.[Xiao-Ming],
PSCC-Net: Progressive Spatio-Channel Correlation Network for Image Manipulation Detection and Localization,
CirSysVideo(32), No. 11, November 2022, pp. 7505-7517.
IEEE DOI 2211
Feature extraction, Correlation, Location awareness, Splicing, Forgery, Task analysis, Estimation, attention mechanism BibRef

Gardella, M.[Marina], Musé, P.[Pablo],
Forensic Similarity for Source Camera Model Comparison,
IPOL(12), 2022, pp. 480-489.
DOI Link 2212
Code, Forensic Similarity. BibRef

Gardella, M.[Marina], Musé, P.[Pablo],
Image Forgery Detection via Forensic Similarity Graphs,
IPOL(12), 2022, pp. 490-500.
DOI Link 2212
Code, Forgery. BibRef

Li, G.H.[Gui-Hao], Yao, H.[Heng], Le, Y.F.[Yan-Fen], Qin, C.[Chuan],
Recaptured screen image identification based on vision transformer,
JVCIR(90), 2023, pp. 103692.
Elsevier DOI 2301
Recaptured screen images, Image forensics, Demoiréing operation, Vision transformer, Recapture identification BibRef

Dong, C.B.[Cheng-Bo], Chen, X.R.[Xin-Ru], Hu, R.[Ruohan], Cao, J.[Juan], Li, X.R.[Xi-Rong],
MVSS-Net: Multi-View Multi-Scale Supervised Networks for Image Manipulation Detection,
PAMI(45), No. 3, March 2023, pp. 3539-3553.
IEEE DOI 2302
Feature extraction, Image edge detection, Image segmentation, Deep learning, Semantics, Training, Task analysis, model sensitivity and specificity BibRef

Chen, X.R.[Xin-Ru], Dong, C.B.[Cheng-Bo], Ji, J.Q.[Jia-Qi], Cao, J.[Juan], Li, X.R.[Xi-Rong],
Image Manipulation Detection by Multi-View Multi-Scale Supervision,
ICCV21(14165-14173)
IEEE DOI 2203
Representation learning, Image segmentation, Sensitivity, Costs, Image edge detection, Semantics, BibRef

Lu, W.[Wei], Xu, W.B.[Wen-Bo], Sheng, Z.Q.[Zi-Qi],
An Interpretable Image Tampering Detection Approach Based on Cooperative Game,
CirSysVideo(33), No. 2, February 2023, pp. 952-962.
IEEE DOI 2302
Games, Indexes, Feature extraction, Object detection, Deep learning, Task analysis, Security, Tampering detection, interpretability, YOLO, shapley interaction index BibRef

Qi, S.[Shuren], Zhang, Y.S.[Yu-Shu], Wang, C.[Chao], Zhou, J.T.[Jian-Tao], Cao, X.C.[Xiao-Chun],
A Principled Design of Image Representation: Towards Forensic Tasks,
PAMI(45), No. 5, May 2023, pp. 5337-5354.
IEEE DOI 2304
Forensics, Task analysis, Image representation, Robustness, Complexity theory, Image forensics, Deep learning, fast Fourier transform BibRef

Rana, K.[Kapil], Singh, G.[Gurinder], Goyal, P.[Puneet],
SNRCN2: Steganalysis noise residuals based CNN for source social network identification of digital images,
PRL(171), 2023, pp. 124-130.
Elsevier DOI 2306
Image forensics, Social media networks, Steganalysis noise residuals, Convolutional neural networks BibRef

He, C.[Chuchu], Chen, Y.[Yunshu], Pan, J.[Jie], Huang, Y.[Yue], Tu, X.T.[Xiao-Tong], Ding, X.[Xinghao],
Enhanced features in image manipulation detection,
SP:IC(116), 2023, pp. 116983.
Elsevier DOI 2307
Image forensics, Image manipulation detection, Segmentation mask attention mechanism, Fingerprint information BibRef

Fan, W.T.[Wen-Tong], Li, Z.Y.[Zhen-Yu], Li, H.[Hao], Zhang, Y.[Yi], Luo, X.Y.[Xiang-Yang],
SNENet: An adaptive stego noise extraction network using parallel dilated convolution for JPEG image steganalysis,
IET-IPR(17), No. 10, 2023, pp. 2894-2906.
DOI Link 2308
image forensics, steganalysis, steganography, stego noises BibRef

Ying, Q.C.[Qi-Chao], Zhou, H.[Hang], Qian, Z.X.[Zhen-Xing], Li, S.[Sheng], Zhang, X.P.[Xin-Peng],
Learning to Immunize Images for Tamper Localization and Self-Recovery,
PAMI(45), No. 11, November 2023, pp. 13814-13830.
IEEE DOI 2310
BibRef

Zhang, J.Y.[Jing-Yuan], Wang, H.X.[Hong-Xia], He, P.S.[Pei-Song],
Dual-branch multi-scale densely connected network for image splicing detection and localization,
SP:IC(119), 2023, pp. 117045.
Elsevier DOI 2310
Image forensics, Image splicing detection, Deep learning, Low-level feature reuse, Pixel-wise feature fusion BibRef

Dai, C.W.[Chen-Wei], Su, L.C.[Li-Chao], Wu, B.[Bin], Chen, J.[Jian],
DS-Net: Dual supervision neural network for image manipulation localization,
IET-IPR(17), No. 12, 2023, pp. 3551-3563.
DOI Link 2310
image forensics, image processing BibRef

Zeng, Y.Y.[Yu-Yuan], Zhao, B.[Bowen], Qiu, S.Z.[Shan-Zhao], Dai, T.[Tao], Xia, S.T.[Shu-Tao],
Toward Effective Image Manipulation Detection With Proposal Contrastive Learning,
CirSysVideo(33), No. 9, September 2023, pp. 4703-4714.
IEEE DOI Code:
WWW Link. 2310
BibRef

Shi, Z.[Zenan], Chen, H.P.[Hai-Peng], Zhang, D.[Dong],
Transformer-Auxiliary Neural Networks for Image Manipulation Localization by Operator Inductions,
CirSysVideo(33), No. 9, September 2023, pp. 4907-4920.
IEEE DOI 2310
BibRef

