2015
DOI: 10.1016/j.diin.2015.01.017
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive photo-response non-uniformity noise removal against image source attribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(30 citation statements)
references
References 16 publications
0
30
0
Order By: Relevance
“…If α is set too high, Alice's chances of running a successful triangle test may increase substantially [4], [7]. Before and after superimposing the fingerprint, Eve may apply further processing steps to make her forgery more compelling, e. g., removing the genuine camera fingerprint [10], synthesizing demosaicing artifacts [11], and removing or adding traces of JPEG compression [12].…”
Section: B Fingerprint-copy Attackmentioning
confidence: 99%
“…If α is set too high, Alice's chances of running a successful triangle test may increase substantially [4], [7]. Before and after superimposing the fingerprint, Eve may apply further processing steps to make her forgery more compelling, e. g., removing the genuine camera fingerprint [10], synthesizing demosaicing artifacts [11], and removing or adding traces of JPEG compression [12].…”
Section: B Fingerprint-copy Attackmentioning
confidence: 99%
“…• Destroying the Image Identity: This class of counter forensic techniques tries to conceal the identity of an image and therefore prevents an identification of the image source or camera, respectively. Some examples are: removing the PRNU [82], [83], [84], [85], seam carving [86], [87], adaptive PRNU denoising [88]. Applying these techniques to morphed face images poses a lower threat to a PRNU-based morph detection system, since the aim is not to detect the image source, but to analyse the general properties of the PRNU signal.…”
Section: B Potential Attacks and Prnu Robustnessmentioning
confidence: 99%
“…However, the attack's success generally depends on a good choice of α: too low values mean that the bogus image J may not be assigned to Alice's camera; a too strong embedding will make the image appear suspicious [13,20]. In practical scenarios, Mallory may have to apply further processing to make her forgery more compelling, e. g., removing the genuine camera fingerprint [7,16], synthesizing demosaicing artifacts [17], and removing or adding traces of JPEG compression [25].…”
Section: Fingerprint-copy Attackmentioning
confidence: 99%