2021
DOI: 10.1016/j.cose.2020.102092
|View full text |Cite
|
Sign up to set email alerts
|

A survey of machine learning techniques in adversarial image forensics

Abstract: Image forensic plays a crucial role in both criminal investigations (e.g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups or political campaigns) and civil litigation (e.g., defamation). Increasingly, machine learning approaches are also utilized in image forensics. However, there are also a number of limitations and vulnerabilities associated with machine learning-based approaches (e.g., how to detect adversarial (image) examples), and there are associat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 58 publications
(27 citation statements)
references
References 51 publications
0
27
0
Order By: Relevance
“…This is a very challenging problem, since several artifacts, such as the correlation between RGB channels, discrete cosine transform irregularities, and even illumination inconsistencies in the digital image versions are usually removed by the print and scan process. In this way, although several adversarial attacks have been discussed in the literature [ 55 ], the print and scan procedure is the easiest yet most powerful attack an adversary could perform against deepfake digital image detectors.…”
Section: Related Workmentioning
confidence: 99%
“…This is a very challenging problem, since several artifacts, such as the correlation between RGB channels, discrete cosine transform irregularities, and even illumination inconsistencies in the digital image versions are usually removed by the print and scan process. In this way, although several adversarial attacks have been discussed in the literature [ 55 ], the print and scan procedure is the easiest yet most powerful attack an adversary could perform against deepfake digital image detectors.…”
Section: Related Workmentioning
confidence: 99%
“…Another set of surveys focus on the specific context of child abuse material and its detection through image and video analysis [111]- [114]. More recently, the advent of deep learning techniques has enhanced the capabilities of image integrity detection and verification, outperforming traditional methods in several image-related tasks, especially in these where anti-forensic tools were used [109], [110], [115]. In the context of video files, we can find surveys on video steganalysis [109], [110], [116], video forgery detection [91], [92], [94], [110], [117], [118], video forensic tools [91], [109], [119], [120], video surveillance analysis [121], [122], and video content authentication [123].…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
“…The problem of detecting privacy enhancement, on the other hand, has not yet been explored in the literature. Because some privacy models are based on adversarial perturbations, this problem is also partially related to adversarial-attack detection techniques [36][37][38][39][40]. However, since soft-biometric privacy enhancement also includes synthesis-based methods, data hidding solutions and a wide variety of other approaches [10], the problem of detecting such image modifications is considerably broader.…”
Section: Detecting Privacy Enhancementmentioning
confidence: 99%