2015 IEEE International Workshop on Information Forensics and Security (WIFS) 2015
DOI: 10.1109/wifs.2015.7368606
|View full text |Cite
|
Sign up to set email alerts
|

General-purpose image forensics using patch likelihood under image statistical models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
52
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(52 citation statements)
references
References 18 publications
0
52
0
Order By: Relevance
“…Image forensics. Various problems have been considered by image forensics researchers [12], such as camera identification [2], identification of synthetic images [4,14], detection of falsification such as splicing and copy-move [3,17], and detection of image manipulation [13,5,10,1]. We are interested in the last topic of detecting image manipulations.…”
Section: Background and Research Problemmentioning
confidence: 99%
“…Image forensics. Various problems have been considered by image forensics researchers [12], such as camera identification [2], identification of synthetic images [4,14], detection of falsification such as splicing and copy-move [3,17], and detection of image manipulation [13,5,10,1]. We are interested in the last topic of detecting image manipulations.…”
Section: Background and Research Problemmentioning
confidence: 99%
“…In addition, some methods rely on machine learning [12,16,18] and have reported good performance. However, these methods essentially depend on the availability and quality of training data, which is not always guaranteed.…”
Section: Related Workmentioning
confidence: 99%
“…The illumination environment in pictures also presents some consistency: directions of lights [21], shadows [30] and illumination colors [6] can be estimated and used as cues. However, the methods mentioned above are intrinsically sensitive only to specific manipulations.In addition, some methods rely on machine learning [12,16,18] and have reported good performance. However, these methods essentially depend on the availability and quality of training data, which is not always guaranteed.An interesting approach for forgery detection relies on the characteristics of the digital camera, such as the color filter array (CFA) interpolation artifacts [17], lens aberration [22] and sensor pattern noise (SPN) [32], which has drawn considerable attention due to the uniqueness of individual cameras and the stability against environmental conditions.…”
mentioning
confidence: 99%
“…For instance, by modeling image processing operations as steganography, Qiu et al [18] proposed to use steganalytic features, such as SPAM [19], SRM [20] and LBP [21], to identify six typical image processing operations. Fan et al [22] adopted Gaussian mixture models to model the statistics of images processed by different image operations. Recently, Li et al [23] proposed a compact universal feature set from SRM [20] to identify 11 typical image processing operations.…”
Section: Introductionmentioning
confidence: 99%