Yang, C.K.[Chen-Kuei],
Huang, C.S.[Chang-Sheng],
A Novel Watermarking Technique for Tampering Detection in Digital
Images,
ELCVIA(3), No. 1, 2004, pp. 1-12.
DOI Link
0402
BibRef
Knowles, H.D.,
Winne, D.A.,
Canagarajah, C.N.,
Bull, D.R.,
Image tamper detection and classification using support vector machines,
VISP(151), No. 4, August 2004, pp. 322-328.
IEEE Abstract.
0411
BibRef
Lin, P.L.[Phen Lan],
Hsieh, C.K.[Chung-Kai],
Huang, P.W.[Po-Whei],
A hierarchical digital watermarking method for image tamper detection
and recovery,
PR(38), No. 12, December 2005, pp. 2519-2529.
Elsevier DOI
0510
BibRef
Chang, C.C.[Chin-Chen],
Hu, Y.S.[Yih-Shin],
Lu, T.C.[Tzu-Chuen],
A watermarking-based image ownership and tampering authentication
scheme,
PRL(27), No. 5, 1 April 2006, pp. 439-446.
Elsevier DOI
0604
Image authentication; Ownership protection; Tampering detection
BibRef
Chan, C.S.[Chi-Shiang],
Chang, C.C.[Chin-Chen],
An efficient image authentication method based on Hamming code,
PR(40), No. 2, February 2007, pp. 681-690.
Elsevier DOI
0611
Image authentication; Tamper proofing; Hamming code; Torus automorphism
BibRef
Peng, X.X.[Xin-Xin],
Lu, J.F.[Jian-Feng],
Li, L.[Li],
Chang, C.C.[Chin-Chen],
Zhou, Q.[Qili],
A New Card Authentication Scheme Based on Image Watermarking and
Encryption,
IWDW16(358-369).
Springer DOI
1703
BibRef
Chan, C.S.[Chi-Shiang],
An image authentication method by applying Hamming code on rearranged
bits,
PRL(32), No. 14, 15 October 2011, pp. 1679-1690.
Elsevier DOI
1110
Image authentication; Tamper proofing; Hamming code
BibRef
Yang, H.J.[Hui-Juan],
Kot, A.C.[Alex C.],
Binary Image Authentication With Tampering Localization by Embedding
Cryptographic Signature and Block Identifier,
SPLetters(13), No. 12, December 2006, pp. 741-744.
IEEE DOI
0701
BibRef
Chang, C.C.[Chin-Chen],
Fan, Y.H.[Yi-Hsuan],
Tai, W.L.[Wei-Liang],
Four-scanning attack on hierarchical digital watermarking method for
image tamper detection and recovery,
PR(41), No. 2, February 2008, pp. 654-661.
Elsevier DOI
0711
Fragile watermarking; Image authentication; Tamper detection
BibRef
Phan, R.C.W.[Raphael C.W.],
Tampering with a watermarking-based image authentication scheme,
PR(41), No. 11, November 2008, pp. 3493-3496.
Elsevier DOI
0808
Encoding; Watermarking; Information hiding; Digital rights management;
Image authentication; Watermarking; Tampering; Ownership
BibRef
Lee, T.Y.[Tien-You],
Lin, S.D.[Shinfeng D.],
Dual watermark for image tamper detection and recovery,
PR(41), No. 11, November 2008, pp. 3497-3506.
Elsevier DOI
0808
Dual watermark; Tamper recovery; Second chance; Partner-block
BibRef
Qi, X.J.[Xiao-Jun],
Xin, X.[Xing],
A quantization-based semi-fragile watermarking scheme for image content
authentication,
JVCIR(22), No. 2, February 2011, pp. 187-200.
Elsevier DOI
1102
Authentication measures; Error map; Quantization; Semi-fragile
watermarking; Wavelet transform; Tampered error pixels; Tampering
detection sensitivity; Localization capability
BibRef
Qi, X.J.[Xiao-Jun],
Xin, X.[Xing],
A singular-value-based semi-fragile watermarking scheme for image
content authentication with tamper localization,
JVCIR(30), No. 1, 2015, pp. 312-327.
Elsevier DOI
1507
Adaptive quantization
BibRef
Qi, X.J.[Xiao-Jun],
Xin, X.[Xing],
Chang, R.[Ran],
Image authentication and tamper detection using two complementary
watermarks,
ICIP09(4257-4260).
IEEE DOI
0911
BibRef
Chuang, J.C.[Jun-Chou],
Hu, Y.C.[Yu-Chen],
An adaptive image authentication scheme for vector quantization
compressed image,
JVCIR(22), No. 5, July 2011, pp. 440-449.
Elsevier DOI
1106
Tamper detection; Image authentication; Watermark; Image compression;
Vector quantization; Index table; Random values; Random seed
BibRef
Kim, K.S.[Kyung-Su],
Lee, M.J.[Min-Jeong],
Lee, J.W.[Ji-Won],
Oh, T.W.[Tae-Woo],
Lee, H.Y.[Hae-Yeoun],
Region-based tampering detection and recovery using homogeneity
analysis in quality-sensitive imaging,
CVIU(115), No. 9, September 2011, pp. 1308-1323.
Elsevier DOI
1107
Content authentication; Homogeneity analysis; Quad-tree decomposition;
Tampering detection; Tampering recovery
BibRef
Oh, T.W.[Tae-Woo],
Kim, K.S.[Kyung-Su],
Lee, H.Y.[Hae-Yeon],
Lee, J.W.[Ji-Won],
Lee, H.K.[Heung-Kyu],
Enhancing perceptual quality of watermarked high-definition video
through composite mask,
IPTA10(161-165).
IEEE DOI
1007
BibRef
Lee, M.J.[Min-Jeong],
Kim, K.S.[Kyung-Su],
Suh, Y.H.[Young-Ho],
Lee, H.K.[Heung-Kyu],
Improved watermark detection robust to camcorder capture based on
quadrangle estimation,
ICIP09(101-104).
IEEE DOI
0911
BibRef
Kim, H.D.[Hee-Dong],
Oh, T.W.[Tae-Woo],
Lee, J.W.[Ji-Won],
Lee, H.K.[Heung-Kyu],
A hybrid watermarking scheme for CCL-applied video contents,
EUVIP11(199-204).
IEEE DOI
1110
BibRef
Oh, T.W.[Tae-Woo],
Lee, M.J.[Min-Jeong],
Kim, K.S.[Kyung-Su],
Yoon, Y.S.[Young-Suk],
Lee, H.K.[Heung-Kyu],
Spatial self-synchronizing video watermarking technique,
ICIP09(4233-4236).
IEEE DOI
0911
BibRef
Lee, M.J.[Min-Jeong],
Kim, K.S.[Kyung-Su],
Lee, H.Y.[Hae-Yeoun],
Oh, T.W.[Tae-Woo],
Suh, Y.H.[Young-Ho],
Lee, H.K.[Heung-Kyu],
Robust watermark detection against D-A/A-D conversion for digital
cinema using local auto-correlation function,
ICIP08(425-428).
IEEE DOI
0810
BibRef
Kim, K.S.[Kyung-Su],
Im, D.H.[Dong-Hyuck],
Suh, Y.H.[Young-Ho],
Lee, H.K.[Heung-Kyu],
A Practical Real-Time Video Watermarking Scheme Robust against
Downscaling Attack,
DW07(323-334).
Springer DOI
0712
BibRef
He, Z.W.[Zhong-Wei],
Sun, W.[Wei],
Lu, W.[Wei],
Lu, H.T.[Hong-Tao],
Digital image splicing detection based on approximate run length,
PRL(32), No. 12, 1 September 2011, pp. 1591-1597.
Elsevier DOI
1108
Image splicing detection; Digital image forensics; Approximate run
length; Edge detection; Characteristic function
BibRef
Zhang, Q.B.[Qing-Bo],
Lu, W.[Wei],
Weng, J.[Jian],
Joint image splicing detection in DCT and Contourlet transform domain,
JVCIR(40, Part B), No. 1, 2016, pp. 449-458.
Elsevier DOI
1610
Image splicing detection
BibRef
He, Z.W.[Zhong-Wei],
Lu, W.[Wei],
Sun, W.[Wei],
Improved Run Length Based Detection of Digital Image Splicing,
IWDW11(349-360).
Springer DOI
1208
BibRef
He, Z.W.[Zhong-Wei],
Lu, W.[Wei],
Sun, W.[Wei],
Huang, J.W.[Ji-Wu],
Digital image splicing detection based on Markov features in DCT and
DWT domain,
PR(45), No. 12, December 2012, pp. 4292-4299.
Elsevier DOI
1208
Image splicing detection; Digital image forensics; Discrete cosine
transform; Discrete wavelet transform; Markov; SVM-RFE
BibRef
Feng, X.,
Cox, I.J.,
Doerr, G.,
Normalized Energy Density-Based Forensic Detection of Resampled Images,
MultMed(14), No. 3, 2012, pp. 536-545.
IEEE DOI
1202
BibRef
Faridul, H.S.[Hasan Sheikh],
Doerr, G.[Gwenael],
Outlier aggregation to pick up scattered watermark energy,
ICIP15(2485-2489)
IEEE DOI
1511
Cross-correlation
BibRef
Lee, J.W.[Ji-Won],
Lee, M.J.[Min-Jeong],
Lee, H.Y.[Hae-Yeoun],
Lee, H.K.[Heung-Kyu],
Screenshot identification by analysis of directional inequality of
interlaced video,
JIVP(2012), No. 1 2012, pp. xx-yy.
DOI Link
1202
BibRef
Wang, X.F.[Xiao-Feng],
Xue, J.R.[Jian-Ru],
Zheng, Z.Q.[Zhen-Qiang],
Liu, Z.L.[Zhen-Li],
Li, N.[Ning],
Image forensic signature for content authenticity analysis,
JVCIR(23), No. 5, July 2012, pp. 782-797.
Elsevier DOI
1205
Forensic signature; Robust image hash; Content authenticity analysis;
Geometric transform estimation; Tampering detection; Tampering
localization; Adaptive Harris corner detection; Fisher criterion
BibRef
Barni, M.,
Costanzo, A.,
A fuzzy approach to deal with uncertainty in image forensics,
SP:IC(27), No. 9, October 2012, pp. 998-1010.
Elsevier DOI
1210
Image forensics; Tampering detection; Fuzzy logic; Data fusion
BibRef
Sencar, H.T.[Husrev Taha],
Memon, N.[Nasir], (Eds.)
Digital Image Forensics:
There is More to a Picture than Meets the Eye,
Springer2013
ISBN 978-1-4614-0756-0
Memon, N.[Nasir],
Photo Forensics: There Is More to a Picture than Meets the Eye,
IWDW11(2).
Springer DOI
1208
BibRef
And:
AVSBS11(3).
IEEE DOI
1111
Keynote, summary of ideas.
BibRef
Tong, X.J.[Xiao-Jun],
Liu, Y.[Yang],
Zhang, M.[Miao],
Chen, Y.[Yue],
A novel chaos-based fragile watermarking for image tampering detection
and self-recovery,
SP:IC(28), No. 3, March 2013, pp. 301-308.
Elsevier DOI
1303
Chaos; Image security; Fragile watermarking; Tampering localization;
Self-recovery
BibRef
Singh, D.[Durgesh],
Shivani, S.[Shivendra],
Agarwal, S.[Suneeta],
Quantization-Based Fragile Watermarking Using Block-Wise Authentication
and Pixel-Wise Recovery Scheme for Tampered Image,
IJIG(13), No. 2, April 2013, pp. 1340002.
DOI Link
1308
BibRef
Earlier: A2, A1, A3:
DCT Based Approach for Tampered Image Detection and Recovery Using
Block Wise Fragile Watermarking Scheme,
IbPRIA13(640-647).
Springer DOI
1307
BibRef
Chen, C.L.[Cheng-Long],
Ni, J.Q.[Jiang-Qun],
Huang, J.W.[Ji-Wu],
Blind Detection of Median Filtering in Digital Images:
A Difference Domain Based Approach,
IP(22), No. 12, 2013, pp. 4699-4710.
IEEE DOI
1312
BibRef
Earlier: A1, A2, Only:
Median Filtering Detection Using Edge Based Prediction Matrix,
IWDW11(361-375).
Springer DOI
1208
image coding
BibRef
Tokuda, E.[Eric],
Pedrini, H.[Helio],
Rocha, A.[Anderson],
Computer generated images vs. digital photographs:
A synergetic feature and classifier combination approach,
JVCIR(24), No. 8, 2013, pp. 1276-1292.
Elsevier DOI
1312
Digital forensics
BibRef
Ryu, S.J.[Seung-Jin],
Lee, H.K.[Heung-Kyu],
Estimation of linear transformation by analyzing the periodicity of
interpolation,
PRL(36), No. 1, 2014, pp. 89-99.
Elsevier DOI
1312
Image forensics
BibRef
Kannammal, A.,
Rani, S.S.[S. Subha],
Two level security for medical images using watermarking/encryption
algorithms,
IJIST(24), No. 1, 2014, pp. 111-120.
DOI Link
1403
digital imaging and communications in medicine
BibRef
Ryu, S.J.[Seung-Jin],
Lee, H.Y.[Hae-Yeoun],
Lee, H.K.[Heung-Kyu],
Detecting Trace of Seam Carving for Forensic Analysis,
IEICE(E97-D), No. 5, May 2014, pp. 1304-1311.
WWW Link.
1405
BibRef
Yang, B.J.[Ben-Juan],
Liu, B.Y.[Ben-Yong],
Feature Fusion for Blurring Detection in Image Forensics,
IEICE(E97-D), No. 6, June 2014, pp. 1690-1693.
WWW Link.
1407
BibRef
Chang, T.Y.[Tang-You],
Tai, S.C.[Shen-Chuan],
Lin, G.S.[Guo-Shiang],
A passive multi-purpose scheme based on periodicity analysis of CFA
artifacts for image forensics,
JVCIR(25), No. 6, 2014, pp. 1289-1298.
Elsevier DOI
1407
Image forensics
BibRef
Vellaisamy, S.,
Ramesh, V.,
Inversion attack resilient zero-watermarking scheme for medical image
authentication,
IET-IPR(8), No. 12, 2014, pp. 718-727.
