2017
DOI: 10.1080/13682199.2017.1389832
|View full text |Cite
|
Sign up to set email alerts
|

An improved anti-forensics JPEG compression using Least Cuckoo Search algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The proposed method was evaluated and the results showed that it can fool some of the state-of-the-art image forensics tools. Shelke and Prasad [90] proposed a Least Cuckoo search algorithm to remove detectable traces left by JPEG compression in both the spatial and transform domains. The authors devised a new fitness function, called histogram deviation, and used it for optimisation.…”
Section: Afts For Jpeg Blocking Artefacts Removalmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed method was evaluated and the results showed that it can fool some of the state-of-the-art image forensics tools. Shelke and Prasad [90] proposed a Least Cuckoo search algorithm to remove detectable traces left by JPEG compression in both the spatial and transform domains. The authors devised a new fitness function, called histogram deviation, and used it for optimisation.…”
Section: Afts For Jpeg Blocking Artefacts Removalmentioning
confidence: 99%
“…analyse relationships of DWT coefficients across different decomposition levels, apply Hough transform to joint DWT histogram to derive features for SVM, AUC = 0.97 Fahmi and Würtz [127] 2016 quantisation own dataset of 280 images, QF ∈ [30,90] noise dithering is measured by spatial frequency phase variations in tampered image blocks, highest accuracy = 93 at QF = 30 and 70% for QF = 30 and 95 Barni et al [128] 2016 double JPEG compression RAISE dataset [129] (1400 images for training, 300 for kernel settings, 300 for testing, size 4288 ×2848 and 2144×1424, QF ∈ [49,87]) adversary-aware AAFT for double JPEG compression based on data-driven approaches and adversary-aware SVM, efficiently counter universal anti-forensic attacks Zeng et al [130] 2018 quantisation 1338 greyscale images from UCID [78] compression for the case when the anti-forensic operation is applied to hide the traces of tampering. The algorithm is also able to counter CE and median filtering anti-forensics, as well as detecting various image processing operations like scaling, rotation, filtering (mean filtering, Gaussian filtering, Weiner filtering) and proved to be used as a multipurpose anti-forensic countering method.…”
Section: Aafts For Compressionmentioning
confidence: 99%
“…However, the technique failed to manage huge datasets, creating several issues. Several optimization methods (Ratre & Pankajakshan, 2017 ;Dhumane & Prasad, 2017 ;Nipanikar, et al, 2017 ;Shelke & Prasad, 2018 ;Krishnamoorthy & Asokan, 2014) are utilized for privacy preservation to optimize the results.…”
Section: Introductionmentioning
confidence: 99%
“…The bat optimization algorithm is modified in (Kaur et al , 2017) for segmenting the brain tumor images. The optimization techniques (Dhumane and Prasad, 2017; Nipanikar et al , 2017; Shelke and Prasad, 2018; Bhopale et al , 2014) have applications in brain tumor segmentation. Also, literature has used the semiautomatic brain tumor segmentation (Sauwen et al , 2017) approaches.…”
Section: Introductionmentioning
confidence: 99%