Xu, D.Y.[Deng-Yun], Shen, X.J.[Xuan-Jing], Lyu, Y.D.[Ying-Da],
UP-Net: Uncertainty-Supervised Parallel Network for Image Manipulation Localization,
CirSysVideo(33), No. 11, November 2023, pp. 6390-6403.
IEEE DOI 2311
BibRef

Li, F.Y.[Feng-Yong], Pei, Z.J.[Zhen-Jia], Zhang, X.P.[Xin-Peng], Qin, C.[Chuan],
Image Manipulation Localization Using Multi-Scale Feature Fusion and Adaptive Edge Supervision,
MultMed(25), 2023, pp. 7851-7866.
IEEE DOI 2312
BibRef

Thabit, R.[Rasha],
A novel blind tamper detection and localization scheme for multiple faces in digital images,
IET-IPR(17), No. 14, 2023, pp. 3938-3958.
DOI Link 2312
multiple faces authentication, multiple faces detection, multiple faces security, tamper detection for multiple faces, tamper localization for multiple faces BibRef

Wang, H.R.[Hao-Ran], Deng, J.H.[Jia-Hao], Lin, X.[Xun], Tang, W.Z.[Wen-Zhong], Wang, S.[Shuai],
CDS-Net: Cooperative dual-stream network for image manipulation detection,
PRL(176), 2023, pp. 167-173.
Elsevier DOI 2312
Image manipulation detection, Dual-stream framework, Cooperating, Feature interaction BibRef

Li, Y.M.[Yuan-Man], Hu, L.P.[Liang-Pei], Dong, L.[Li], Wu, H.W.[Hai-Wei], Tian, J.[Jinyu], Zhou, J.T.[Jian-Tao], Li, X.[Xia],
Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training,
CirSysVideo(34), No. 3, March 2024, pp. 1857-1872.
IEEE DOI 2403
Transformers, Training, Forensics, Forgery, Image edge detection, Task analysis, Convolution, Inpainting forensics, deep neural networks BibRef

Xu, Y.Z.[Yan-Zhi], Zheng, J.B.[Jiang-Bin], Ren, J.[Jinchang], Fang, A.[Aiqing],
Feature Aggregation and Region-Aware Learning for Detection of Splicing Forgery,
SPLetters(31), 2024, pp. 696-700.
IEEE DOI 2403
Feature extraction, Correlation, Transformers, Learning systems, Forgery, Training, Splicing, Image forgery detection, region-aware learning BibRef

Zhu, H.C.[Hao-Chen], Cao, G.[Gang], Zhao, M.[Mo], Tian, H.[Huawei], Lin, W.G.[Wei-Guo],
Effective image tampering localization with multi-scale ConvNeXt feature fusion,
JVCIR(98), 2024, pp. 103981.
Elsevier DOI Code:
WWW Link. 2402
Image forensics, Tampering localization, Encoder and decoder, ConvNeXt, Multi-scale feature fusion BibRef

Song, H.X.[Hao-Xian], Wang, Z.[Zichi], Zhang, X.P.[Xin-Peng],
Identification of the Original Images,
JVCIR(98), 2024, pp. 104017.
Elsevier DOI 2402
Original images, Deep network models, Variant images BibRef


Zhai, Y.H.[Yuan-Hao], Luan, T.Y.[Tian-Yu], Doermann, D.[David], Yuan, J.S.[Jun-Song],
Towards Generic Image Manipulation Detection with Weakly-Supervised Self-Consistency Learning,
ICCV23(22333-22343)
IEEE DOI 2401
BibRef

Sun, Z.H.[Zhi-Hao], Jiang, H.R.[Hao-Ran], Wang, D.[Danding], Li, X.R.[Xi-Rong], Cao, J.[Juan],
SAFL-Net: Semantic-Agnostic Feature Learning Network with Auxiliary Plugins for Image Manipulation Detection,
ICCV23(22367-22376)
IEEE DOI 2401
BibRef

Hu, X.X.[Xiao-Xiao], Ying, Q.C.[Qi-Chao], Qian, Z.X.[Zhen-Xing], Li, S.[Sheng], Zhang, X.P.[Xin-Peng],
DRAW: Defending Camera-shooted RAW against Image Manipulation,
ICCV23(22377-22387)
IEEE DOI 2401
BibRef

Ji, K.X.[Kai-Xiang], Chen, F.[Feng], Guo, X.[Xin], Xu, Y.D.[Ya-Dong], Wang, J.[Jian], Chen, J.D.[Jing-Dong],
Uncertainty-guided Learning for Improving Image Manipulation Detection,
ICCV23(22399-22408)
IEEE DOI 2401
BibRef

Feng, X.[Xin], Xu, Y.F.[Yi-Feng], Lu, G.M.[Guang-Ming], Pei, W.J.[Wen-Jie],
Hierarchical Contrastive Learning for Pattern-Generalizable Image Corruption Detection,
ICCV23(12042-12051)
IEEE DOI Code:
WWW Link. 2401
BibRef

Zhou, J.Z.[Ji-Zhe], Ma, X.C.[Xiao-Chen], Du, X.[Xia], Alhammadi, A.Y.[Ahmed Y.], Feng, W.T.[Wen-Tao],
Pre-training-free Image Manipulation Localization through Non-Mutually Exclusive Contrastive Learning,
ICCV23(22289-22299)
IEEE DOI Code:
WWW Link. 2401
BibRef

Fernandes, P.[Pedro], Ciardhuáin, S.Ó.[Séamus Ó.], Antunes, M.[Mário],
Uncovering Manipulated Files Using Mathematical Natural Laws,
CIARP23(I:46-62).
Springer DOI 2312
BibRef

Niloy, F.F.[Fahim Faisal], Bhaumik, K.K.[Kishor Kumar], Woo, S.S.[Simon S.],
HRFNet: High-Resolution Forgery Network for Localizing Satellite Image Manipulation,
ICIP23(3165-3169)
IEEE DOI 2312
BibRef

Xiang, Z.[Ziyue], Yadav, A.K.S.[Amit Kumar Singh], Bestagini, P.[Paolo], Tubaro, S.[Stefano], Delp, E.J.[Edward J.],
MTN: Forensic Analysis of MP4 Video Files Using Graph Neural Networks,
WMF23(963-972)
IEEE DOI 2309
BibRef

Jia, S.[Shan], Huang, M.Z.[Ming-Zhen], Zhou, Z.[Zhou], Ju, Y.[Yan], Cai, J.L.[Jia-Ling], Lyu, S.W.[Si-Wei],
AutoSplice: A Text-prompt Manipulated Image Dataset for Media Forensics,
WMF23(893-903)
IEEE DOI 2309
BibRef