DOI Link
1412
image watermarking
BibRef
Bian, S.[Shan],
Luo, W.Q.[Wei-Qi],
Huang, J.W.[Ji-Wu],
Exposing Fake Bit Rate Videos and Estimating Original Bit Rates,
CirSysVideo(24), No. 12, December 2014, pp. 2144-2154.
IEEE DOI
1412
BibRef
Earlier:
Exposing fake bitrate video and its original bitrate,
ICIP13(4492-4496)
IEEE DOI
1402
Feature extraction.
Digital Video Forensics; Fake Bitrate Video; Video Bitrate Estimation
BibRef
de Rosa, A.,
Fontani, M.,
Massai, M.,
Piva, A.,
Barni, M.,
Second-Order Statistics Analysis to Cope With Contrast Enhancement
Counter-Forensics,
SPLetters(22), No. 8, August 2015, pp. 1132-1136.
IEEE DOI
1502
digital forensics
BibRef
Chu, X.,
Stamm, M.C.[Matthew C.],
Chen, Y.,
Liu, K.J.R.[K. J. Ray],
On Antiforensic Concealability With Rate-Distortion Tradeoff,
IP(24), No. 3, March 2015, pp. 1087-1100.
IEEE DOI
1502
Detectors
BibRef
Stamm, M.C.[Matthew C.],
Tjoa, S.K.[Steven K.],
Lin, W.S.[W. Sabrina],
Liu, K.J.R.[K. J. Ray],
Undetectable image tampering through JPEG compression anti-forensics,
ICIP10(2109-2112).
IEEE DOI
1009
BibRef
Zhao, X.,
Wang, S.,
Li, S.,
Li, J.,
Passive Image-Splicing Detection by a 2-D Noncausal Markov Model,
CirSysVideo(25), No. 2, February 2015, pp. 185-199.
IEEE DOI
1502
Analytical models
BibRef
Yoshida, M.[Maki],
Ohkita, K.[Kazuya],
Fujiwara, T.[Toru],
Individual Restoration of Tampered Pixels for Statistical Fragile
Watermarking,
IEICE(E98-D), No. 1, January 2015, pp. 58-64.
WWW Link.
1503
BibRef
Ohkita, K.[Kazuya],
Yoshida, M.[Maki],
Kitamura, I.[Itaru],
Fujiwara, T.[Toru],
Improving Capability of Locating Tampered Pixels of Statistical Fragile
Watermarking,
DW09(279-293).
Springer DOI
0908
BibRef
Lee, S.W.[Sang-Wook],
Song, J.E.[Ji Eun],
Lee, W.Y.[Wan Yeon],
Ko, Y.W.[Young Woong],
Lee, H.[Heejo],
Integrity Verification Scheme of Video Contents in Surveillance Cameras
for Digital Forensic Investigations,
IEICE(E98-D), No. 1, January 2015, pp. 95-97.
WWW Link.
1503
BibRef
Eswaraiah, R.,
Reddy, E.S.[E. Sreenivasa],
Robust medical image watermarking technique for accurate detection of
tampers inside region of interest and recovering original region of
interest,
IET-IPR(9), No. 8, 2015, pp. 615-625.
DOI Link
1506
Internet
BibRef
Khan, Z.[Zohaib],
Shafait, F.[Faisal],
Mian, A.[Ajmal],
Automatic ink mismatch detection for forensic document analysis,
PR(48), No. 11, 2015, pp. 3615-3626.
Elsevier DOI
1506
BibRef
Earlier:
Hyperspectral Document Imaging: Challenges and Perspectives,
CBDAR13(150-163).
Springer DOI
1404
BibRef
Earlier:
Hyperspectral Imaging for Ink Mismatch Detection,
ICDAR13(877-881)
IEEE DOI
1312
Hyperspectral imaging.
document image processing
BibRef
Khan, Z.[Zohaib],
Shafait, F.[Faisal],
Mian, A.[Ajmal],
Joint Group Sparse PCA for Compressed Hyperspectral Imaging,
IP(24), No. 12, December 2015, pp. 4934-4942.
IEEE DOI
1512
compressed sensing
BibRef
Hou, J.[Jun],
Cheng, Y.[Yan],
Expose Spliced Photographic Basing on Boundary and Noise Features,
IEICE(E98-D), No. 7, July 2015, pp. 1426-1429.
WWW Link.
1508
BibRef
Chen, J.S.[Jian-Sheng],
Kang, X.G.[Xian-Gui],
Liu, Y.[Ye],
Wang, Z.J.,
Median Filtering Forensics Based on Convolutional Neural Networks,
SPLetters(22), No. 11, November 2015, pp. 1849-1853.
IEEE DOI
1509
digital forensics
BibRef
Botta, M.[Marco],
Cavagnino, D.[Davide],
Pomponiu, V.[Victor],
Optimization techniques to transform fragile watermarking,
SPIE(Newsroom), July 11, 2015
DOI Link
1511
An algorithm alters image pixels to enable insertion of a watermark
into the coefficients of a transformed domain, without the need for
inverse transformation.
BibRef
Carvalho, T.[Tiago],
Illumination Inconsistency Sleuthing for Exposing Fauxtography and
Uncovering Composition Telltales in Digital Images,
ELCVIA(14), No. 3, 2015, pp. xx-yy.
DOI Link
1601
Thesis summary.
Is the image real or composed.
BibRef
Mittal, A.,
Saad, M.A.,
Bovik, A.C.,
A Completely Blind Video Integrity Oracle,
IP(25), No. 1, January 2016, pp. 289-300.
IEEE DOI
1601
Databases
BibRef
Korus, P.,
Huang, J.,
Improved Tampering Localization in Digital Image Forensics Based on
Maximal Entropy Random Walk,
SPLetters(23), No. 1, January 2016, pp. 169-173.
IEEE DOI
1601
Detectors
BibRef
Korus, P.,
Huang, J.,
Multi-Scale Fusion for Improved Localization of Malicious Tampering
in Digital Images,
IP(25), No. 3, March 2016, pp. 1312-1326.
IEEE DOI
1602
Authentication
BibRef
Pasquini, C.[Cecilia],
Statistical and deterministic approaches for multimedia forensics,
ELCVIA(15), No. 2, 2016, pp. 16-18.
DOI Link
1611
BibRef
Iuliani, M.[Massimo],
Fanfani, M.[Marco],
Colombo, C.[Carlo],
Piva, A.[Alessandro],
Reliability assessment of principal point estimates for forensic
applications,
JVCIR(42), No. 1, 2017, pp. 65-77.
Elsevier DOI
1701
camera principal point.
Image Forensics
BibRef
Liu, Q.Z.[Qing-Zhong],
An approach to detecting JPEG down-recompression and seam carving
forgery under recompression anti-forensics,
PR(65), No. 1, 2017, pp. 35-46.
Elsevier DOI
1702
BibRef
Earlier:
Exposing seam carving forgery under recompression attacks by hybrid
large feature mining,
ICPR16(1041-1046)
IEEE DOI
1705
Discrete cosine transforms, Feature extraction, Forgery,
Image coding, Image forensics, Medical services, Transform coding,
big feature mining, image forgery, recompression, seam carving.
BibRef
Shen, X.J.[Xuan-Jing],
Shi, Z.[Zenan],
Chen, H.P.[Hai-Peng],
Splicing image forgery detection using textural features based on the
grey level co-occurrence matrices,
IET-IPR(11), No. 1, January 2017, pp. 44-53.
DOI Link
1703
BibRef
Chen, C.,
Ni, J.,
Shen, Z.,
Shi, Y.Q.,
Blind Forensics of Successive Geometric Transformations in Digital
Images Using Spectral Method: Theory and Applications,
IP(26), No. 6, June 2017, pp. 2811-2824.
IEEE DOI
1705
frequency-domain analysis, image forensics, image sampling,
blind forensics, characteristic resampling peaks, digital images,
frequency domain, image authentication, image forgery detection,
image geometric transformation, image security,
periodic artifacts, repeated resizing, repeated rotation,
resizing-rotation, second-order statistics, spectral method,
successive geometric transformation,
undergone single-geometric transformation, Digital images,
Forensics, Forgery, Image coding, Image reconstruction,
Interpolation, Transform coding, Digital image forensics,
geometric transformations, image forgery detection,
interpolation detection, resampling, detection
BibRef
Hou, J.U.,
Lee, H.K.,
Detection of Hue Modification Using Photo Response Nonuniformity,
CirSysVideo(27), No. 8, August 2017, pp. 1826-1832.
IEEE DOI
1708
Algorithm design and analysis, Correlation, Digital images,
Estimation, Forensics, Forgery, Image color analysis,
Color filter array (CFA), digital image forensics, hue,
photo response nonuniformity (PRNU), sensor, pattern, noise
BibRef
Zhang, D.Y.[Deng-Yong],
Yin, T.[Ting],
Yang, G.B.[Gao-Bo],
Xia, M.[Ming],
Li, L.[Leida],
Sun, X.M.[Xing-Ming],
Detecting image seam carving with low scaling ratio using multi-scale
spatial and spectral entropies,
JVCIR(48), No. 1, 2017, pp. 281-291.
Elsevier DOI
1708
Image forensics
BibRef
Ding, F.[Feng],
Zhu, G.P.[Guo-Pu],
Dong, W.Q.[Wei-Qiang],
Shi, Y.Q.[Yun-Qing],
An efficient weak sharpening detection method for image forensics,
JVCIR(50), No. 1, 2018, pp. 93-99.
Elsevier DOI
1712
Image forensics
BibRef
Feng, C.,
Xu, Z.,
Jia, S.,
Zhang, W.,
Xu, Y.,
Motion-Adaptive Frame Deletion Detection for Digital Video Forensics,
CirSysVideo(27), No. 12, December 2017, pp. 2543-2554.
IEEE DOI
1712
Forensics, Histograms, Jitter, Lighting, Motion measurement,
Vibrations, Video sequences, Fluctuation feature, frame deletion,
video forensics
BibRef
Li, H.,
Luo, W.,
Qiu, X.,
Huang, J.,
Identification of Various Image Operations Using Residual-Based
Features,
CirSysVideo(28), No. 1, January 2018, pp. 31-45.
IEEE DOI
1801
Cameras, Correlation, Feature extraction, Forensics, Image coding,
Transform coding, Countering anti-forensics, image forensics,
image residuals
BibRef
Su, L.,
Li, C.,
Lai, Y.,
Yang, J.,
A Fast Forgery Detection Algorithm Based on Exponential-Fourier
Moments for Video Region Duplication,
MultMed(20), No. 4, April 2018, pp. 825-840.
IEEE DOI
1804
Algorithm design and analysis, Computational efficiency,
Detection algorithms, Feature extraction, Forensics, Forgery,
region duplication
BibRef
Sun, J.Y.[Jee-Young],
Kim, S.W.[Seung-Wook],
Lee, S.W.[Sang-Won],
Ko, S.J.[Sung-Jea],
A novel contrast enhancement forensics based on convolutional neural
networks,
SP:IC(63), 2018, pp. 149-160.
Elsevier DOI
1804
Digital image forensics, Contrast enhancement,
Convolutional neural networks, Deep learning, Gray level co-occurrence matrix
BibRef
Han, J.G.[Jong Goo],
Park, T.H.[Tae Hee],
Moon, Y.H.[Yong Ho],
Eom, I.K.[Il Kyu],
Quantization-based Markov feature extraction method for image splicing
detection,
MVA(29), No. 3, April 2018, pp. 543-552.
WWW Link.
1804
BibRef
Akhtar, Z.[Zeeshan],
Khan, E.[Ekram],
Revealing the traces of histogram equalisation in digital images,
IET-IPR(12), No. 5, May 2018, pp. 760-768.
DOI Link
1804
BibRef
Iakovidou, C.[Chryssanthi],
Zampoglou, M.[Markos],
Papadopoulos, S.[Symeon],
Kompatsiaris, Y.[Yiannis],
Content-aware detection of JPEG grid inconsistencies for intuitive
image forensics,
JVCIR(54), 2018, pp. 155-170.
Elsevier DOI
1806
Image forensics, JPEG artifacts, Forgery localization, Splicing
BibRef
Park, J.S.[Jin-Seok],
Kim, H.G.[Hyeon-Gi],
Kim, D.G.[Do-Guk],
Yu, I.J.[In-Jae],
Lee, H.K.[Heung-Kyu],
Paired mini-batch training: A new deep network training for image
forensics and steganalysis,
SP:IC(67), 2018, pp. 132-139.
Elsevier DOI
1808
Deep learning, Deep convolutional neural networks, Mini-batch,
Image forensics, Steganalysis
BibRef
Yang, B.[Bin],
Sun, X.M.[Xing-Ming],
Cao, E.[Enguo],
Hu, W.F.[Wei-Feng],
Chen, X.Y.[Xian-Yi],
Convolutional neural network for smooth filtering detection,
IET-IPR(12), No. 8, August 2018, pp. 1432-1438.
DOI Link
1808
Detect smoothing that is used to hide changes.
BibRef
Wang, P.[Ping],
Liu, F.L.[Fen-Lin],
Yang, C.F.[Chun-Fang],
Luo, X.Y.[Xiang-Yang],
Blind forensics of image gamma transformation and its application in
splicing detection,
JVCIR(55), 2018, pp. 80-90.
Elsevier DOI
1809
Blind forensics, Gamma transformation, Manipulation detection,
Splicing, Tampered area location
BibRef
Rocha, A.[Anderson],
Li, S.J.[Shu-Jun],
Kuo, C.C.J.[C.C. Jay],
Piva, A.[Alessandro],
Huang, J.W.[Ji-Wu],
Data-driven multimedia forensics and security,
JVCIR(55), 2018, pp. 447-448.
Elsevier DOI
1809
BibRef
Singh, P.,
Raman, B.,
Agarwal, N.,
Toward Encrypted Video Tampering Detection and Localization Based on
POB Number System Over Cloud,
CirSysVideo(28), No. 9, September 2018, pp. 2116-2130.
IEEE DOI
1809
Cryptography, Authentication, Cloud computing, Servers,
Multimedia communication, Watermarking, Streaming media,
encrypted domain
BibRef
Sheng, H.[Hongda],
Shen, X.J.[Xuan-Jing],
Lyu, Y.D.[Ying-Da],
Shi, Z.[Zenan],
Ma, S.Y.[Shu-Yang],
Image splicing detection based on Markov features in discrete octonion
cosine transform domain,
IET-IPR(12), No. 10, October 2018, pp. 1815-1823.
