Handbook of Digital Imaging 2015
DOI: 10.1002/9781118798706.hdi044
|View full text |Cite
|
Sign up to set email alerts
|

Digital Photo Forensics

Abstract: The abundance of graphics applications has made it easy for anyone to modify digital pictures. However, modified pictures can cause problems for fields where altered photographs may give the wrong impression. Issues arise when altered images are used to convey misleading news, alter a product's performance in advertisements and scientific research, or are associated with identity theft or court proceedings. Forensic imaging provides algorithms, tools, and techniques for detecting image tampering. This chapter … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 43 publications
0
14
0
Order By: Relevance
“…The first and second columns, respectively, show the altered original image and the corresponding ground truth, while the remaining columns show the outcomes of seven different detection methods. The tampered area cannot be precisely located using the conventional detection techniques ELA 34 and CFA, 35 as shown in Fig. 11.…”
Section: Methodsmentioning
confidence: 99%
“…The first and second columns, respectively, show the altered original image and the corresponding ground truth, while the remaining columns show the outcomes of seven different detection methods. The tampered area cannot be precisely located using the conventional detection techniques ELA 34 and CFA, 35 as shown in Fig. 11.…”
Section: Methodsmentioning
confidence: 99%
“…ELA is utilised for determining the parts of a picture with varying compression rates. A JPEG picture should have an identical overall image quality [ 32 , 33 , 34 ]. If a portion of the image has a significantly varying error rate, this might suggest a digital change.…”
Section: Methodsmentioning
confidence: 99%
“…The proposed model is compared with various traditional and deep learning methods. Traditional methods such as ELA [5], NOI [25], BAG [26], DCT [6], CFA [7], SRM [8], JPEG Compression Model [27], etc. which uses hand-crafted features to detect forgery.…”
Section: Baseline Modelsmentioning
confidence: 99%
“…The second is locating and characterizing different tampering artifacts hidden in a tampered image. Traditional methods use hand‐crafted features and visible artifacts such as error level analysis (ELA) [5], discrete cosine transform (DCT) [6], color filter array (CFA) [7], and steganalysis‐rich model (SRM) [8] to detect hidden artifacts and inconsistencies in Image. The problem with these methods is that they can only apply to a specific type of Image manipulation type.…”
Section: Introductionmentioning
confidence: 99%