Asnani, V.[Vishal], Yin, X.[Xi], Hassner, T.[Tal], Liu, X.M.[Xiao-Ming],
MaLP: Manipulation Localization Using a Proactive Scheme,
CVPR23(12343-12352)
IEEE DOI 2309
BibRef

Siopi, M.[Maria], Kordopatis-Zilos, G.[Giorgos], Charitidis, P.[Polychronis], Kompatsiaris, I.[Ioannis], Papadopoulos, S.[Symeon],
A Multi-stream Fusion Network for Image Splicing Localization,
MMMod23(II: 611-622).
Springer DOI 2304
BibRef

Watanabe, Y.[Yuto], Togo, R.[Ren], Maeda, K.[Keisuke], Ogawa, T.[Takahiro], Haseyama, M.[Miki],
Assessment of Image Manipulation Using Natural Language Description: Quantification of Manipulation Direction,
ICIP22(1046-1050)
IEEE DOI 2211
Measurement, Natural languages, Text-guided image manipulation, generative adversarial network, evaluation metric, manipulation direction BibRef

Ying, Q.C.[Qi-Chao], Hu, X.X.[Xiao-Xiao], Zhang, X.Y.[Xiang-Yu], Qian, Z.X.[Zhen-Xing], Li, S.[Sheng], Zhang, X.P.[Xin-Peng],
RWN: Robust Watermarking Network for Image Cropping Localization,
ICIP22(301-305)
IEEE DOI 2211
Location awareness, Social networking (online), Pipelines, Layout, Transform coding, Watermarking, Feature extraction, watermarking BibRef

Caldelli, R.[Roberto], Carrara, F.[Fabio], Falchi, F.[Fabrizio],
Tuning Neural ODE Networks to Increase Adversarial Robustness in Image Forensics,
ICIP22(1496-1500)
IEEE DOI 2211
Deep learning, Image forensics, Neural networks, Ordinary differential equations, Robustness, Security, Adversarial Samples BibRef

Manisha, Li, C.T.[Chang-Tsun], Kotegar, K.A.[Karunakar A.],
A Multi-Scale Content-Insensitive Fusion CNN for Source Social Network Identification,
ICIP22(2981-2985)
IEEE DOI 2211
Training, Representation learning, Image forensics, Social networking (online), Neural networks, convolutional neural network BibRef

Mandelli, S.[Sara], Bonettini, N.[Nicolò], Bestagini, P.[Paolo], Tubaro, S.[Stefano],
Detecting GAN-Generated Images by Orthogonal Training of Multiple CNNs,
ICIP22(3091-3095)
IEEE DOI 2211
Training, Industries, Deep learning, Detectors, Motion pictures, Generators, Image forensics, synthetic images, GAN, CNN BibRef

Chandrasegaran, K.[Keshigeyan], Tran, N.T.[Ngoc-Trung], Binder, A.[Alexander], Cheung, N.M.[Ngai-Man],
Discovering Transferable Forensic Features for CNN-Generated Images Detection,
ECCV22(XV:671-689).
Springer DOI 2211
BibRef

Wang, J.[Junke], Wu, Z.[Zuxuan], Chen, J.J.[Jing-Jing], Han, X.T.[Xin-Tong], Shrivastava, A.[Abhinav], Lim, S.N.[Ser-Nam], Jiang, Y.G.[Yu-Gang],
ObjectFormer for Image Manipulation Detection and Localization,
CVPR22(2354-2363)
IEEE DOI 2210
Location awareness, Visualization, Frequency-domain analysis, Computational modeling, Prototypes, Feature extraction, retrieval BibRef

Ghizlane, H.[Hnini], Jamal, R.[Riffi], Mahraz, M.A.[Mohamed Adnane], Ali, Y.[Yahyaouy], Hamid, T.[Tairi],
Spam image detection based on convolutional block attention module,
ISCV22(1-4)
IEEE DOI 2208
Deep learning, Recurrent neural networks, Filtering, Unsolicited e-mail, Image edge detection, Feature extraction, CBAM BibRef

Aumayr, D.[Daniel], Schöttle, P.[Pascal],
U Can't (re)Touch This: A Deep Learning Approach for Detecting Image Retouching,
CIAP22(II:127-138).
Springer DOI 2205
BibRef

Moreira, T.P.[Thierry P.], Santana, M.C.S.[Marcos Cleison S.], Passos, L.A.[Leandro A.], Papa, J.P.[João Paulo], da Costa, K.A.P.[Kelton Augusto P.],
An End-to-End Approach for Seam Carving Detection Using Deep Neural Networks,
IbPRIA22(447-457).
Springer DOI 2205
BibRef

Sabir, E.[Ekraam], Nandi, S.[Soumyaroop], AbdAlmageed, W.[Wael], Natarajan, P.[Prem],
BioFors: A Large Biomedical Image Forensics Dataset,
ICCV21(10943-10953)
IEEE DOI 2203
Social networking (online), Forensics, Microscopy, Benchmark testing, Task analysis, Fake news, and cell microscopy BibRef

Bammey, Q.[Quentin], Nikoukhah, T.[Tina], Gardella, M.[Marina], von Gioi, R.G.[Rafael Grompone], Colom, M.[Miguel], Morel, J.M.[Jean-Michel],
Non-Semantic Evaluation of Image Forensics Tools: Methodology and Database,
WACV22(2383-2392)
IEEE DOI 2202
Image forensics, Image coding, Databases, Splicing, Semantics, Pipelines, Transform coding, Datasets, Evaluation and Comparison of Vision Algorithms Image Forensics BibRef

Pessoa, R.[Rodrigo], Kokaram, A.[Anil], Pitie, F.[Francois], Sugrue, M.[Mark],
CNN-Based Video Codec Classifier for Multimedia Forensics,
ICIP21(3033-3037)
IEEE DOI 2201
Forensics, Image processing, User-generated content, Streaming media, Fingerprint recognition, decoding BibRef

Bahat, Y.[Yuval], Michaeli, T.[Tomer],
What's in the Image? Explorable Decoding of Compressed Images,
CVPR21(2907-2916)
IEEE DOI 2111
Visualization, Image coding, Codes, Forensics, Transform coding, Tools, Propagation losses BibRef