DOI Link
1809
BibRef
Shi, Z.N.[Ze-Nan],
Shen, X.J.[Xuan-Jing],
Chen, H.P.[Hai-Peng],
Lyu, Y.D.[Ying-Da],
Global Semantic Consistency Network for Image Manipulation Detection,
SPLetters(27), 2020, pp. 1755-1759.
IEEE DOI
2010
Feature extraction, Semantics, Decoding, Encoding, Convolution,
Bidirectional control, Convolutional codes,
deep learning
BibRef
Zhu, N.[Nan],
Li, Z.[Zhao],
Blind image splicing detection via noise level function,
SP:IC(68), 2018, pp. 181-192.
Elsevier DOI
1810
Image forensics, Image splicing detection,
Noise level function, Noise variance estimation
BibRef
Bhardwaj, D.[Dinesh],
Pankajakshan, V.[Vinod],
A JPEG blocking artifact detector for image forensics,
SP:IC(68), 2018, pp. 155-161.
Elsevier DOI
1810
Blocking artifacts, Image forensics, JPEG compression
BibRef
Ye, J.Y.[Jing-Yu],
Shen, Z.Y.[Zhang-Yi],
Behrani, P.[Piyush],
Ding, F.[Feng],
Shi, Y.Q.[Yun-Qing],
Detecting USM image sharpening by using CNN,
SP:IC(68), 2018, pp. 258-264.
Elsevier DOI
1810
Image sharpening, Image forensics, Unsharp Masking,
Convolutional neural network, Edge perpendicular ternary coding
BibRef
Cattaneo, G.[Giuseppe],
Roscigno, G.[Gianluca],
Petrillo, U.F.[Umberto Ferraro],
Improving the experimental analysis of tampered image detection
algorithms for biometric systems,
PRL(113), 2018, pp. 93-101.
Elsevier DOI
1810
Image integrity, Biometric systems, Image analysis,
Performance analysis, Digital image forensics, Tampered image detection
BibRef
Zhao, W.[Wei],
Yang, P.P.[Peng-Peng],
Ni, R.R.[Rong-Rong],
Zhao, Y.[Yao],
Wu, H.R.[Hao-Rui],
Security Consideration for Deep Learning-Based Image Forensics,
IEICE(E101-D), No. 12, December 2018, pp. 3263-3266.
WWW Link.
1812
BibRef
Shan, W.Y.[Wu-Yang],
Yi, Y.H.[Yao-Hua],
Huang, R.G.[Rong-Gang],
Xie, Y.[Yong],
Robust contrast enhancement forensics based on convolutional neural
networks,
SP:IC(71), 2019, pp. 138-146.
Elsevier DOI
1901
Contrast enhancement, Convolutional neural networks,
Robust forensics, Composite image, JPEG compression
BibRef
Qin, C.,
Ji, P.,
Chang, C.,
Dong, J.,
Sun, X.,
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for
Image Tampering Recovery,
MultMedMag(25), No. 3, July 2018, pp. 36-48.
IEEE DOI
1901
Watermarking, Image coding, Image reconstruction, Authentication,
Iterative decoding, Visualization, Multimedia communication,
content recovery
BibRef
Guan, H.,
Kozak, M.,
Robertson, E.,
Lee, Y.,
Yates, A.N.,
Delgado, A.,
Zhou, D.,
Kheyrkhah, T.,
Smith, J.,
Fiscus, J.,
MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic
Challenge Evaluation,
IVF19(63-72)
IEEE DOI
1902
Electromagnetic interference
BibRef
Singh, P.[Priyanka],
Atrey, P.K.[Pradeep K.],
Recovering tampered regions in encrypted video using POB number
system,
SP:IC(74), 2019, pp. 96-109.
Elsevier DOI
1904
Permutation ordered binary (POB) number system,
Secret sharing, Encrypted domain
BibRef
Qiao, T.[Tong],
Shi, R.[Ran],
Luo, X.Y.[Xiang-Yang],
Xu, M.[Ming],
Zheng, N.[Ning],
Wu, Y.M.[Yi-Ming],
Statistical Model-Based Detector via Texture Weight Map:
Application in Re-Sampling Authentication,
MultMed(21), No. 5, May 2019, pp. 1077-1092.
IEEE DOI
1905
Authenticate a re-sampled image.
image coding, image sampling, image texture, statistical analysis,
statistical testing, texture weight map,
hypothesis testing
BibRef
Chen, Y.F.[Yi-Fang],
Kang, X.G.[Xian-Gui],
Shi, Y.Q.[Yun Q.],
Wang, Z.J.[Z. Jane],
A multi-purpose image forensic method using densely connected
convolutional neural networks,
RealTimeIP(16), No. 3, June 2019, pp. 725-740.
Springer DOI
WWW Link.
1906
BibRef
Yu, J.J.[Jing-Jing],
Zhan, Y.F.[Yi-Feng],
Yang, J.H.[Jian-Hua],
Kang, X.G.[Xian-Gui],
A Multi-purpose Image Counter-anti-forensic Method Using Convolutional
Neural Networks,
IWDW16(3-15).
Springer DOI
1703
BibRef
Ye, J.Y.[Jing-Yu],
Shi, Y.Q.[Yun-Qing],
A Hybrid Feature Model for Seam Carving Detection,
IWDW17(77-89).
Springer DOI
1708
BibRef
Earlier:
A Local Derivative Pattern Based Image Forensic Framework for Seam
Carving Detection,
IWDW16(172-184).
Springer DOI
1703
BibRef
Gao, S.D.[Shang-De],
Liao, X.[Xin],
Liu, X.C.[Xu-Chong],
Real-time detecting one specific tampering operation in multiple
operator chains,
RealTimeIP(16), No. 3, June 2019, pp. 741-750.
WWW Link.
1906
BibRef
Yao, H.C.[Hai-Chao],
Ni, R.R.[Rong-Rong],
Zhao, Y.[Yao],
An approach to detect video frame deletion under anti-forensics,
RealTimeIP(16), No. 3, June 2019, pp. 751-764.
WWW Link.
1906
BibRef
Hosseini, M.D.M.[Morteza Darvish Morshedi],
Kirchner, M.[Matthias],
Unsupervised Image Manipulation Localization With Non-Binary Label
Attribution,
SPLetters(26), No. 7, July 2019, pp. 976-980.
IEEE DOI
1906
feature extraction, image classification, image coding,
image colour analysis, image representation, image retrieval,
Heating systems
BibRef
Zhang, Q.[Qin],
Xiao, H.M.[Hui-Mei],
Xue, F.[Fei],
Lu, W.[Wei],
Liu, H.M.[Hong-Mei],
Huang, F.J.[Fang-Jun],
Digital image forensics of non-uniform deblurring,
SP:IC(76), 2019, pp. 167-177.
Elsevier DOI
1906
Digital image forensics, Non-uniform deblurring localization,
Multi-derivative gray level co-occurrence matrix (MGLCM),
Top-down multi-scale boundary fusion (TMBF)
BibRef
Liu, Q.,
An Improved Approach to Exposing JPEG Seam Carving Under
Recompression,
CirSysVideo(29), No. 7, July 2019, pp. 1907-1918.
IEEE DOI
1907
Transform coding, Forgery, Feature extraction, Image coding,
Correlation, Mathematical model, Medical services, JPEG,
recompression
BibRef
Vatansever, S.[Saffet],
Dirik, A.E.[Ahmet Emir],
Memon, N.[Nasir],
Detecting the Presence of ENF Signal in Digital Videos:
A Superpixel-Based Approach,
SPLetters(24), No. 10, October 2017, pp. 1463-1467.
IEEE DOI
1710
Electrical network frequency.
brightness, image forensics, video cameras,
video signal processing, ENF signal presence detection method,
BibRef
Kumar, M.[Manoj],
Rani, A.[Anuj],
Srivastava, S.[Sangeet],
Image Forensics Based on Lighting Estimation,
IJIG(19), No. 3 2019, pp. 1950014.
DOI Link
1908
BibRef
Tariang, D.B.,
Chakraborty, R.S.,
Naskar, R.,
A Robust Residual Dense Neural Network For Countering Antiforensic
Attack on Median Filtered Images,
SPLetters(26), No. 8, August 2019, pp. 1132-1136.
IEEE DOI
1908
data compression, image classification, image coding,
image filtering, image forensics,
residual dense network (RDN)
BibRef
Wang, J.,
Li, T.,
Luo, X.,
Shi, Y.,
Jha, S.K.,
Identifying Computer Generated Images Based on Quaternion Central
Moments in Color Quaternion Wavelet Domain,
CirSysVideo(29), No. 9, September 2019, pp. 2775-2785.
IEEE DOI
1909
Quaternions, Discrete wavelet transforms, Color,
Image color analysis, Forensics,
forensics
BibRef
Qureshi, M.A.[Muhammad Ali],
El-Alfy, E.S.M.[El-Sayed M.],
Bibliography of digital image anti-forensics and anti-anti-forensics
techniques,
IET-IPR(13), No. 11, 19 September 2019, pp. 1811-1823.
DOI Link
1909
Survey, Forensics.
BibRef
Pal, P.[Pabitra],
Jana, B.[Biswapati],
Bhaumik, J.[Jaydeb],
Robust watermarking scheme for tamper detection and authentication
exploiting CA,
IET-IPR(13), No. 12, October 2019, pp. 2116-2129.
DOI Link
1911
BibRef
Du, L.[Ling],
Ho, A.T.S.[Anthony T.S.],
Cong, R.[Runmin],
Perceptual hashing for image authentication: A survey,
SP:IC(81), 2020, pp. 115713.
Elsevier DOI
1912
Survey, Tamper Detection. Tamper detection, Perceptual image hashing,
Content authenticity analysis, Security
BibRef
Yang, B.[Bin],
Li, Z.Y.[Zhen-Yu],
Zhang, T.[Tao],
A real-time image forensics scheme based on multi-domain learning,
RealTimeIP(17), No. 1, February 2020, pp. 29-40.
WWW Link.
2002
BibRef
Sharma, S.[Shishir],
Ravi, H.[Hareesh],
Subramanyam, A.V.,
Emmanuel, S.[Sabu],
Anti-forensics of median filtering and contrast enhancement,
JVCIR(66), 2020, pp. 102682.
Elsevier DOI
2003
Anti-forensics, Median filtering, Contrast enhancement,
Huber Markov random field
BibRef
Duan, G.[Guiduo],
Miao, J.Y.[Jia-Yu],
Huang, T.X.[Tian-Xi],
Median Filtering Detection of Small-size Image Using Alexcaps-network,
IWDW19(126-140).
Springer DOI
2003
BibRef
Cheng, H.,
Wei, J.,
Lin, C.,
Ye, J.,
Detecting Seam-Carved Image by Extreme Learning Machines Using Patch
Analysis Method, Jury Voting, and Combinatorial Fusion,
SMCS(50), No. 5, May 2020, pp. 1850-1864.
IEEE DOI
2005
Support vector machines, Feature extraction, Task analysis,
Training, Testing, Neurons, Nonlinear distortion,
support vector machine (SVM)
BibRef
Dansena, P.[Prabhat],
Pal, R.[Rajarshi],
Bag, S.[Soumen],
Quantitative assessment of capabilities of colour models for pen ink
discrimination in handwritten documents,
IET-IPR(14), No. 8, 19 June 2020, pp. 1594-1604.
DOI Link
2005
BibRef
Abhishek,
Jindal, N.[Neeru],
Hybrid deep learning and machine learning approach for passive image
forensic,
IET-IPR(14), No. 10, August 2020, pp. 1952-1959.
DOI Link
2008
BibRef
Wang, P.[Ping],
Liu, F.L.[Fen-Lin],
Yang, C.F.[Chun-Fang],
Thresholding binary coding for image forensics of weak sharpening,
SP:IC(88), 2020, pp. 115956.
Elsevier DOI
2009
Image forensics, Texture pattern mapping,
Thresholding binary coding, Unsharp mask, Weak sharpening
BibRef
Kumawat, C.[Chothmal],
Pankajakshan, V.[Vinod],
A robust JPEG compression detector for image forensics,
SP:IC(89), 2020, pp. 116008.
Elsevier DOI
2010
JPEG compression artifacts, JPEG forensics,
JPEG anti-forensics, Calibration
BibRef
Hatoum, M.W.[Makram W.],
Couchot, J.F.[Jean-François],
Couturier, R.[Raphaël],
Darazi, R.[Rony],
Using Deep learning for image watermarking attack,
SP:IC(90), 2021, pp. 116019.
Elsevier DOI
2012
Image denoising, Deep learning, Digital watermarking,
Robustness, Fidelity
BibRef
Yuan, X.C.[Xiao-Chen],
Li, X.H.[Xin-Hang],
Liu, T.[Tong],
Gauss-Jordan elimination-based image tampering detection and
self-recovery,
SP:IC(90), 2021, pp. 116038.
Elsevier DOI
2012
Improved check bits generation, Image tampering detection,
Morphological processing-based enhancement,
Gauss-Jordan Elimination-Based Self-Recovery
BibRef
Mazumdar, A.[Aniruddha],
Bora, P.K.[Prabin Kumar],
Siamese convolutional neural network-based approach towards universal
image forensics,
IET-IPR(14), No. 13, November 2020, pp. 3105-3116.
DOI Link
2012
BibRef
Chen, B.J.[Bei-Jing],
Qi, X.M.[Xiao-Ming],
Zhou, Y.[Yang],
Yang, G.Y.[Guan-Yu],
Zheng, Y.H.[Yu-Hui],
Xiao, B.[Bin],
Image splicing localization using residual image and residual-based
fully convolutional network,
JVCIR(73), 2020, pp. 102967.
Elsevier DOI
2012
Splicing localization, Fully convolutional network,
Residual block, Residual image, Condition random field
BibRef
Ding, F.,
Wu, H.,
Zhu, G.,
Shi, Y.Q.,
METEOR: Measurable Energy Map Toward the Estimation of Resampling
Rate via a Convolutional Neural Network,
CirSysVideo(30), No. 12, December 2020, pp. 4715-4727.
IEEE DOI
2012
Image forensics, Machine learning, Tools, Estimation,
Parameter estimation, History, Image forensics, resampling,
convolutional neural network
BibRef
Joshi, A.B.[Anand B.],
Kumar, D.[Dhanesh],
Mishra, D.C.,
Security of Digital Images Based on 3D Arnold Cat Map and Elliptic
Curve,
IJIG(21), No. 1 2021, pp. 2150006.
