2019
DOI: 10.1007/978-3-030-30645-8_65
|View full text |Cite
|
Sign up to set email alerts
|

1-D DCT Domain Analysis for JPEG Double Compression Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

4
5

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…As regards implementations used for testing above mentioned techniques: the publicly available 3 Matlab implementation was employed for Bianchi et al [17]; code from the ICVGIP-2016.RAR archive available on Dr. Manish Okade's website 4 was employed for Dalmia et al [19]; models and implementation available on Github 5 were employed for Niu at al. [28] and finally an implementation from scratch was employed for Galvan et al [4] Experiments were carried out for standard tables and custom ones, all employing 64×64 patches extracted from RAISE dataset [32].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…As regards implementations used for testing above mentioned techniques: the publicly available 3 Matlab implementation was employed for Bianchi et al [17]; code from the ICVGIP-2016.RAR archive available on Dr. Manish Okade's website 4 was employed for Dalmia et al [19]; models and implementation available on Github 5 were employed for Niu at al. [28] and finally an implementation from scratch was employed for Galvan et al [4] Experiments were carried out for standard tables and custom ones, all employing 64×64 patches extracted from RAISE dataset [32].…”
Section: Resultsmentioning
confidence: 99%
“…This makes forensics analysis really difficult in order to reconstruct the history of an image from the first acquisition device to each of the subsequent processing ( [2,3]). Even detecting if an investigated image has been compressed only two times is a challenging task, namely Double Compression Detection ( [4][5][6]). The problem is furtherly complicated by considering the possibility to crop and/or resize images (e.g., aligned and non-aligned scenario [7,8]).…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, some Deepfake images, in the Fourier domain, after being processed by a Discrete Fast Fourier Transform, show abnormal frequencies distributions. This preliminary insight was detected by Guarnera et al [4] in which the authors tried to roughly detect Deepfakes by means of well-known forgery detection tools ( [2], [15], [16]) with only few insights for future works as results. The analysis in the Fourier domain was employed by Zhang et al [17] in a rather naive strategy which delivered in any case good performances.…”
Section: B Deepfake Detection Methodsmentioning
confidence: 90%
“…Indeed, some Deepfake images, in the Fourier domain, after being processed by a Discrete Fast Fourier Transform, show abnormal frequencies distributions. This preliminary insight was detected by Guarnera et al [4] in which the authors tried preliminarly to detect Deepfakes by means of well-known forgery detection tools ( [2], [15], [16]) with only few insights for future works as results. The analysis in the Fourier domain was employed more in deep by Zhang et al [17] in a naive strategy achieved good performances.…”
Section: B Deepfake Detection Methodsmentioning
confidence: 95%