Xiang, Z.[Ziyue], Horváth, J.[János], Baireddy, S.[Sriram], Bestagini, P.[Paolo], Tubaro, S.[Stefano], Delp, E.J.[Edward J.],
Forensic Analysis of Video Files Using Metadata,
WMF21(1042-1051)
IEEE DOI 2109
Dimensionality reduction, Social networking (online), Forensics, Metadata, Tools, Streaming media, Media BibRef

Kwon, M.J.[Myung-Joon], Yu, I.J.[In-Jae], Nam, S.H.[Seung-Hun], Lee, H.K.[Heung-Kyu],
CAT-Net: Compression Artifact Tracing Network for Detection and Localization of Image Splicing,
WACV21(375-384)
IEEE DOI 2106
Location awareness, Visualization, Image coding, Splicing, Forensics, Transform coding, Streaming media BibRef

Yin, Q.[Qilin], Wang, J.[Jinwei], Luo, X.Y.[Xiang-Yang],
A Hybrid Loss Network for Localization of Image Manipulation,
IWDW20(237-247).
Springer DOI 2103
BibRef

Zeng, H.[Hui], Deng, K.[Kang], Peng, A.[Anjie],
ISO Setting Estimation Based on Convolutional Neural Network and its Application in Image Forensics,
IWDW20(224-236).
Springer DOI 2103
BibRef

Zhao, J.J.[Jun-Jie], Wang, J.W.[Jin-Wei],
Lightweight DCT-Like Domain Forensics Model for Adversarial Example,
IWDW20(265-279).
Springer DOI 2103
BibRef

Camacho, I.C.[Ivan Castillo], Wang, K.[Kai],
Data-dependent Scaling of CNN's First Layer for Improved Image Manipulation Detection,
IWDW20(208-223).
Springer DOI 2103
BibRef

Reichman, B.[Benjamin], Jing, L.L.[Long-Long], Akin, O.[Oguz], Tian, Y.[Yingli],
Medical Image Tampering Detection: A New Dataset and Baseline,
AIHA20(266-277).
Springer DOI 2103
BibRef

Berthet, A., Dugelay, J.L.,
A review of data preprocessing modules in digital image forensics methods using deep learning,
VCIP20(281-284)
IEEE DOI 2102
Deep learning, Forgery, Cameras, Histograms, Discrete cosine transforms, Digital images, Feature extraction BibRef

Ghosh, A., Zhong, Z., Cruz, S., Veeravasarapu, S., Singh, M., Boult, T.E.,
Infoprint: Information Theoretic Digital Image Forensics,
ICIP20(638-642)
IEEE DOI 2011
Semantics, Cameras, Task analysis, Training, Computer architecture, Convolutional codes, Digital image forensics, variational inference BibRef

Maier, A., Lorch, B., Riess, C.,
Toward Reliable Models For Authenticating Multimedia Content: Detecting Resampling Artifacts With Bayesian Neural Networks,
ICIP20(1251-1255)
IEEE DOI 2011
Bayes methods, Neural networks, Forensics, Uncertainty, Training, Learning systems, Standards, digital image forensics, reliability, resampling detection BibRef

Rouis, K., Gomez-Krämer, P., Coustaty, M.,
Local Geometry Analysis For Image Tampering Detection,
ICIP20(2551-2555)
IEEE DOI 2011
Geometry, Image color analysis, Image edge detection, Transforms, Feature extraction, Quaternions, Color, Image hashing, image gradient BibRef

Rabah, C.B., Coatrieux, G., Abdelfattah, R.,
The Supatlantique Scanned Documents Database for Digital Image Forensics Purposes,
ICIP20(2096-2100)
IEEE DOI 2011
Forensics, Databases, Charge coupled devices, Image resolution, Digital images, Internet, Cameras, Scanner source identification, image security BibRef

Hu, X.F.[Xue-Feng], Zhang, Z.H.[Zhi-Han], Jiang, Z.Y.[Zhen-Ye], Chaudhuri, S.[Syomantak], Yang, Z.H.[Zhen-Heng], Nevatia, R.[Ram],
SPAN: Spatial Pyramid Attention Network for Image Manipulation Localization,
ECCV20(XXI:312-328).
Springer DOI 2011
ocalization of multiple types of image manipulations. BibRef

Bammey, Q., von Gioi, R.G., Morel, J.,
An Adaptive Neural Network for Unsupervised Mosaic Consistency Analysis in Image Forensics,
CVPR20(14182-14192)
IEEE DOI 2008
Forgery, Image color analysis, Transform coding, Neural networks, Databases, Splicing, Image coding BibRef

Hosier, B.C., Stamm, M.C.,
Detecting Video Speed Manipulation,
WMF20(2860-2869)
IEEE DOI 2008
Encoding, Switched mode power supplies, Forensics, Software, Indexes, Face, Presses BibRef

Jain, A., Majumdar, P., Singh, R., Vatsa, M.,
Detecting GANs and Retouching based Digital Alterations via DAD-HCNN,
WMF20(2870-2879)
IEEE DOI 2008
Face, Support vector machines, Training, Convolutional neural networks, Generative adversarial networks, Task analysis BibRef

Andujar, R.[Rabindranath], Peletier, I.[Ignacio], Oliva, J.[Jesus], Cymontkowski, M.[Marc], Fu, Y.[Yondon], Tang, E.[Eric], Allman, J.[Josh],
Video Tampering Detection for Decentralized Video Transcoding Networks,
ICIAR20(I:316-327).
Springer DOI 2007
BibRef

Novozámský, A., Mahdian, B., Saic, S.,
IMD2020: A Large-Scale Annotated Dataset Tailored for Detecting Manipulated Images,
WACVWS20(71-80)
IEEE DOI 2006
Cameras, Visualization, Quantization (signal), Image forensics, Image color analysis, Image coding BibRef

Pourreza, R., Ghodrati, A., Habibian, A.,
Recognizing Compressed Videos: Challenges and Promises,
RLQ19(999-1007)
IEEE DOI 2004
data compression, feature extraction, video coding, visual quality, smoothing discriminative features, perceptual quality, GAN BibRef

Nam, S., Ahn, W., Mun, S., Park, J., Kim, D., Yu, I., Lee, H.,
Content-Aware Image Resizing Detection Using Deep Neural Network,
ICIP19(106-110)
IEEE DOI 1910
Forensics, Content-aware image resizing, Seam carving, Seam insertion, Convolutional neural networks BibRef