DOI Link
2102
BibRef
Sabir, E.[Ekraam],
Jaiswal, A.[Ayush],
AbdAlmageed, W.[Wael],
Natarajan, P.[Prem],
MEG: Multi-Evidence GNN for Multimodal Semantic Forensics,
ICPR21(9804-9811)
IEEE DOI
2105
Forensics, Scalability, Semantics, Metadata,
Graph neural networks
BibRef
Chen, J.X.[Jia-Xin],
Liao, X.[Xin],
Qin, Z.[Zheng],
Identifying tampering operations in image operator chains based on
decision fusion,
SP:IC(95), 2021, pp. 116287.
Elsevier DOI
2106
Image forensics, Image operator chain,
Tampering operations identification, Decision fusion
BibRef
Shah, A.[Atif],
El-Alfy, E.S.M.[El-Sayed M.],
Comparative analysis of feature extraction and fusion for blind
authentication of digital images using chroma channels,
SP:IC(95), 2021, pp. 116271.
Elsevier DOI
2106
Image forensics, Feature extraction, Dimensionality reduction,
Fusion methods, Multimodal, Machine learning, Support vector machines
BibRef
Liu, T.[Tong],
Yuan, X.C.[Xiao-Chen],
Adaptive Feature Calculation and Diagonal Mapping for Successive
Recovery of Tampered Regions,
CirSysVideo(31), No. 7, July 2021, pp. 2617-2630.
IEEE DOI
2107
Watermarking, Authentication, Discrete wavelet transforms,
Image coding, Partitioning algorithms, Media,
successive content self-recovery
BibRef
Wang, X.F.[Xiao-Feng],
Zhang, Q.[Qian],
Jiang, C.[Chuntao],
Xue, J.R.[Jian-Ru],
Perceptual hash-based coarse-to-fine grained image tampering
forensics method,
JVCIR(78), 2021, pp. 103124.
Elsevier DOI
2107
Perceptual image hash, Simple linear iterative clustering,
Image forging detection, Image tempering localization
BibRef
Ribnick, E.,
Atev, S.,
Masoud, O.T.,
Papanikolopoulos, N.P.,
Voyles, R.,
Real-Time Detection of Camera Tampering,
AVSBS06(10-10).
IEEE DOI
0611
Tampering based on large differences between old and new frames.
BibRef
Nam, S.H.[Seung-Hun],
Ahn, W.[Wonhyuk],
Yu, I.J.[In-Jae],
Kwon, M.J.[Myung-Joon],
Son, M.[Minseok],
Lee, H.K.[Heung-Kyu],
Deep Convolutional Neural Network for Identifying Seam-Carving
Forgery,
CirSysVideo(31), No. 8, August 2021, pp. 3308-3326.
IEEE DOI
2108
Forgery, Visualization, Image color analysis,
Convolutional neural networks, Image forensics, Distortion,
local artifact detection
BibRef
Amerini, I.[Irene],
Anagnostopoulos, A.[Aris],
Maiano, L.[Luca],
Celsi, L.R.[Lorenzo Ricciardi],
Deep Learning for Multimedia Forensics,
FTCGV(12), No. 4, 2021, pp. 309-457.
DOI Link
2109
BibRef
Manisha,
Karunakar, A.K.,
Li, C.T.[Chang-Tsun],
Identification of source social network of digital images using deep
neural network,
PRL(150), 2021, pp. 17-25.
Elsevier DOI
2109
Image forensics, Social network, Deep learning,
Provenance inference, Source identification
BibRef
Yang, Q.X.[Quan-Xin],
Yu, D.J.[Dong-Jin],
Zhang, Z.[Zhuxi],
Yao, Y.[Ye],
Chen, L.[Linqiang],
Spatiotemporal Trident Networks: Detection and Localization of Object
Removal Tampering in Video Passive Forensics,
CirSysVideo(31), No. 10, October 2021, pp. 4131-4144.
IEEE DOI
2110
Feature extraction, Forensics, Spatiotemporal phenomena, Forgery,
Streaming media, Detectors, trident network
BibRef
Bai, W.M.[Wei-Ming],
Zhang, Z.P.[Zhi-Peng],
Li, B.[Bing],
Wang, P.[Pei],
Li, Y.X.[Yang-Xi],
Zhang, C.X.[Cong-Xuan],
Hu, W.M.[Wei-Ming],
Robust Texture-Aware Computer-Generated Image Forensic:
Benchmark and Algorithm,
IP(30), 2021, pp. 8439-8453.
IEEE DOI
2110
Dataset, Image Forensics.
WWW Link. Ddistinguish computer generated from photographic images.
Benchmark testing, Feature extraction, Image forensics, Task analysis,
computer-generated images forensic
BibRef
Grigaliunas, S.[Sarunas],
Toldinas, J.[Jevgenijus],
Venckauskas, A.[Algimantas],
Morkevicius, N.[Nerijus],
Damaševicius, R.[Robertas],
Digital Evidence Object Model for Situation Awareness and Decision
Making in Digital Forensics Investigation,
IEEE_Int_Sys(36), No. 5, September 2021, pp. 39-48.
IEEE DOI
2110
Digital forensics, Security, Computational modeling,
Analytical models, Decision making, Intelligent systems, category theory
BibRef
Li, J.L.[Jin-Long],
Yuan, X.C.[Xiao-Chen],
Feng, L.[Li],
Alteration Detection of Multispectral/Hyperspectral Images Using
Dual-Path Partial Recurrent Networks,
RS(13), No. 23, 2021, pp. xx-yy.
DOI Link
2112
BibRef
Zhang, Y.L.[Yong-Liang],
Gao, C.H.[Chen-Hao],
Li, Z.W.[Zhi-Wei],
Lv, Y.[Yufan],
Zhu, K.[Keyi],
A method of fingermark anti-counterfeiting for forensic document
identification,
PRL(152), 2021, pp. 86-92.
Elsevier DOI
2112
Fingermark, Forensic document, CNN, Patch-Lable, Model fusion
BibRef
Mazumdar, A.[Aniruddha],
Bora, P.K.[Prabin Kumar],
Two-stream encoder-decoder network for localizing image forgeries,
JVCIR(82), 2022, pp. 103417.
Elsevier DOI
2201
Image forensics, Forgery localization, CNN, Encoder-decoder network
BibRef
Jin, X.[Xiao],
Su, Y.T.[Yu-Ting],
Jing, P.G.[Pei-Guang],
Video frame deletion detection based on time-frequency analysis,
JVCIR(83), 2022, pp. 103436.
Elsevier DOI
2202
Digital video forensics, Frame tampering detection,
Nonlinear quantization, S transform
BibRef
Yang, J.Q.[Jian-Quan],
Zhu, G.P.[Guo-Pu],
Luo, Y.[Yao],
Kwong, S.[Sam],
Zhang, X.P.[Xin-Peng],
Zhou, Y.C.[Yi-Cong],
Forensic Analysis of JPEG-Domain Enhanced Images via Coefficient
Likelihood Modeling,
CirSysVideo(32), No. 3, March 2022, pp. 1006-1019.
IEEE DOI
2203
Transform coding, Forensics, Image coding,
Discrete cosine transforms, Estimation, Quantization (signal),
quantization step estimation
BibRef
Fernández, E.G.[Edgar González],
Orozco, A.L.S.[Ana Lucila Sandoval],
Villalba, L.J.G.[Luis Javier García],
Digital Video Manipulation Detection Technique Based on Compression
Algorithms,
ITS(23), No. 3, March 2022, pp. 2596-2605.
IEEE DOI
2203
Correlation, Image coding, Cameras, Technological innovation,
Support vector machines, Forensics, Transform coding, Compression,
support vector machine
BibRef
Fanfani, M.[Marco],
Piva, A.[Alessandro],
Colombo, C.[Carlo],
PRNU registration under scale and rotation transform based on
convolutional neural networks,
PR(124), 2022, pp. 108413.
Elsevier DOI
2203
photo response nonuniformity (PRNU).
Image forensics, PRNU, Deep learning, CNN, Rotation, Scale
BibRef
Zhu, N.[Nan],
Liu, Z.Q.[Zhi-Qin],
Recaptured image forensics based on local ternary count of high order
prediction error,
SP:IC(104), 2022, pp. 116662.
Elsevier DOI
2204
Image forensics, Recaptured image detection,
Recaptured tampered image, Image credibility,
Local ternary count
BibRef
Qiao, T.[Tong],
Luo, X.Y.[Xiang-Yang],
Yao, H.W.[Hong-Wei],
Shi, R.[Ran],
Classifying between computer generated and natural images:
An empirical study from RAW to JPEG format,
JVCIR(85), 2022, pp. 103506.
Elsevier DOI
2205
Image origin forensics, Imaging procedure, Distribution model,
Likelihood ratio test
BibRef
Yao, Y.[Ye],
Zhang, Z.[Zhuxi],
Ni, X.[Xuan],
Shen, Z.Y.[Zhang-Yi],
Chen, L.Q.[Lin-Qiang],
Xu, D.[Dawen],
CGNet: Detecting computer-generated images based on transfer learning
with attention module,
SP:IC(105), 2022, pp. 116692.
Elsevier DOI
2205
Digital forensics, Computer-generated detection,
Transfer learning, Convolutional block attention module
BibRef
Sun, Y.[Yu],
Ni, R.R.[Rong-Rong],
Zhao, Y.[Yao],
ET: Edge-Enhanced Transformer for Image Splicing Detection,
SPLetters(29), 2022, pp. 1232-1236.
IEEE DOI
2206
Image edge detection, Splicing, Transformers, Forgery,
Feature extraction, Location awareness, Decoding, Image forensics,
feature enhancement
BibRef
Zhang, Y.L.[Yu-Lan],
Zhu, G.P.[Guo-Pu],
Wu, L.G.[Li-Gang],
Kwong, S.[Sam],
Zhang, H.L.[Hong-Li],
Zhou, Y.C.[Yi-Cong],
Multi-Task SE-Network for Image Splicing Localization,
CirSysVideo(32), No. 7, July 2022, pp. 4828-4840.
IEEE DOI
2207
Splicing, Location awareness, Image edge detection,
Feature extraction, Streaming media, Forgery, Transform coding,
low-level feature fusion
BibRef
Li, W.J.[Wen-Jie],
Li, X.L.[Xiao-Long],
Ni, R.R.[Rong-Rong],
Zhao, Y.[Yao],
Quantization Step Estimation for JPEG Image Forensics,
CirSysVideo(32), No. 7, July 2022, pp. 4816-4827.
IEEE DOI
2207
Quantization (signal), Transform coding,
Discrete cosine transforms, Estimation, Image coding, Histograms,
response function
BibRef
Zhang, Y.X.[Yu-Xue],
Yan, Y.F.[Yun-Feng],
Feng, G.R.[Guo-Rui],
Feature compensation network based on non-uniform quantization of
channels for digital image global manipulation forensics,
SP:IC(107), 2022, pp. 116795.
Elsevier DOI
2208
Image manipulation detection, Convolutional neural network,
Feature compensation, Importance coefficients of channel,
Non-uniform quantization
BibRef
Vatansever, S.[Saffet],
Dirik, A.E.[Ahmet Emir],
Memon, N.[Nasir],
ENF Based Robust Media Time-Stamping,
SPLetters(29), 2022, pp. 1963-1967.
IEEE DOI
2209
Electric Network Frequency. Variations give a time stamp.
Media, Noise measurement, Forensics, Recording, Harmonic analysis,
Estimation, Signal processing algorithms, ENF,
time-stamping
BibRef
Lin, X.[Xun],
Wang, S.[Shuai],
Deng, J.H.[Jia-Hao],
Fu, Y.[Ying],
Bai, X.[Xiao],
Chen, X.L.[Xin-Lei],
Qu, X.L.[Xiao-Lei],
Tang, W.Z.[Wen-Zhong],
Image manipulation detection by multiple tampering traces and edge
artifact enhancement,
PR(133), 2023, pp. 109026.
Elsevier DOI
2210
Image manipulation detection, Transformer,
Edge artifact enhancement, Edge supervision
BibRef
Liu, X.H.[Xiao-Hong],
Liu, Y.J.[Yao-Jie],
Chen, J.[Jun],
Liu, X.M.[Xiao-Ming],
PSCC-Net: Progressive Spatio-Channel Correlation Network for Image
Manipulation Detection and Localization,
CirSysVideo(32), No. 11, November 2022, pp. 7505-7517.
IEEE DOI
2211
Feature extraction, Correlation, Location awareness, Splicing,
Forgery, Task analysis, Estimation, attention mechanism
BibRef
Gardella, M.[Marina],
Musé, P.[Pablo],
Forensic Similarity for Source Camera Model Comparison,
IPOL(12), 2022, pp. 480-489.
DOI Link
2212
Code, Forensic Similarity.
BibRef
Gardella, M.[Marina],
Musé, P.[Pablo],
Image Forgery Detection via Forensic Similarity Graphs,
IPOL(12), 2022, pp. 490-500.
DOI Link
2212
Code, Forgery.
BibRef
Li, G.H.[Gui-Hao],
Yao, H.[Heng],
Le, Y.F.[Yan-Fen],
Qin, C.[Chuan],
Recaptured screen image identification based on vision transformer,
JVCIR(90), 2023, pp. 103692.
Elsevier DOI
2301
Recaptured screen images, Image forensics,
Demoiréing operation, Vision transformer, Recapture identification
BibRef
Dong, C.B.[Cheng-Bo],
Chen, X.R.[Xin-Ru],
Hu, R.[Ruohan],
Cao, J.[Juan],
Li, X.R.[Xi-Rong],
MVSS-Net: Multi-View Multi-Scale Supervised Networks for Image
Manipulation Detection,
PAMI(45), No. 3, March 2023, pp. 3539-3553.
IEEE DOI
2302
Feature extraction, Image edge detection, Image segmentation,
Deep learning, Semantics, Training, Task analysis,
model sensitivity and specificity
BibRef
Chen, X.R.[Xin-Ru],
Dong, C.B.[Cheng-Bo],
Ji, J.Q.[Jia-Qi],
Cao, J.[Juan],
Li, X.R.[Xi-Rong],
Image Manipulation Detection by Multi-View Multi-Scale Supervision,
ICCV21(14165-14173)
IEEE DOI
2203
Representation learning, Image segmentation, Sensitivity, Costs,
Image edge detection, Semantics,
BibRef
Lu, W.[Wei],
Xu, W.B.[Wen-Bo],
Sheng, Z.Q.[Zi-Qi],
An Interpretable Image Tampering Detection Approach Based on
Cooperative Game,
CirSysVideo(33), No. 2, February 2023, pp. 952-962.
IEEE DOI
2302
Games, Indexes, Feature extraction, Object detection, Deep learning,
Task analysis, Security, Tampering detection, interpretability, YOLO,
shapley interaction index
BibRef
Qi, S.[Shuren],
Zhang, Y.S.[Yu-Shu],
Wang, C.[Chao],
Zhou, J.T.[Jian-Tao],
Cao, X.C.[Xiao-Chun],
A Principled Design of Image Representation: Towards Forensic Tasks,
PAMI(45), No. 5, May 2023, pp. 5337-5354.
IEEE DOI
2304
Forensics, Task analysis, Image representation, Robustness,
Complexity theory, Image forensics, Deep learning,
fast Fourier transform
BibRef
Rana, K.[Kapil],
Singh, G.[Gurinder],
Goyal, P.[Puneet],
SNRCN2: Steganalysis noise residuals based CNN for source social
network identification of digital images,
PRL(171), 2023, pp. 124-130.
Elsevier DOI
2306
Image forensics, Social media networks,
Steganalysis noise residuals, Convolutional neural networks
BibRef
He, C.C.[Chu-Chu],
Chen, Y.S.[Yun-Shu],
Pan, J.[Jie],
Huang, Y.[Yue],
Tu, X.T.[Xiao-Tong],
Ding, X.H.[Xing-Hao],
Enhanced features in image manipulation detection,
SP:IC(116), 2023, pp. 116983.
Elsevier DOI
2307
Image forensics, Image manipulation detection,
Segmentation mask attention mechanism, Fingerprint information
BibRef
Fan, W.T.[Wen-Tong],
Li, Z.Y.[Zhen-Yu],
Li, H.[Hao],
Zhang, Y.[Yi],
Luo, X.Y.[Xiang-Yang],
SNENet: An adaptive stego noise extraction network using parallel
dilated convolution for JPEG image steganalysis,
IET-IPR(17), No. 10, 2023, pp. 2894-2906.
DOI Link
2308
image forensics, steganalysis, steganography, stego noises
BibRef
Ying, Q.C.[Qi-Chao],
Zhou, H.[Hang],
Qian, Z.X.[Zhen-Xing],
Li, S.[Sheng],
Zhang, X.P.[Xin-Peng],
Learning to Immunize Images for Tamper Localization and Self-Recovery,
PAMI(45), No. 11, November 2023, pp. 13814-13830.
IEEE DOI
2310
BibRef
Zhang, J.Y.[Jing-Yuan],
Wang, H.X.[Hong-Xia],
He, P.S.[Pei-Song],
Dual-branch multi-scale densely connected network for image splicing
detection and localization,
SP:IC(119), 2023, pp. 117045.
Elsevier DOI
2310
Image forensics, Image splicing detection, Deep learning,
Low-level feature reuse, Pixel-wise feature fusion
BibRef
Dai, C.W.[Chen-Wei],
Su, L.C.[Li-Chao],
Wu, B.[Bin],
Chen, J.[Jian],
DS-Net: Dual supervision neural network for image manipulation
localization,
IET-IPR(17), No. 12, 2023, pp. 3551-3563.
DOI Link
2310
image forensics, image processing
BibRef
Zeng, Y.Y.[Yu-Yuan],
Zhao, B.[Bowen],
Qiu, S.Z.[Shan-Zhao],
Dai, T.[Tao],
Xia, S.T.[Shu-Tao],
Toward Effective Image Manipulation Detection With Proposal
Contrastive Learning,
CirSysVideo(33), No. 9, September 2023, pp. 4703-4714.
IEEE DOI Code:
WWW Link.
2310
BibRef
Shi, Z.[Zenan],
Chen, H.P.[Hai-Peng],
Zhang, D.[Dong],
Transformer-Auxiliary Neural Networks for Image Manipulation
Localization by Operator Inductions,
CirSysVideo(33), No. 9, September 2023, pp. 4907-4920.
IEEE DOI
2310
BibRef
Xu, D.Y.[Deng-Yun],
Shen, X.J.[Xuan-Jing],
Lyu, Y.D.[Ying-Da],
UP-Net: Uncertainty-Supervised Parallel Network for Image
Manipulation Localization,
CirSysVideo(33), No. 11, November 2023, pp. 6390-6403.
IEEE DOI
2311
BibRef
Li, F.Y.[Feng-Yong],
Pei, Z.J.[Zhen-Jia],
Zhang, X.P.[Xin-Peng],
Qin, C.[Chuan],
Image Manipulation Localization Using Multi-Scale Feature Fusion and
Adaptive Edge Supervision,
MultMed(25), 2023, pp. 7851-7866.
IEEE DOI
2312
BibRef
Thabit, R.[Rasha],
A novel blind tamper detection and localization scheme for multiple
faces in digital images,
IET-IPR(17), No. 14, 2023, pp. 3938-3958.
DOI Link
2312
multiple faces authentication, multiple faces detection,
multiple faces security, tamper detection for multiple faces,
tamper localization for multiple faces
BibRef
Wang, H.R.[Hao-Ran],
Deng, J.H.[Jia-Hao],
Lin, X.[Xun],
Tang, W.Z.[Wen-Zhong],
Wang, S.[Shuai],
CDS-Net: Cooperative dual-stream network for image manipulation
detection,
PRL(176), 2023, pp. 167-173.
Elsevier DOI
2312
Image manipulation detection, Dual-stream framework,
Cooperating, Feature interaction
BibRef
Li, Y.M.[Yuan-Man],
Hu, L.P.[Liang-Pei],
Dong, L.[Li],
Wu, H.W.[Hai-Wei],
Tian, J.[Jinyu],
Zhou, J.T.[Jian-Tao],
Li, X.[Xia],
Transformer-Based Image Inpainting Detection via Label Decoupling and
Constrained Adversarial Training,
CirSysVideo(34), No. 3, March 2024, pp. 1857-1872.
IEEE DOI
2403
Transformers, Training, Forensics, Forgery, Image edge detection,
Task analysis, Convolution, Inpainting forensics, deep neural networks
BibRef
Xu, Y.Z.[Yan-Zhi],
Zheng, J.B.[Jiang-Bin],
Ren, J.C.[Jin-Chang],
Fang, A.[Aiqing],
Feature Aggregation and Region-Aware Learning for Detection of
Splicing Forgery,
SPLetters(31), 2024, pp. 696-700.
IEEE DOI
2403
Feature extraction, Correlation, Transformers, Learning systems,
Forgery, Training, Splicing, Image forgery detection,
region-aware learning
BibRef
Zhu, H.C.[Hao-Chen],
Cao, G.[Gang],
Zhao, M.[Mo],
Tian, H.[Huawei],
Lin, W.G.[Wei-Guo],
Effective image tampering localization with multi-scale ConvNeXt
feature fusion,
JVCIR(98), 2024, pp. 103981.
Elsevier DOI Code:
WWW Link.
2402
Image forensics, Tampering localization, Encoder and decoder,
ConvNeXt, Multi-scale feature fusion
BibRef
Song, H.X.[Hao-Xian],
Wang, Z.[Zichi],
Zhang, X.P.[Xin-Peng],
Identification of the Original Images,
JVCIR(98), 2024, pp. 104017.
Elsevier DOI
2402
Original images, Deep network models, Variant images
BibRef
Bergmann, S.[Sandra],
Moussa, D.[Denise],
Brand, F.[Fabian],
Kaup, A.[André],
Riess, C.[Christian],
Forensic analysis of AI-compression traces in spatial and frequency
domain,
PRL(180), 2024, pp. 41-47.
Elsevier DOI
2404
AI-based compression, Image forensics, Frequency analysis, Autocorrelation
BibRef
Abady, L.[Lydia],
Wang, J.[Jun],
Tondi, B.[Benedetta],
Barni, M.[Mauro],
A siamese-based verification system for open-set architecture
attribution of synthetic images,
PRL(180), 2024, pp. 75-81.
Elsevier DOI
2404
Synthetic image manipulation, Deep learning for forensics,
Source attribution, Open-set classification/recognition, Siamese networks
BibRef
Magistri, S.[Simone],
Baracchi, D.[Daniele],
Shullani, D.[Dasara],
Bagdanov, A.D.[Andrew D.],
Piva, A.[Alessandro],
Continual learning for adaptive social network identification,
PRL(180), 2024, pp. 82-89.
Elsevier DOI
2404
Continual learning, Social network identification, Multimedia forensics
BibRef
Chen, C.S.[Chang-Sheng],
Li, X.J.[Xi-Jin],
Chen, B.Y.[Bao-Ying],
Li, H.D.[Hao-Dong],
A distortion model guided adversarial surrogate for recaptured
document detection,
PR(151), 2024, pp. 110433.
Elsevier DOI
2404
Presentation attack, Recapturing distortion, Adversarial training
BibRef
Lee, C.W.[Che-Wei],
A distortion-free authentication method for color images with
tampering localization and self-recovery,
SP:IC(124), 2024, pp. 117116.
Elsevier DOI
2405
Image tampering detection, Data security, Watermarking, Image forensics
BibRef
Zhang, Z.[Zeyu],
Zhao, X.F.[Xian-Feng],
Cao, Y.[Yun],
Unveiling tampering traces: Enhancing image reconstruction errors for
visualization,
JVCIR(100), 2024, pp. 104125.
Elsevier DOI
2405
Digital image forensics, Reconstruction Error, Mixed generator,
Tampering localization, Latent features
BibRef
Wang, H.[Hao],
Wang, J.[Jinwei],
Zhang, J.W.[Jia-Wei],
Luo, X.Y.[Xiang-Yang],
Ma, B.[Bin],
Li, B.[Bin],
Sun, J.S.[Jin-Sheng],
General Forensics for Aligned Double JPEG Compression Based on the
Quantization Interference,
CirSysVideo(34), No. 6, June 2024, pp. 5191-5206.
IEEE DOI
2406
Image coding, Transform coding, Quantization (signal),
Interference, Finite wordlength effects, Convergence,
aligned JPEG double compression
BibRef
Cao, G.[Gang],
Wang, Y.Q.[Yu-Qi],
Zhu, H.C.[Hao-Chen],
Lou, Z.J.[Zi-Jie],
Yu, L.F.[Li-Fang],
Transferable adversarial attack on image tampering localization,
JVCIR(102), 2024, pp. 104210.
Elsevier DOI Code:
WWW Link.
2407
Anti-forensics, Adversarial example,
Optimization-based adversarial attack,
Image tampering localization
BibRef
Liu, W.H.[Wei-Huang],
Cun, X.D.[Xiao-Dong],
Pun, C.M.[Chi-Man],
DH-GAN: Image manipulation localization via a dual homology-aware
generative adversarial network,
PR(155), 2024, pp. 110658.
Elsevier DOI
2408
Image manipulation localization, Selective atrous pyramid,
Adversarial learning, Masked convolution
BibRef
Niu, Y.K.[Ya-Kun],
Tan, L.[Lei],
Zhang, L.[Lei],
Chen, Y.J.[Ying-Jian],
Zuo, X.Y.[Xian-Yu],
Attention-Based Dual-Domain Fusion Network for Median Filtering
Forensics,
SPLetters(31), 2024, pp. 1860-1864.
IEEE DOI
2408
Feature extraction, Frequency-domain analysis, Convolution,
Forensics, Discrete cosine transforms, Kernel, Fuses,
median filtering detection
BibRef
Ding, X.L.[Xiang-Ling],
Zhao, Y.L.[Yu-Lin],
Gu, Q.[Qing],
Zhang, D.Y.[Deng-Yong],
Yang, G.[Gaobo],
ERaL: Exceptional Regions-Aware Deep Video Interpolation Localization,
SPLetters(31), 2024, pp. 1885-1889.
IEEE DOI
2408
Location awareness, Feature extraction, Forensics, Interpolation,
Transformers, Training, Forgery, Deep video frame interpolation,
video forensics
BibRef
Li, M.Q.[Meng-Qi],
Hu, Y.P.[Yan-Peng],
Guo, J.[Jin],
Tampering Attack Detection for Remote State Estimation With Quantized
Observations,
SPLetters(31), 2024, pp. 2185-2189.
IEEE DOI
2409
Estimation, State estimation, Technological innovation, Detectors,
Signal processing algorithms, Sensors, Cyberattack, state estimation
BibRef
Nguyen, T.D.[Tai D.],
Fang, S.[Shengbang],
Stamm, M.C.[Matthew C.],
VideoFACT: Detecting Video Forgeries Using Attention, Scene Context,
and Forensic Traces,
WACV24(8548-8558)
IEEE DOI Code:
WWW Link.
2404
Video coding, Training, Image forensics, Codes, Forensics, Forgery,
Applications, Social good
BibRef
Zhai, Y.H.[Yuan-Hao],
Luan, T.Y.[Tian-Yu],
Doermann, D.[David],
Yuan, J.S.[Jun-Song],
Towards Generic Image Manipulation Detection with Weakly-Supervised
Self-Consistency Learning,
ICCV23(22333-22343)
IEEE DOI
2401
BibRef
Sun, Z.H.[Zhi-Hao],
Jiang, H.R.[Hao-Ran],
Wang, D.[Danding],
Li, X.R.[Xi-Rong],
Cao, J.[Juan],
SAFL-Net: Semantic-Agnostic Feature Learning Network with Auxiliary
Plugins for Image Manipulation Detection,
ICCV23(22367-22376)
IEEE DOI
2401
BibRef
Hu, X.X.[Xiao-Xiao],
Ying, Q.C.[Qi-Chao],
Qian, Z.X.[Zhen-Xing],
Li, S.[Sheng],
Zhang, X.P.[Xin-Peng],
DRAW: Defending Camera-shooted RAW against Image Manipulation,
ICCV23(22377-22387)
IEEE DOI
2401
BibRef
Ji, K.X.[Kai-Xiang],
Chen, F.[Feng],
Guo, X.[Xin],
Xu, Y.D.[Ya-Dong],
Wang, J.[Jian],
Chen, J.D.[Jing-Dong],
Uncertainty-guided Learning for Improving Image Manipulation
Detection,
ICCV23(22399-22408)
IEEE DOI
2401
BibRef
Feng, X.[Xin],
Xu, Y.F.[Yi-Feng],
Lu, G.M.[Guang-Ming],
Pei, W.J.[Wen-Jie],
Hierarchical Contrastive Learning for Pattern-Generalizable Image
Corruption Detection,
ICCV23(12042-12051)
IEEE DOI Code:
WWW Link.