Giudice, O., Guarnera, L., Paratore, A.B., Farinella, G.M., Battiato, S.,
Siamese Ballistics Neural Network,
ICIP19(4045-4049)
IEEE DOI 1910
Image Forensics, Siamese Network BibRef

Niyitegeka, D.[David], Coatrieux, G.[Gouenou], Bellafqira, R.[Reda], Genin, E.[Emmanuelle], Franco-Contreras, J.[Javier],
Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases: Application to Outsourced Genetic Data,
IWDW18(151-166).
Springer DOI 1905
BibRef

Ye, J.Y.[Jing-Yu], Shi, Y.X.[Yu-Xi], Xu, G.S.[Guan-Shuo], Shi, Y.Q.[Yun-Qing],
A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images,
IWDW18(3-13).
Springer DOI 1905
BibRef

Tambo, A., Albright, M., Mccloskey, S.,
Low-and Semantic-Level Cues for Forensic Splice Detection,
WACV19(1664-1672)
IEEE DOI 1904
feature extraction, image forensics, learning (artificial intelligence), object detection BibRef

Zampoglou, M.[Markos], Markatopoulou, F.[Foteini], Mercier, G.[Gregoire], Touska, D.[Despoina], Apostolidis, E.[Evlampios], Papadopoulos, S.[Symeon], Cozien, R.[Roger], Patras, I.[Ioannis], Mezaris, V.[Vasileios], Kompatsiaris, I.[Ioannis],
Detecting Tampered Videos with Multimedia Forensics and Deep Learning,
MMMod19(I:374-386).
Springer DOI 1901
BibRef

Diallo, B.[Boubacar], Urruty, T.[Thierry], Bourdon, P.[Pascal], Fernandez-Maloigne, C.[Christine],
Improving Robustness of Image Tampering Detection for Compression,
MMMod19(I:387-398).
Springer DOI 1901
BibRef

Cruz, F.[Francisco], Sidère, N.[Nicolas], Coustaty, M.[Mickaël], d’Andecy, V.P.[Vincent Poulain], Ogier, J.M.[Jean-Marc],
Categorization of Document Image Tampering Techniques and How to Identify Them,
IWCF18(117-124).
Springer DOI 1901
BibRef

Zhou, P., Han, X., Morariu, V.I., Davis, L.S.,
Learning Rich Features for Image Manipulation Detection,
CVPR18(1053-1061)
IEEE DOI 1812
Streaming media, Feature extraction, Kernel, Splicing, Visualization, Object detection, Image forensics BibRef

Annadani, Y., Jawahar, C.V.,
Augment and Adapt: A Simple Approach to Image Tampering Detection,
ICPR18(2983-2988)
IEEE DOI 1812
Semantics, Task analysis, Software, Training, Convolutional neural networks, Image segmentation, Splicing BibRef

Lin, L., Chen, W., Wang, Y., Reinder, S., Guan, Y., Newman, J., Wu, M.,
The Impact of Exposure Settings in Digital Image Forensics,
ICIP18(540-544)
IEEE DOI 1809
ISO, Cameras, ISO Standards, Forensics, Error analysis, Digital images, Training, Digital Image Forensics, Steganalysis, PRNU, ISO BibRef

Pinto, A., Moreira, D., Bharati, A., Brogan, J., Bowyer, K.W., Flynn, P.J., Scheirer, W., Rocha, A.,
Provenance filtering for multimedia phylogeny,
ICIP17(1502-1506)
IEEE DOI 1803
Filtering, Forensics, Indexing, Multimedia communication, Phylogeny, Robustness, Task analysis, Multimedia Phylogeny, Phylogeny Graph, Provenance Filtering BibRef

Bharati, A., Moreira, D., Pinto, A., Brogan, J., Bowyer, K.W., Flynn, P.J., Scheirer, W., Rocha, A.,
U-Phylogeny: Undirected provenance graph construction in the wild,
ICIP17(1517-1521)
IEEE DOI 1803
Buildings, Measurement, Media, Multimedia communication, Phylogeny, Vegetation, Visualization, Image Phylogeny, Media Forensics, Undirected Phylogeny Graph BibRef

Wengrowski, E., Sun, Z.H., Hoogs, A.,
Reflection correspondence for exposing photograph manipulation,
ICIP17(4317-4321)
IEEE DOI 1803
Dinosaurs, Feature extraction, Image color analysis, Lighting, Robustness, Surface treatment, Transforms BibRef

Brogan, J., Bestagini, P., Bharati, A., Pinto, A., Moreira, D., Bowyer, K.W., Flynn, P.J., Rocha, A., Scheirer, W.,
Spotting the difference: Context retrieval and analysis for improved forgery detection and localization,
ICIP17(4078-4082)
IEEE DOI 1803
Databases, Forgery, Image color analysis, Image forensics, Probes, Splicing, Task analysis, context-aware digital forensics, tampering heat maps BibRef

Bappy, J.H.[Jawadul H.], Roy-Chowdhury, A.K.[Amit K.], Bunk, J.[Jason], Nataraj, L.[Lakshmanan], Manjunath, B.S.,
Exploiting Spatial Structure for Localizing Manipulated Image Regions,
ICCV17(4980-4989)
IEEE DOI 1802
Only the tampered with regions. backpropagation, feature extraction, feedforward neural nets, image classification, image resolution, image segmentation, Visualization BibRef

Goli, M.S., Naghsh, A.,
Introducing a new method robust against crop attack in digital image watermarking using two-step sudoku,
IPRIA17(237-242)
IEEE DOI 1712
game theory, image reconstruction, image segmentation, image watermarking, crop attack, digital image watermarking, sudoku BibRef

Behravan, B., Naghsh, A.,
Introducing a new method of image reconstruction against crop attack using sudoku watermarking algorithm,
IPRIA17(177-181)
IEEE DOI 1712
data protection, image coding, image reconstruction, image watermarking, LSB, Sudoku watermarking algorithm, watermarking of image BibRef

Maigrot, C.[Cedric], Kijak, E.[Ewa], Sicre, R.[Ronan], Claveau, V.[Vincent],
Tampering Detection and Localization in Images from Social Networks: A CBIR Approach,
CIAP17(I:750-761).
Springer DOI 1711
BibRef