2401
BibRef
Zhou, J.Z.[Ji-Zhe],
Ma, X.C.[Xiao-Chen],
Du, X.[Xia],
Alhammadi, A.Y.[Ahmed Y.],
Feng, W.T.[Wen-Tao],
Pre-training-free Image Manipulation Localization through
Non-Mutually Exclusive Contrastive Learning,
ICCV23(22289-22299)
IEEE DOI Code:
WWW Link.
2401
BibRef
Fernandes, P.[Pedro],
Ciardhuáin, S.Ó.[Séamus Ó.],
Antunes, M.[Mário],
Uncovering Manipulated Files Using Mathematical Natural Laws,
CIARP23(I:46-62).
Springer DOI
2312
BibRef
Niloy, F.F.[Fahim Faisal],
Bhaumik, K.K.[Kishor Kumar],
Woo, S.S.[Simon S.],
HRFNet: High-Resolution Forgery Network for Localizing Satellite
Image Manipulation,
ICIP23(3165-3169)
IEEE DOI
2312
BibRef
Xiang, Z.Y.[Zi-Yue],
Yadav, A.K.S.[Amit Kumar Singh],
Bestagini, P.[Paolo],
Tubaro, S.[Stefano],
Delp, E.J.[Edward J.],
MTN: Forensic Analysis of MP4 Video Files Using Graph Neural Networks,
WMF23(963-972)
IEEE DOI
2309
BibRef
Jia, S.[Shan],
Huang, M.Z.[Ming-Zhen],
Zhou, Z.[Zhou],
Ju, Y.[Yan],
Cai, J.L.[Jia-Ling],
Lyu, S.W.[Si-Wei],
AutoSplice: A Text-prompt Manipulated Image Dataset for Media
Forensics,
WMF23(893-903)
IEEE DOI
2309
BibRef
Asnani, V.[Vishal],
Yin, X.[Xi],
Hassner, T.[Tal],
Liu, X.M.[Xiao-Ming],
MaLP: Manipulation Localization Using a Proactive Scheme,
CVPR23(12343-12352)
IEEE DOI
2309
BibRef
Siopi, M.[Maria],
Kordopatis-Zilos, G.[Giorgos],
Charitidis, P.[Polychronis],
Kompatsiaris, I.[Ioannis],
Papadopoulos, S.[Symeon],
A Multi-stream Fusion Network for Image Splicing Localization,
MMMod23(II: 611-622).
Springer DOI
2304
BibRef
Asnani, V.[Vishal],
Yin, X.[Xi],
Hassner, T.[Tal],
Liu, S.[Sijia],
Liu, X.M.[Xiao-Ming],
Proactive Image Manipulation Detection,
CVPR22(15365-15374)
IEEE DOI
2210
Training, Codes, Cameras, Pattern recognition, Detection algorithms,
Adversarial attack and defense, Low-level vision
BibRef
Watanabe, Y.[Yuto],
Togo, R.[Ren],
Maeda, K.[Keisuke],
Ogawa, T.[Takahiro],
Haseyama, M.[Miki],
Assessment of Image Manipulation Using Natural Language Description:
Quantification of Manipulation Direction,
ICIP22(1046-1050)
IEEE DOI
2211
Measurement, Natural languages, Text-guided image manipulation,
generative adversarial network, evaluation metric, manipulation direction
BibRef
Ying, Q.C.[Qi-Chao],
Hu, X.X.[Xiao-Xiao],
Zhang, X.Y.[Xiang-Yu],
Qian, Z.X.[Zhen-Xing],
Li, S.[Sheng],
Zhang, X.P.[Xin-Peng],
RWN: Robust Watermarking Network for Image Cropping Localization,
ICIP22(301-305)
IEEE DOI
2211
Location awareness, Social networking (online), Pipelines, Layout,
Transform coding, Watermarking, Feature extraction,
watermarking
BibRef
Caldelli, R.[Roberto],
Carrara, F.[Fabio],
Falchi, F.[Fabrizio],
Tuning Neural ODE Networks to Increase Adversarial Robustness in
Image Forensics,
ICIP22(1496-1500)
IEEE DOI
2211
Deep learning, Image forensics, Neural networks,
Ordinary differential equations, Robustness, Security, Adversarial Samples
BibRef
Manisha,
Li, C.T.[Chang-Tsun],
Kotegar, K.A.[Karunakar A.],
A Multi-Scale Content-Insensitive Fusion CNN for Source Social
Network Identification,
ICIP22(2981-2985)
IEEE DOI
2211
Training, Representation learning, Image forensics,
Social networking (online), Neural networks,
convolutional neural network
BibRef
Mandelli, S.[Sara],
Bonettini, N.[Nicolò],
Bestagini, P.[Paolo],
Tubaro, S.[Stefano],
Detecting GAN-Generated Images by Orthogonal Training of Multiple
CNNs,
ICIP22(3091-3095)
IEEE DOI
2211
Training, Industries, Deep learning, Detectors, Motion pictures,
Generators, Image forensics, synthetic images, GAN, CNN
BibRef
Chandrasegaran, K.[Keshigeyan],
Tran, N.T.[Ngoc-Trung],
Binder, A.[Alexander],
Cheung, N.M.[Ngai-Man],
Discovering Transferable Forensic Features for CNN-Generated Images
Detection,
ECCV22(XV:671-689).
Springer DOI
2211
BibRef
Wang, J.[Junke],
Wu, Z.[Zuxuan],
Chen, J.J.[Jing-Jing],
Han, X.T.[Xin-Tong],
Shrivastava, A.[Abhinav],
Lim, S.N.[Ser-Nam],
Jiang, Y.G.[Yu-Gang],
ObjectFormer for Image Manipulation Detection and Localization,
CVPR22(2354-2363)
IEEE DOI
2210
Location awareness, Visualization, Frequency-domain analysis,
Computational modeling, Prototypes, Feature extraction, retrieval
BibRef
Ghizlane, H.[Hnini],
Jamal, R.[Riffi],
Mahraz, M.A.[Mohamed Adnane],
Ali, Y.[Yahyaouy],
Hamid, T.[Tairi],
Spam image detection based on convolutional block attention module,
ISCV22(1-4)
IEEE DOI
2208
Deep learning, Recurrent neural networks, Filtering,
Unsolicited e-mail, Image edge detection, Feature extraction, CBAM
BibRef
Aumayr, D.[Daniel],
Schöttle, P.[Pascal],
U Can't (re)Touch This: A Deep Learning Approach for Detecting Image
Retouching,
CIAP22(II:127-138).
Springer DOI
2205
BibRef
Moreira, T.P.[Thierry P.],
Santana, M.C.S.[Marcos Cleison S.],
Passos, L.A.[Leandro A.],
Papa, J.P.[João Paulo],
da Costa, K.A.P.[Kelton Augusto P.],
An End-to-End Approach for Seam Carving Detection Using Deep Neural
Networks,
IbPRIA22(447-457).
Springer DOI
2205
BibRef
Sabir, E.[Ekraam],
Nandi, S.[Soumyaroop],
AbdAlmageed, W.[Wael],
Natarajan, P.[Prem],
BioFors: A Large Biomedical Image Forensics Dataset,
ICCV21(10943-10953)
IEEE DOI
2203
Social networking (online), Forensics, Microscopy,
Benchmark testing, Task analysis, Fake news, and cell microscopy
BibRef
Bammey, Q.[Quentin],
Nikoukhah, T.[Tina],
Gardella, M.[Marina],
von Gioi, R.G.[Rafael Grompone],
Colom, M.[Miguel],
Morel, J.M.[Jean-Michel],
Non-Semantic Evaluation of Image Forensics Tools:
Methodology and Database,
WACV22(2383-2392)
IEEE DOI
2202
Image forensics, Image coding, Databases, Splicing, Semantics,
Pipelines, Transform coding, Datasets,
Evaluation and Comparison of Vision Algorithms Image Forensics
BibRef
Pessoa, R.[Rodrigo],
Kokaram, A.[Anil],
Pitie, F.[Francois],
Sugrue, M.[Mark],
CNN-Based Video Codec Classifier for Multimedia Forensics,
ICIP21(3033-3037)
IEEE DOI
2201
Forensics, Image processing, User-generated content,
Streaming media, Fingerprint recognition, decoding
BibRef
Bahat, Y.[Yuval],
Michaeli, T.[Tomer],
What's in the Image? Explorable Decoding of Compressed Images,
CVPR21(2907-2916)
IEEE DOI
2111
Visualization, Image coding, Codes, Forensics, Transform coding,
Tools, Propagation losses
BibRef
Xiang, Z.Y.[Zi-Yue],
Horváth, J.[János],
Baireddy, S.[Sriram],
Bestagini, P.[Paolo],
Tubaro, S.[Stefano],
Delp, E.J.[Edward J.],
Forensic Analysis of Video Files Using Metadata,
WMF21(1042-1051)
IEEE DOI
2109
Dimensionality reduction, Social networking (online), Forensics,
Metadata, Tools, Streaming media, Media
BibRef
Kwon, M.J.[Myung-Joon],
Yu, I.J.[In-Jae],
Nam, S.H.[Seung-Hun],
Lee, H.K.[Heung-Kyu],
CAT-Net: Compression Artifact Tracing Network for Detection and
Localization of Image Splicing,
WACV21(375-384)
IEEE DOI
2106
Location awareness, Visualization, Image coding, Splicing, Forensics,
Transform coding, Streaming media
BibRef
Yin, Q.[Qilin],
Wang, J.[Jinwei],
Luo, X.Y.[Xiang-Yang],
A Hybrid Loss Network for Localization of Image Manipulation,
IWDW20(237-247).
Springer DOI
2103
BibRef
Zeng, H.[Hui],
Deng, K.[Kang],
Peng, A.[Anjie],
ISO Setting Estimation Based on Convolutional Neural Network and its
Application in Image Forensics,
IWDW20(224-236).
Springer DOI
2103
BibRef
Zhao, J.J.[Jun-Jie],
Wang, J.W.[Jin-Wei],
Lightweight DCT-Like Domain Forensics Model for Adversarial Example,
IWDW20(265-279).
Springer DOI
2103
BibRef
Camacho, I.C.[Ivan Castillo],
Wang, K.[Kai],
Data-dependent Scaling of CNN's First Layer for Improved Image
Manipulation Detection,
IWDW20(208-223).
Springer DOI
2103
BibRef
Reichman, B.[Benjamin],
Jing, L.L.[Long-Long],
Akin, O.[Oguz],
Tian, Y.[Yingli],
Medical Image Tampering Detection: A New Dataset and Baseline,
AIHA20(266-277).
Springer DOI
2103
BibRef
Berthet, A.,
Dugelay, J.L.,
A review of data preprocessing modules in digital image forensics
methods using deep learning,
VCIP20(281-284)
IEEE DOI
2102
Deep learning, Forgery, Cameras, Histograms,
Discrete cosine transforms, Digital images, Feature extraction
BibRef
Ghosh, A.,
Zhong, Z.,
Cruz, S.,
Veeravasarapu, S.,
Singh, M.,
Boult, T.E.,
Infoprint: Information Theoretic Digital Image Forensics,
ICIP20(638-642)
IEEE DOI
2011
Semantics, Cameras, Task analysis, Training, Computer architecture,
Convolutional codes, Digital image forensics,
variational inference
BibRef
Maier, A.,
Lorch, B.,
Riess, C.,
Toward Reliable Models For Authenticating Multimedia Content:
Detecting Resampling Artifacts With Bayesian Neural Networks,
ICIP20(1251-1255)
IEEE DOI
2011
Bayes methods, Neural networks, Forensics, Uncertainty, Training,
Learning systems, Standards, digital image forensics, reliability,
resampling detection
BibRef
Rouis, K.,
Gomez-Krämer, P.,
Coustaty, M.,
Local Geometry Analysis For Image Tampering Detection,
ICIP20(2551-2555)
IEEE DOI
2011
Geometry, Image color analysis, Image edge detection, Transforms,
Feature extraction, Quaternions, Color, Image hashing,
image gradient
BibRef
Rabah, C.B.,
Coatrieux, G.,
Abdelfattah, R.,
The Supatlantique Scanned Documents Database for Digital Image
Forensics Purposes,
ICIP20(2096-2100)
IEEE DOI
2011
Forensics, Databases, Charge coupled devices, Image resolution,
Digital images, Internet, Cameras, Scanner source identification,
image security
BibRef
Hu, X.F.[Xue-Feng],
Zhang, Z.H.[Zhi-Han],
Jiang, Z.Y.[Zhen-Ye],
Chaudhuri, S.[Syomantak],
Yang, Z.H.[Zhen-Heng],
Nevatia, R.[Ram],
SPAN: Spatial Pyramid Attention Network for Image Manipulation
Localization,
ECCV20(XXI:312-328).
Springer DOI
2011
ocalization of multiple types of image manipulations.
BibRef
Bammey, Q.,
von Gioi, R.G.,
Morel, J.,
An Adaptive Neural Network for Unsupervised Mosaic Consistency
Analysis in Image Forensics,
CVPR20(14182-14192)
IEEE DOI
2008
Forgery, Image color analysis, Transform coding, Neural networks,
Databases, Splicing, Image coding
BibRef
Hosier, B.C.,
Stamm, M.C.,
Detecting Video Speed Manipulation,
WMF20(2860-2869)
IEEE DOI
2008
Encoding, Switched mode power supplies, Forensics, Software, Indexes,
Face, Presses
BibRef
Jain, A.,
Majumdar, P.,
Singh, R.,
Vatsa, M.,
Detecting GANs and Retouching based Digital Alterations via DAD-HCNN,
WMF20(2870-2879)
IEEE DOI
2008
Face, Support vector machines, Training,
Convolutional neural networks, Generative adversarial networks, Task analysis
BibRef
Andujar, R.[Rabindranath],
Peletier, I.[Ignacio],
Oliva, J.[Jesus],
Cymontkowski, M.[Marc],
Fu, Y.[Yondon],
Tang, E.[Eric],
Allman, J.[Josh],
Video Tampering Detection for Decentralized Video Transcoding Networks,
ICIAR20(I:316-327).