Cozzolino, D.[Davide], Marra, F.[Francesco], Poggi, G.[Giovanni], Sansone, C.[Carlo], Verdoliva, L.[Luisa],
PRNU-Based Forgery Localization in a Blind Scenario,
CIAP17(II:569-579).
Springer DOI 1711
BibRef

Chen, C., McCloskey, S.[Scott], Yu, J.,
Image Splicing Detection via Camera Response Function Analysis,
CVPR17(1876-1885)
IEEE DOI 1711
Cameras, Forgery, Image edge detection, Nonlinear optics, Optical imaging, Splicing, Tools BibRef

Bondi, L., Lameri, S., Güera, D., Bestagini, P., Delp, E.J., Tubaro, S.,
Tampering Detection and Localization Through Clustering of Camera-Based CNN Features,
MedForen17(1855-1864)
IEEE DOI 1709
Cameras, Feature extraction, Forgery, Image coding, Neurons, Transform, coding BibRef

Chen, B.C., Davis, L.S.,
Deep Representation Learning for Metadata Verification,
IVF19(73-82)
IEEE DOI 1902
Metadata, Task analysis, Training, Visualization, Neural networks, Probes, Image recognition BibRef

Chen, B.C., Ghosh, P., Morariu, V.I., Davis, L.S.,
Detection of Metadata Tampering Through Discrepancy Between Image Content and Metadata Using Multi-task Deep Learning,
MedForen17(1872-1880)
IEEE DOI 1709
Cameras, Humidity, Metadata, Predictive models, Sun, Training BibRef

Bolles, R., Burns, J.B., Graciarena, M., Kathol, A., Lawson, A., McLaren, M., Mensink, T.,
Spotting Audio-Visual Inconsistencies (SAVI) in Manipulated Video,
MedForen17(1907-1914)
IEEE DOI 1709
Acoustics, Face, Feature extraction, Lips, Semantics, Speech, Visualization BibRef

Asaad, A.[Aras], Jassim, S.[Sabah],
Topological Data Analysis for Image Tampering Detection,
IWDW17(136-146).
Springer DOI 1708
BibRef

Choi, H.Y., Jang, H.U., Kim, D., Son, J., Mun, S.M., Choi, S., Lee, H.K.,
Detecting composite image manipulation based on deep neural networks,
WSSIP17(1-5)
IEEE DOI 1707
Computer architecture, Convolution, Feature extraction, Forensics, Machine learning, Training, Composite manipulation detection, Convolutional neural networks, Deep learning, Multimedia, forensics BibRef

He, X.[Xin], Guan, Q.X.[Qing-Xiao], Tong, Y.F.[Yan-Fei], Zhao, X.F.[Xian-Feng], Yu, H.B.[Hai-Bo],
A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation,
IWDW16(145-158).
Springer DOI 1703
BibRef

Le Philippe, N.[Noe], Puech, W.[William], Fiorio, C.[Christophe],
Phylogeny of JPEG images by ancestor estimation using missing markers on image pairs,
IPTA16(1-6)
IEEE DOI 1703
data compression BibRef

Ho, A.T.P., Wang, K., Cayre, F.,
An effective histogram-based approach to JPEG-100 forensics,
IPTA16(1-6)
IEEE DOI 1703
Gaussian distribution BibRef

Serizel, R., Bisot, V., Essid, S., Richard, G.,
Machine listening techniques as a complement to video image analysis in forensics,
ICIP16(948-952)
IEEE DOI 1610
Acoustics BibRef

Purohit, K., Rajagopalan, A.N.,
Splicing localization in motion blurred 3D scenes,
ICIP16(3922-3926)
IEEE DOI 1610
Cameras BibRef

Rana, A., Valenzise, G., DuFaux, F.[Frédéric],
An evaluation of HDR image matching under extreme illumination changes,
VCIP16(1-4)
IEEE DOI 1701
Detectors BibRef

Fan, W., Valenzise, G., Banterle, F., DuFaux, F.[Frédéric],
Forensic detection of inverse tone mapping in HDR images,
ICIP16(166-170)
IEEE DOI 1610
Dynamic range BibRef

Hagui, M., Boukhris, A., Mahjoub, M.A.,
Comparative Study and Enhancement of Camera Tampering Detection Algorithms,
CGiV16(226-231)
IEEE DOI 1608
computer vision BibRef

Alfraih, A.S.[Areej S.], Briffa, J.A.[Johann A.], Wesemeyer, S.[Stephan],
Cloning Localization Based on Feature Extraction and K-means Clustering,
IWDW14(410-419).
Springer DOI 1602
BibRef

Kao, D.Y.[Da-Yu], Chiu, Y.H.[Ying-Hsuan],
An Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage Forensics,
IWDW14(498-512).
Springer DOI 1602
BibRef

Lu, J.F.[Jian-Feng], Huang, Q.[Qianru], Wang, M.[Meng], Li, L.[Li], Dai, J.P.[Jun-Ping], Chang, C.C.[Chin-Chen],
Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack,
IWDW14(187-198).
Springer DOI 1602
BibRef

Xu, G.S.[Guan-Shuo], Ye, J.Y.[Jing-Yu], Shi, Y.Q.[Yun-Qing],
New Developments in Image Tampering Detection,
IWDW14(3-17).
Springer DOI 1602
BibRef

Fan, Y.[Yu], Carre, P.[Philippe], Fernandez-Maloigne, C.[Christine],
Image splicing detection with local illumination estimation,
ICIP15(2940-2944)
IEEE DOI 1511
Image splicing; generalized grey-word algorithms; illuminant color BibRef

Peng, A.[Anjie], Zeng, H.[Hui], Lin, X.D.[Xiao-Dan], Kang, X.G.[Xian-Gui],
Countering anti-forensics of image resampling,
ICIP15(3595-3599)
IEEE DOI 1511
anti-forensics; partial autocorrelation; resampling BibRef

Zolotavkin, Y., Juhola, M.,
Quantization Based Watermarking Approach with Gain Attack Recovery,
DICTA14(1-8)
IEEE DOI 1502
AWGN BibRef

Valenzise, G., Tagliasacchi, M., Tubaro, S.,
Detectability-quality trade-off in JPEG counter-forensics,
ICIP14(5337-5341)
IEEE DOI 1502
Accuracy BibRef