Springer DOI
2007
BibRef
Novozámský, A.,
Mahdian, B.,
Saic, S.,
IMD2020: A Large-Scale Annotated Dataset Tailored for Detecting
Manipulated Images,
WACVWS20(71-80)
IEEE DOI
2006
Cameras, Visualization, Quantization (signal),
Image forensics, Image color analysis, Image coding
BibRef
Pourreza, R.,
Ghodrati, A.,
Habibian, A.,
Recognizing Compressed Videos: Challenges and Promises,
RLQ19(999-1007)
IEEE DOI
2004
data compression, feature extraction, video coding, visual quality,
smoothing discriminative features, perceptual quality, GAN
BibRef
Nam, S.,
Ahn, W.,
Mun, S.,
Park, J.,
Kim, D.,
Yu, I.,
Lee, H.,
Content-Aware Image Resizing Detection Using Deep Neural Network,
ICIP19(106-110)
IEEE DOI
1910
Forensics, Content-aware image resizing, Seam carving,
Seam insertion, Convolutional neural networks
BibRef
Giudice, O.,
Guarnera, L.,
Paratore, A.B.,
Farinella, G.M.,
Battiato, S.,
Siamese Ballistics Neural Network,
ICIP19(4045-4049)
IEEE DOI
1910
Image Forensics, Siamese Network
BibRef
Niyitegeka, D.[David],
Coatrieux, G.[Gouenou],
Bellafqira, R.[Reda],
Genin, E.[Emmanuelle],
Franco-Contreras, J.[Javier],
Dynamic Watermarking-Based Integrity Protection of Homomorphically
Encrypted Databases: Application to Outsourced Genetic Data,
IWDW18(151-166).
Springer DOI
1905
BibRef
Ye, J.Y.[Jing-Yu],
Shi, Y.X.[Yu-Xi],
Xu, G.S.[Guan-Shuo],
Shi, Y.Q.[Yun-Qing],
A Convolutional Neural Network Based Seam Carving Detection Scheme for
Uncompressed Digital Images,
IWDW18(3-13).
Springer DOI
1905
BibRef
Tambo, A.,
Albright, M.,
Mccloskey, S.,
Low-and Semantic-Level Cues for Forensic Splice Detection,
WACV19(1664-1672)
IEEE DOI
1904
feature extraction, image forensics,
learning (artificial intelligence), object detection
BibRef
Zampoglou, M.[Markos],
Markatopoulou, F.[Foteini],
Mercier, G.[Gregoire],
Touska, D.[Despoina],
Apostolidis, E.[Evlampios],
Papadopoulos, S.[Symeon],
Cozien, R.[Roger],
Patras, I.[Ioannis],
Mezaris, V.[Vasileios],
Kompatsiaris, I.[Ioannis],
Detecting Tampered Videos with Multimedia Forensics and Deep Learning,
MMMod19(I:374-386).
Springer DOI
1901
BibRef
Diallo, B.[Boubacar],
Urruty, T.[Thierry],
Bourdon, P.[Pascal],
Fernandez-Maloigne, C.[Christine],
Improving Robustness of Image Tampering Detection for Compression,
MMMod19(I:387-398).
Springer DOI
1901
BibRef
Cruz, F.[Francisco],
Sidère, N.[Nicolas],
Coustaty, M.[Mickaël],
d’Andecy, V.P.[Vincent Poulain],
Ogier, J.M.[Jean-Marc],
Categorization of Document Image Tampering Techniques and How to
Identify Them,
IWCF18(117-124).
Springer DOI
1901
BibRef
Zhou, P.,
Han, X.,
Morariu, V.I.,
Davis, L.S.,
Learning Rich Features for Image Manipulation Detection,
CVPR18(1053-1061)
IEEE DOI
1812
Streaming media, Feature extraction, Kernel, Splicing, Visualization,
Object detection, Image forensics
BibRef
Annadani, Y.,
Jawahar, C.V.,
Augment and Adapt: A Simple Approach to Image Tampering Detection,
ICPR18(2983-2988)
IEEE DOI
1812
Semantics, Task analysis, Software, Training,
Convolutional neural networks, Image segmentation, Splicing
BibRef
Lin, L.,
Chen, W.,
Wang, Y.,
Reinder, S.,
Guan, Y.,
Newman, J.,
Wu, M.,
The Impact of Exposure Settings in Digital Image Forensics,
ICIP18(540-544)
IEEE DOI
1809
ISO, Cameras, ISO Standards, Forensics, Error analysis, Digital images,
Training, Digital Image Forensics, Steganalysis, PRNU,
ISO
BibRef
Pinto, A.,
Moreira, D.,
Bharati, A.,
Brogan, J.,
Bowyer, K.W.,
Flynn, P.J.,
Scheirer, W.,
Rocha, A.,
Provenance filtering for multimedia phylogeny,
ICIP17(1502-1506)
IEEE DOI
1803
Filtering, Forensics, Indexing, Multimedia communication, Phylogeny,
Robustness, Task analysis, Multimedia Phylogeny, Phylogeny Graph,
Provenance Filtering
BibRef
Bharati, A.,
Moreira, D.,
Pinto, A.,
Brogan, J.,
Bowyer, K.W.,
Flynn, P.J.,
Scheirer, W.,
Rocha, A.,
U-Phylogeny: Undirected provenance graph construction in the wild,
ICIP17(1517-1521)
IEEE DOI
1803
Buildings, Measurement, Media, Multimedia communication, Phylogeny,
Vegetation, Visualization, Image Phylogeny, Media Forensics,
Undirected Phylogeny Graph
BibRef
Wengrowski, E.,
Sun, Z.H.,
Hoogs, A.,
Reflection correspondence for exposing photograph manipulation,
ICIP17(4317-4321)
IEEE DOI
1803
Dinosaurs, Feature extraction, Image color analysis, Lighting,
Robustness, Surface treatment, Transforms
BibRef
Brogan, J.,
Bestagini, P.,
Bharati, A.,
Pinto, A.,
Moreira, D.,
Bowyer, K.W.,
Flynn, P.J.,
Rocha, A.,
Scheirer, W.,
Spotting the difference: Context retrieval and analysis for improved
forgery detection and localization,
ICIP17(4078-4082)
IEEE DOI
1803
Databases, Forgery, Image color analysis, Image forensics, Probes,
Splicing, Task analysis, context-aware digital forensics,
tampering heat maps
BibRef
Bappy, J.H.[Jawadul H.],
Roy-Chowdhury, A.K.[Amit K.],
Bunk, J.[Jason],
Nataraj, L.[Lakshmanan],
Manjunath, B.S.,
Exploiting Spatial Structure for Localizing Manipulated Image Regions,
ICCV17(4980-4989)
IEEE DOI
1802
Only the tampered with regions.
backpropagation, feature extraction, feedforward neural nets,
image classification, image resolution, image segmentation,
Visualization
BibRef
Goli, M.S.,
Naghsh, A.,
Introducing a new method robust against crop attack in digital image
watermarking using two-step sudoku,
IPRIA17(237-242)
IEEE DOI
1712
game theory, image reconstruction, image segmentation,
image watermarking, crop attack, digital image watermarking,
sudoku
BibRef
Behravan, B.,
Naghsh, A.,
Introducing a new method of image reconstruction against crop attack
using sudoku watermarking algorithm,
IPRIA17(177-181)
IEEE DOI
1712
data protection, image coding, image reconstruction,
image watermarking, LSB, Sudoku watermarking algorithm,
watermarking of image
BibRef
Maigrot, C.[Cedric],
Kijak, E.[Ewa],
Sicre, R.[Ronan],
Claveau, V.[Vincent],
Tampering Detection and Localization in Images from Social Networks:
A CBIR Approach,
CIAP17(I:750-761).
Springer DOI
1711
BibRef
Cozzolino, D.[Davide],
Marra, F.[Francesco],
Poggi, G.[Giovanni],
Sansone, C.[Carlo],
Verdoliva, L.[Luisa],
PRNU-Based Forgery Localization in a Blind Scenario,
CIAP17(II:569-579).
Springer DOI
1711
BibRef
Chen, C.,
McCloskey, S.[Scott],
Yu, J.,
Image Splicing Detection via Camera Response Function Analysis,
CVPR17(1876-1885)
IEEE DOI
1711
Cameras, Forgery, Image edge detection, Nonlinear optics,
Optical imaging, Splicing, Tools
BibRef
Bondi, L.,
Lameri, S.,
Güera, D.,
Bestagini, P.,
Delp, E.J.,
Tubaro, S.,
Tampering Detection and Localization Through Clustering of
Camera-Based CNN Features,
MedForen17(1855-1864)
IEEE DOI
1709
Cameras, Feature extraction, Forgery, Image coding, Neurons, Transform, coding
BibRef
Chen, B.C.,
Davis, L.S.,
Deep Representation Learning for Metadata Verification,
IVF19(73-82)
IEEE DOI
1902
Metadata, Task analysis, Training, Visualization, Neural networks,
Probes, Image recognition
BibRef
Chen, B.C.,
Ghosh, P.,
Morariu, V.I.,
Davis, L.S.,
Detection of Metadata Tampering Through Discrepancy Between Image
Content and Metadata Using Multi-task Deep Learning,
MedForen17(1872-1880)
IEEE DOI
1709
Cameras, Humidity, Metadata, Predictive models, Sun, Training
BibRef
Bolles, R.,
Burns, J.B.,
Graciarena, M.,
Kathol, A.,
Lawson, A.,
McLaren, M.,
Mensink, T.,
Spotting Audio-Visual Inconsistencies (SAVI) in Manipulated Video,
MedForen17(1907-1914)
IEEE DOI
1709
Acoustics, Face, Feature extraction, Lips, Semantics, Speech, Visualization
BibRef
Asaad, A.[Aras],
Jassim, S.[Sabah],
Topological Data Analysis for Image Tampering Detection,
IWDW17(136-146).
Springer DOI
1708
BibRef
Choi, H.Y.,
Jang, H.U.,
Kim, D.,
Son, J.,
Mun, S.M.,
Choi, S.,
Lee, H.K.,
Detecting composite image manipulation based on deep neural networks,
WSSIP17(1-5)
IEEE DOI
1707
Computer architecture, Convolution, Feature extraction, Forensics,
Machine learning, Training, Composite manipulation detection,
Convolutional neural networks, Deep learning, Multimedia, forensics
BibRef
He, X.[Xin],
Guan, Q.X.[Qing-Xiao],
Tong, Y.F.[Yan-Fei],
Zhao, X.F.[Xian-Feng],
Yu, H.B.[Hai-Bo],
A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation,
IWDW16(145-158).
Springer DOI
1703
BibRef
Le Philippe, N.[Noe],
Puech, W.[William],
Fiorio, C.[Christophe],
Phylogeny of JPEG images by ancestor estimation using missing markers
on image pairs,
IPTA16(1-6)
IEEE DOI
1703
data compression
BibRef
Ho, A.T.P.,
Wang, K.,
Cayre, F.,
An effective histogram-based approach to JPEG-100 forensics,
IPTA16(1-6)
IEEE DOI
1703
Gaussian distribution
BibRef
Serizel, R.,
Bisot, V.,
Essid, S.,
Richard, G.,
Machine listening techniques as a complement to video image analysis
in forensics,
ICIP16(948-952)
IEEE DOI
1610
Acoustics
BibRef
Purohit, K.,
Rajagopalan, A.N.,
Splicing localization in motion blurred 3D scenes,
ICIP16(3922-3926)
IEEE DOI
1610
Cameras
BibRef
Rana, A.,
Valenzise, G.,
DuFaux, F.[Frédéric],
An evaluation of HDR image matching under extreme illumination
changes,
VCIP16(1-4)
IEEE DOI
1701
Detectors
BibRef
Fan, W.,
Valenzise, G.,
Banterle, F.,
DuFaux, F.[Frédéric],
Forensic detection of inverse tone mapping in HDR images,
ICIP16(166-170)
IEEE DOI
1610
Dynamic range
BibRef
Hagui, M.,
Boukhris, A.,
Mahjoub, M.A.,
Comparative Study and Enhancement of Camera Tampering Detection
Algorithms,
CGiV16(226-231)
IEEE DOI
1608
computer vision
BibRef
Alfraih, A.S.[Areej S.],
Briffa, J.A.[Johann A.],
Wesemeyer, S.[Stephan],
Cloning Localization Based on Feature Extraction and K-means Clustering,
IWDW14(410-419).
Springer DOI
1602
BibRef
Kao, D.Y.[Da-Yu],
Chiu, Y.H.[Ying-Hsuan],
An Iterative Management Model of Exploring Windows Date-Time Stamps in
Cloud Storage Forensics,
IWDW14(498-512).
Springer DOI
1602
BibRef
Lu, J.F.[Jian-Feng],
Huang, Q.[Qianru],
Wang, M.[Meng],
Li, L.[Li],
Dai, J.P.[Jun-Ping],
Chang, C.C.[Chin-Chen],
Zero-Watermarking Based on Improved ORB Features Against Print-cam
Attack,
IWDW14(187-198).
Springer DOI
1602
BibRef
Xu, G.S.[Guan-Shuo],
Ye, J.Y.[Jing-Yu],
Shi, Y.Q.[Yun-Qing],
New Developments in Image Tampering Detection,
IWDW14(3-17).