Cozzolino, D.[Davide], Gragnaniello, D.[Diego], Verdoliva, L.[Luisa],
Image forgery detection through residual-based local descriptors and block-matching,
ICIP14(5297-5301)
IEEE DOI 1502
BibRef

Cozzolino, D.[Davide], Gragnaniello, D.[Diego], Verdoliva, L.[Luisa],
Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques,
ICIP14(5302-5306)
IEEE DOI 1502
Cameras BibRef

Ravi, H.[Hareesh], Subramanyam, A.V., Gupta, G.[Gaurav], Kumar, B.A.[B. Avinash],
Compression noise based video forgery detection,
ICIP14(5352-5356)
IEEE DOI 1502
Accuracy BibRef

Ferreira, A.[Anselmo], Rocha, A.[Anderson],
A Multiscale and Multi-Perturbation Blind Forensic Technique for Median Detecting,
CIARP14(302-310).
Springer DOI 1411
Detect that median filtering has been applied. BibRef

Lalitha, M., Holalad, H., Rajput, S., Muktanidhi, S.D., Mudenagudi, U.,
A classifier framework for the detection of doctored images,
NCVPRIPG13(1-4)
IEEE DOI 1408
Bayes methods BibRef

Mall, V., Roy, A.K., Mitra, S.K.,
Digital image tampering detection and localization using singular value decomposition technique,
NCVPRIPG13(1-4)
IEEE DOI 1408
cameras BibRef

Gao, S.[Shang], Zhang, C.[Cong], Wu, C.L.[Chan-Le], Ye, G.[Gang], Huang, L.[Lei],
A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image,
IWDW13(303-313).
Springer DOI 1407
BibRef

Shen, C.[Chao], Cai, Z.M.[Zhong-Min], Maxion, R.A.[Roy A.], Guan, X.H.[Xiao-Hong],
On User Interaction Behavior as Evidence for Computer Forensic Analysis,
IWDW13(221-231).
Springer DOI 1407
BibRef

Zhao, X.D.[Xu-Dong], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua], Yuan, Q.Q.[Quan-Qiao],
Image splicing detection based on noncausal Markov model,
ICIP13(4462-4466)
IEEE DOI 1402
Image splicing detection BibRef

Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando], Liste, N.[Noelia],
Quantization lattice estimation for multimedia forensics,
ICIP13(4452-4456)
IEEE DOI 1402
Dual lattice; lattice estimation; multimedia forensics; noisy estimation BibRef

Wu, C.M.[Chao-Ming],
Multi-level tamper detection and recovery with tamper type identification,
ICIP13(4512-4516)
IEEE DOI 1402
adjacent-block based detection BibRef

Conotter, V., Comesana, P., Perez-Gonzalez, F.,
Forensic analysis of full-frame linearly filtered JPEG images,
ICIP13(4517-4521)
IEEE DOI 1402
JPEG compression;linear filtering BibRef

Jain, R.[Rajiv], Doermann, D.S.[David S.],
Localized document image change detection,
ICDAR15(786-790)
IEEE DOI 1511
BibRef
Earlier:
VisualDiff: Document Image Verification and Change Detection,
ICDAR13(40-44)
IEEE DOI 1312
Change Detection; Document Image; OCR; SIFT. document image processing BibRef

Tsesmelis, T.[Theodore], Christensen, L.[Lars], Fihl, P.[Preben], Moeslund, T.B.[Thomas B.],
Tamper detection for active surveillance systems,
AVSS13(57-62)
IEEE DOI 1311
Cameras BibRef

García-Ordás, D.[Diego], Fernández-Robles, L.[Laura], Alegre, E.[Enrique], García-Ordás, M.T.[María Teresa],
Automatic Tampering Detection in Spliced Images with Different Compression Levels,
IbPRIA13(416-423).
Springer DOI 1307
BibRef

Pollard, S.[Stephen], Simske, S.[Steven], Adams, G.[Guy],
Print biometrics: Recovering forensic signatures from halftone images,
ICPR12(1651-1654).
WWW Link. 1302
BibRef

Li, H.D.[Hao-Dong], Luo, W.Q.[Wei-Qi], Huang, J.W.[Ji-Wu],
Countering anti-JPEG compression forensics,
ICIP12(241-244).
IEEE DOI 1302
BibRef

Maity, S.P.[Santi P.], Delpha, C.[Claude],
Optimal watermark power and host samples allocation under random gain attack,
ICIP12(2201-2204).
IEEE DOI 1302
BibRef

di Crescenzo, G.[Giovanni], Arce, G.[Gonzalo],
Data Forensics Constructions from Cryptographic Hashing and Coding,
IWDW11(494-509).
Springer DOI 1208
BibRef

Vázquez-Padín, D.[David], Pérez-González, F.[Fernando],
Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces,
IWDW11(306-320).
Springer DOI 1208
BibRef

Zhang, R.[Rong], Wang, R.D.[Rang-Ding], Ng, T.T.[Tian-Tsong],
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges,
IWDW11(292-305).
Springer DOI 1208
BibRef

Zhao, X.D.[Xu-Dong], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua], Lin, X.[Xiang],
A Distributed Scheme for Image Splicing Detection,
IWDW13(314-325).
Springer DOI 1407
BibRef
Earlier: A1, A2, A3, A4, Only:
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection,
IWDW11(243-256).
Springer DOI 1208
BibRef
Earlier: A1, A4, A3, A2, Only:
Detecting Digital Image Splicing in Chroma Spaces,
DW10(12-22).
Springer DOI 1010
BibRef

Chen, L.[Luyi], Wang, S.L.[Shi-Lin], Li, S.H.[Sheng-Hong], Li, J.H.[Jian-Hua],
New Feature Presentation of Transition Probability Matrix for Image Tampering Detection,
IWDW11(376-386).
Springer DOI 1208
BibRef

Bateman, P.J.[Philip J.], Ho, A.T.S.[Anthony T. S.], Briffa, J.A.[Johann A.],
Image Forensics of High Dynamic Range Imaging,
IWDW11(336-348).
Springer DOI 1208
BibRef

Kwok, C.W.[Chun-Wing], Au, O.C., Chui, S.H.[Sung-Him],
Alternative Anti-Forensics Method for Contrast Enhancement,
IWDW11(398-410).
Springer DOI 1208
BibRef

Chen, L.[Licong], Shi, Y.Q.[Yun Q.], Sutthiwan, P.[Patchara], Niu, X.X.[Xin-Xin],
Non-uniform Quantization in Breaking HUGO,
IWDW13(48-62).
Springer DOI 1407
BibRef

Liu, H.M.[Hong-Mei], Li, L.[Lei], Li, J.[Jian], Huang, J.W.[Ji-Wu],
Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates,
IWDW11(167-180).
Springer DOI 1208
BibRef

Nguyen, H.C.[Hieu Cuong], Katzenbeisser, S.[Stefan],
Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images,
IWDW11(387-397).
Springer DOI 1208
BibRef

Jung, D.J.[Dae-Jin], Hyun, D.K.[Dai-Kyung], Ryu, S.J.[Seung-Jin], Lee, J.W.[Ji-Won], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity,
IWDW11(281-291).
Springer DOI 1208
BibRef

Wu, R.[Ruoyu], Li, X.L.[Xiao-Long], Yang, B.[Bin],
Identifying computer generated graphics via histogram features,
ICIP11(1933-1936).
IEEE DOI 1201
BibRef

Ananya, U, Mudenagudi, U.[Uma],
Detection of doctored images using bispectral analysis,
ICIIP11(1-6).
IEEE DOI 1112
BibRef

Zhu, S.Y.[Shu-Yi], Cao, X.C.[Xiao-Chun], Zhao, H.D.[Han-Dong],
Photographic Composite Detection Using Two Circles,
ICIG11(858-863).
IEEE DOI 1109
BibRef

Li, L.[Lu], Xue, J.R.[Jian-Ru], Wang, X.F.[Xiao-Feng], Tian, L.[Lihua],
A Robust Approach to Detect Tampering by Exploring Correlation Patterns,
CAIP11(II: 515-522).
Springer DOI 1109
BibRef

Zhao, Y.Q.[Yu Qian], Shih, F.Y.[Frank Y.], Shi, Y.Q.[Yun Q.],
Passive Detection of Paint-Doctored JPEG Images,
DW10(1-11).
Springer DOI 1010
BibRef

Cao, H.[Hong], Kot, A.C.[Alex C.],
Detection of Tampering Inconsistencies on Mobile Photos,
DW10(105-119).
Springer DOI 1010
BibRef

Wang, W.[Wei], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise,
DW10(120-133).
Springer DOI 1010
BibRef

Serra-Ruiz, J., Megias, D.,
DWT and TSVQ-based Semi-fragile Watermarking Scheme for Tampering Detection in Remote Sensing Images,
PSIVT10(331-336).
IEEE DOI 1011
BibRef

Goodwin, J.[Julian], Chetty, G.[Girija],
Blind Video Tamper Detection Based on Fusion of Source Features,
DICTA11(608-613).
IEEE DOI 1205
BibRef

Chetty, G.[Girija], Goodwin, J.[Julian], Singh, M.[Monica],
Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features,
ACIVS10(II: 79-87).
Springer DOI 1012
BibRef

Wang, W.[Wei], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Image tampering detection based on stationary distribution of Markov chain,
ICIP10(2101-2104).
IEEE DOI 1009
BibRef

Ardizzone, E.[Edoardo], Bruno, A.[Alessandro], Mazzola, G.[Giuseppe],
Detecting multiple copies in tampered images,
ICIP10(2117-2120).
IEEE DOI 1009

See also Visual Saliency by Keypoints Distribution Analysis. BibRef

Yao, X.Z.[Xin-Zhi], Liu, H.M.[Hong-Mei], Rui, W.[Wei], Huang, J.W.[Ji-Wu],
Content-based authentication algorithm for binary images,
ICIP09(2893-2896).
IEEE DOI 0911
Tamper detection BibRef

Sutcu, Y., Coskun, B., Sencar, H.T., Memon, N.,
Tamper Detection Based on Regularity of Wavelet Transform Coefficients,
ICIP07(I: 397-400).
IEEE DOI 0709
BibRef

Gou, H.M.[Hong-Mei], Swaminathan, A.[Ashwin], Wu, M.[Min],
Noise Features for Image Tampering Detection and Steganalysis,
ICIP07(VI: 97-100).
IEEE DOI 0709
BibRef

Kihara, M.[Mirei], Fujiyoshi, M.[Masaaki], Wan, Q.T.[Qing Tao], Kiya, H.[Hitoshi],
Image Tamper Detection using Mathematical Morphology,
ICIP07(VI: 101-104).
IEEE DOI 0709
BibRef

Roy, S.[Sujoy], Sun, Q.B.[Qi-Bin],
Robust Hash for Detecting and Localizing Image Tampering,
ICIP07(VI: 117-120).
IEEE DOI 0709
BibRef

Swaminathan, A., Wu, M.[Min], Liu, K.J.R.,
Image Tampering Identification using Blind Deconvolution,
ICIP06(2309-2312).
IEEE DOI 0610
BibRef

Wu, Y.D.[Yong-Dong],
Tamper-Localization Watermarking with Systematic Error Correcting Code,
ICIP06(1965-1968).
IEEE DOI 0610
BibRef

Liu, Y., Boncelet, C.G.[Charles G.],
The Crc-Ntmac for Image Tamper Proofing and Authentication,
ICIP06(1985-1988).
IEEE DOI 0610
BibRef

Boncelet, C.G.,
Image Authentication and Tamperproofing for Noisy Channels,
ICIP05(I: 677-680).
IEEE DOI 0512
BibRef

Watanabe, J.[Jun], Hasegawa, M., Kato, S.,
A study on a watermarking method for both copyright protection and tamper detection,
ICIP04(IV: 2155-2158).
IEEE DOI 0505
BibRef

Wu, J.H.[Jin-Hai], Zhu, B.B., Li, S.P.[Shi-Peng], Lin, F.[Fuzong],
A secure image authentication algorithm with pixel-level tamper localization,
ICIP04(III: 1573-1576).
IEEE DOI 0505
BibRef

Inoue, H.,
Wavelet-based Watermarking for Tamper Proofing of Still Images,
ICIP00(Vol II: 88-91).
IEEE DOI 0008
BibRef

Fridrich, J.,
Image watermarking for tamper detection,
ICIP98(II: 404-408).
IEEE DOI 9810
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Double Compression, Double JPEG Detection, Forensics .


Last update:Mar 16, 2024 at 20:36:19