Springer DOI
1602
BibRef
Fan, Y.[Yu],
Carre, P.[Philippe],
Fernandez-Maloigne, C.[Christine],
Image splicing detection with local illumination estimation,
ICIP15(2940-2944)
IEEE DOI
1511
Image splicing; generalized grey-word algorithms; illuminant color
BibRef
Peng, A.[Anjie],
Zeng, H.[Hui],
Lin, X.D.[Xiao-Dan],
Kang, X.G.[Xian-Gui],
Countering anti-forensics of image resampling,
ICIP15(3595-3599)
IEEE DOI
1511
anti-forensics; partial autocorrelation; resampling
BibRef
Zolotavkin, Y.,
Juhola, M.,
Quantization Based Watermarking Approach with Gain Attack Recovery,
DICTA14(1-8)
IEEE DOI
1502
AWGN
BibRef
Valenzise, G.,
Tagliasacchi, M.,
Tubaro, S.,
Detectability-quality trade-off in JPEG counter-forensics,
ICIP14(5337-5341)
IEEE DOI
1502
Accuracy
BibRef
Cozzolino, D.[Davide],
Gragnaniello, D.[Diego],
Verdoliva, L.[Luisa],
Image forgery detection through residual-based local descriptors and
block-matching,
ICIP14(5297-5301)
IEEE DOI
1502
BibRef
Cozzolino, D.[Davide],
Gragnaniello, D.[Diego],
Verdoliva, L.[Luisa],
Image forgery localization through the fusion of camera-based,
feature-based and pixel-based techniques,
ICIP14(5302-5306)
IEEE DOI
1502
Cameras
BibRef
Ravi, H.[Hareesh],
Subramanyam, A.V.,
Gupta, G.[Gaurav],
Kumar, B.A.[B. Avinash],
Compression noise based video forgery detection,
ICIP14(5352-5356)
IEEE DOI
1502
Accuracy
BibRef
Ferreira, A.[Anselmo],
Rocha, A.[Anderson],
A Multiscale and Multi-Perturbation Blind Forensic Technique for Median
Detecting,
CIARP14(302-310).
Springer DOI
1411
Detect that median filtering has been applied.
BibRef
Lalitha, M.,
Holalad, H.,
Rajput, S.,
Muktanidhi, S.D.,
Mudenagudi, U.,
A classifier framework for the detection of doctored images,
NCVPRIPG13(1-4)
IEEE DOI
1408
Bayes methods
BibRef
Mall, V.,
Roy, A.K.,
Mitra, S.K.,
Digital image tampering detection and localization using singular
value decomposition technique,
NCVPRIPG13(1-4)
IEEE DOI
1408
cameras
BibRef
Gao, S.[Shang],
Zhang, C.[Cong],
Wu, C.L.[Chan-Le],
Ye, G.[Gang],
Huang, L.[Lei],
A Hybrid Feature Based Method for Distinguishing Computer Graphics and
Photo-Graphic Image,
IWDW13(303-313).
Springer DOI
1407
BibRef
Shen, C.[Chao],
Cai, Z.M.[Zhong-Min],
Maxion, R.A.[Roy A.],
Guan, X.H.[Xiao-Hong],
On User Interaction Behavior as Evidence for Computer Forensic Analysis,
IWDW13(221-231).
Springer DOI
1407
BibRef
Zhao, X.D.[Xu-Dong],
Wang, S.L.[Shi-Lin],
Li, S.H.[Sheng-Hong],
Li, J.H.[Jian-Hua],
Yuan, Q.Q.[Quan-Qiao],
Image splicing detection based on noncausal Markov model,
ICIP13(4462-4466)
IEEE DOI
1402
Image splicing detection
BibRef
Comesana, P.[Pedro],
Perez-Gonzalez, F.[Fernando],
Liste, N.[Noelia],
Quantization lattice estimation for multimedia forensics,
ICIP13(4452-4456)
IEEE DOI
1402
Dual lattice; lattice estimation; multimedia forensics; noisy estimation
BibRef
Wu, C.M.[Chao-Ming],
Multi-level tamper detection and recovery with tamper type
identification,
ICIP13(4512-4516)
IEEE DOI
1402
adjacent-block based detection
BibRef
Conotter, V.,
Comesana, P.,
Perez-Gonzalez, F.,
Forensic analysis of full-frame linearly filtered JPEG images,
ICIP13(4517-4521)
IEEE DOI
1402
JPEG compression;linear filtering
BibRef
Jain, R.[Rajiv],
Doermann, D.S.[David S.],
Localized document image change detection,
ICDAR15(786-790)
IEEE DOI
1511
BibRef
Earlier:
VisualDiff: Document Image Verification and Change Detection,
ICDAR13(40-44)
IEEE DOI
1312
Change Detection; Document Image; OCR; SIFT.
document image processing
BibRef
Tsesmelis, T.[Theodore],
Christensen, L.[Lars],
Fihl, P.[Preben],
Moeslund, T.B.[Thomas B.],
Tamper detection for active surveillance systems,
AVSS13(57-62)
IEEE DOI
1311
Cameras
BibRef
García-Ordás, D.[Diego],
Fernández-Robles, L.[Laura],
Alegre, E.[Enrique],
García-Ordás, M.T.[María Teresa],
Automatic Tampering Detection in Spliced Images with Different
Compression Levels,
IbPRIA13(416-423).
Springer DOI
1307
BibRef
Pollard, S.[Stephen],
Simske, S.[Steven],
Adams, G.[Guy],
Print biometrics: Recovering forensic signatures from halftone images,
ICPR12(1651-1654).
WWW Link.
1302
BibRef
Li, H.D.[Hao-Dong],
Luo, W.Q.[Wei-Qi],
Huang, J.W.[Ji-Wu],
Countering anti-JPEG compression forensics,
ICIP12(241-244).
IEEE DOI
1302
BibRef
Maity, S.P.[Santi P.],
Delpha, C.[Claude],
Optimal watermark power and host samples allocation under random gain
attack,
ICIP12(2201-2204).
IEEE DOI
1302
BibRef
di Crescenzo, G.[Giovanni],
Arce, G.[Gonzalo],
Data Forensics Constructions from Cryptographic Hashing and Coding,
IWDW11(494-509).
Springer DOI
1208
BibRef
Vázquez-Padín, D.[David],
Pérez-González, F.[Fernando],
Exposing Original and Duplicated Regions Using SIFT Features and
Resampling Traces,
IWDW11(306-320).
Springer DOI
1208
BibRef
Zhang, R.[Rong],
Wang, R.D.[Rang-Ding],
Ng, T.T.[Tian-Tsong],
Distinguishing Photographic Images and Photorealistic Computer Graphics
Using Visual Vocabulary on Local Image Edges,
IWDW11(292-305).
Springer DOI
1208
BibRef
Zhao, X.D.[Xu-Dong],
Wang, S.L.[Shi-Lin],
Li, S.H.[Sheng-Hong],
Li, J.H.[Jian-Hua],
Lin, X.[Xiang],
A Distributed Scheme for Image Splicing Detection,
IWDW13(314-325).
Springer DOI
1407
BibRef
Earlier: A1, A2, A3, A4, Only:
A Comprehensive Study on Third Order Statistical Features for Image
Splicing Detection,
IWDW11(243-256).
Springer DOI
1208
BibRef
Earlier: A1, A4, A3, A2, Only:
Detecting Digital Image Splicing in Chroma Spaces,
DW10(12-22).
Springer DOI
1010
BibRef
Chen, L.[Luyi],
Wang, S.L.[Shi-Lin],
Li, S.H.[Sheng-Hong],
Li, J.H.[Jian-Hua],
New Feature Presentation of Transition Probability Matrix for Image
Tampering Detection,
IWDW11(376-386).
Springer DOI
1208
BibRef
Bateman, P.J.[Philip J.],
Ho, A.T.S.[Anthony T. S.],
Briffa, J.A.[Johann A.],
Image Forensics of High Dynamic Range Imaging,
IWDW11(336-348).
Springer DOI
1208
BibRef
Kwok, C.W.[Chun-Wing],
Au, O.C.,
Chui, S.H.[Sung-Him],
Alternative Anti-Forensics Method for Contrast Enhancement,
IWDW11(398-410).
Springer DOI
1208
BibRef
Chen, L.[Licong],
Shi, Y.Q.[Yun Q.],
Sutthiwan, P.[Patchara],
Niu, X.X.[Xin-Xin],
Non-uniform Quantization in Breaking HUGO,
IWDW13(48-62).
Springer DOI
1407
BibRef
Liu, H.M.[Hong-Mei],
Li, L.[Lei],
Li, J.[Jian],
Huang, J.W.[Ji-Wu],
Three Novel Algorithms for Hiding Data in PDF Files Based on
Incremental Updates,
IWDW11(167-180).
Springer DOI
1208
BibRef
Nguyen, H.C.[Hieu Cuong],
Katzenbeisser, S.[Stefan],
Performance and Robustness Analysis for Some Re-sampling Detection
Techniques in Digital Images,
IWDW11(387-397).
Springer DOI
1208
BibRef
Jung, D.J.[Dae-Jin],
Hyun, D.K.[Dai-Kyung],
Ryu, S.J.[Seung-Jin],
Lee, J.W.[Ji-Won],
Lee, H.Y.[Hae-Yeoun],
Lee, H.K.[Heung-Kyu],
Detecting Re-captured Videos Using Shot-Based Photo Response
Non-Uniformity,
IWDW11(281-291).
Springer DOI
1208
BibRef
Wu, R.[Ruoyu],
Li, X.L.[Xiao-Long],
Yang, B.[Bin],
Identifying computer generated graphics via histogram features,
ICIP11(1933-1936).
IEEE DOI
1201
BibRef
Ananya, U,
Mudenagudi, U.[Uma],
Detection of doctored images using bispectral analysis,
ICIIP11(1-6).
IEEE DOI
1112
BibRef
Zhu, S.Y.[Shu-Yi],
Cao, X.C.[Xiao-Chun],
Zhao, H.D.[Han-Dong],
Photographic Composite Detection Using Two Circles,
ICIG11(858-863).
IEEE DOI
1109
BibRef
Li, L.[Lu],
Xue, J.R.[Jian-Ru],
Wang, X.F.[Xiao-Feng],
Tian, L.[Lihua],
A Robust Approach to Detect Tampering by Exploring Correlation Patterns,
CAIP11(II: 515-522).
Springer DOI
1109
BibRef
Zhao, Y.Q.[Yu Qian],
Shih, F.Y.[Frank Y.],
Shi, Y.Q.[Yun Q.],
Passive Detection of Paint-Doctored JPEG Images,
DW10(1-11).
Springer DOI
1010
BibRef
Cao, H.[Hong],
Kot, A.C.[Alex C.],
Detection of Tampering Inconsistencies on Mobile Photos,
DW10(105-119).
Springer DOI
1010
BibRef
Wang, W.[Wei],
Dong, J.[Jing],
Tan, T.N.[Tie-Niu],
Tampered Region Localization of Digital Color Images Based on JPEG
Compression Noise,
DW10(120-133).
Springer DOI
1010
BibRef
Serra-Ruiz, J.,
Megias, D.,
DWT and TSVQ-based Semi-fragile Watermarking Scheme for Tampering
Detection in Remote Sensing Images,
PSIVT10(331-336).
IEEE DOI
1011
BibRef
Goodwin, J.[Julian],
Chetty, G.[Girija],
Blind Video Tamper Detection Based on Fusion of Source Features,
DICTA11(608-613).
IEEE DOI
1205
BibRef
Chetty, G.[Girija],
Goodwin, J.[Julian],
Singh, M.[Monica],
Digital Image Tamper Detection Based on Multimodal Fusion of Residue
Features,
ACIVS10(II: 79-87).
Springer DOI
1012
BibRef
Wang, W.[Wei],
Dong, J.[Jing],
Tan, T.N.[Tie-Niu],
Image tampering detection based on stationary distribution of Markov
chain,
ICIP10(2101-2104).
IEEE DOI
1009
BibRef
Ardizzone, E.[Edoardo],
Bruno, A.[Alessandro],
Mazzola, G.[Giuseppe],
Detecting multiple copies in tampered images,
ICIP10(2117-2120).
IEEE DOI
1009
See also Visual Saliency by Keypoints Distribution Analysis.
BibRef
Yao, X.Z.[Xin-Zhi],
Liu, H.M.[Hong-Mei],
Rui, W.[Wei],
Huang, J.W.[Ji-Wu],
Content-based authentication algorithm for binary images,
ICIP09(2893-2896).
IEEE DOI
0911
Tamper detection
BibRef
Sutcu, Y.,
Coskun, B.,
Sencar, H.T.,
Memon, N.,
Tamper Detection Based on Regularity of Wavelet Transform Coefficients,
ICIP07(I: 397-400).
IEEE DOI
0709
BibRef
Gou, H.M.[Hong-Mei],
Swaminathan, A.[Ashwin],
Wu, M.[Min],
Noise Features for Image Tampering Detection and Steganalysis,
ICIP07(VI: 97-100).
IEEE DOI
0709
BibRef
Kihara, M.[Mirei],
Fujiyoshi, M.[Masaaki],
Wan, Q.T.[Qing Tao],
Kiya, H.[Hitoshi],
Image Tamper Detection using Mathematical Morphology,
ICIP07(VI: 101-104).
IEEE DOI
0709
BibRef
Roy, S.[Sujoy],
Sun, Q.B.[Qi-Bin],
Robust Hash for Detecting and Localizing Image Tampering,
ICIP07(VI: 117-120).
IEEE DOI
0709
BibRef
Swaminathan, A.,
Wu, M.[Min],
Liu, K.J.R.,
Image Tampering Identification using Blind Deconvolution,
ICIP06(2309-2312).
IEEE DOI
0610
BibRef
Wu, Y.D.[Yong-Dong],
Tamper-Localization Watermarking with Systematic Error Correcting Code,
ICIP06(1965-1968).
IEEE DOI
0610
BibRef
Liu, Y.,
Boncelet, C.G.[Charles G.],
The Crc-Ntmac for Image Tamper Proofing and Authentication,
ICIP06(1985-1988).
IEEE DOI
0610
BibRef
Boncelet, C.G.,
Image Authentication and Tamperproofing for Noisy Channels,
ICIP05(I: 677-680).
IEEE DOI
0512
BibRef
Watanabe, J.[Jun],
Hasegawa, M.,
Kato, S.,
A study on a watermarking method for both copyright protection and
tamper detection,
ICIP04(IV: 2155-2158).
IEEE DOI
0505
BibRef
Wu, J.H.[Jin-Hai],
Zhu, B.B.,
Li, S.P.[Shi-Peng],
Lin, F.[Fuzong],
A secure image authentication algorithm with pixel-level tamper
localization,
ICIP04(III: 1573-1576).
IEEE DOI
0505
BibRef
Inoue, H.,
Wavelet-based Watermarking for Tamper Proofing of Still Images,
ICIP00(Vol II: 88-91).
IEEE DOI
0008
BibRef
Fridrich, J.,
Image watermarking for tamper detection,
ICIP98(II: 404-408).
IEEE DOI
9810
BibRef
Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Double Compression, Double JPEG Detection, Forensics .