2016
DOI: 10.1109/tifs.2015.2506548
|View full text |Cite
|
Sign up to set email alerts
|

Illuminant-Based Transformed Spaces for Image Forensics

Abstract: In this paper, we explore transformed spaces, represented by image illuminant maps, to propose a methodology for selecting complementary forms of characterizing visual properties for an effective and automated detection of image forgeries. We combine statistical telltales provided by different image descriptors that explore color, shape, and texture features. We focus on detecting image forgeries containing people and present a method for locating the forgery, specifically, the face of a person in an image. Ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 90 publications
(25 citation statements)
references
References 30 publications
0
25
0
Order By: Relevance
“…Splicing detection [20] DCT coefficient distributions of each block Not applicable [21] Multiscale scheme based on Benford's law Not applicable [22] CFA artifacts Possible but with low robustness [23] PRNU noises Possible but with low robustness [24] Multiscale scheme based on PRNU noises Possible but with low robustness [25] Blur type inconsistency Not applicable [26] Illuminant-based transform spaces Not applicable [27] Two-view geometrical constraints Not applicable [28] Planar homographies Not applicable Image retouching detection [29] Block similarities and distances Not applicable [3] Peak/gap artifacts Not applicable Scribble-based method [30] Neighboring pixels with similar intensities should have similar colors User scribbles [31] Construct color and texture dictionaries User scribbles…”
Section: Methodsmentioning
confidence: 99%
“…Splicing detection [20] DCT coefficient distributions of each block Not applicable [21] Multiscale scheme based on Benford's law Not applicable [22] CFA artifacts Possible but with low robustness [23] PRNU noises Possible but with low robustness [24] Multiscale scheme based on PRNU noises Possible but with low robustness [25] Blur type inconsistency Not applicable [26] Illuminant-based transform spaces Not applicable [27] Two-view geometrical constraints Not applicable [28] Planar homographies Not applicable Image retouching detection [29] Block similarities and distances Not applicable [3] Peak/gap artifacts Not applicable Scribble-based method [30] Neighboring pixels with similar intensities should have similar colors User scribbles [31] Construct color and texture dictionaries User scribbles…”
Section: Methodsmentioning
confidence: 99%
“…Initially, a suitable CNN structure must be figured out, and the selection of each layer, such as the convolutional layers and the max-pooling layers, and the dropout depends strongly on the experiments. By reviewing previous research and the dataset size [1,4], the model is configured to accept 256 × 256 images as the input. The TFID model contains six convolution layers that are in charge of extracting abstract features.…”
Section: Methodsmentioning
confidence: 99%
“…Image tampering is an effective technique that can be exploited to manipulate images. There are three standard techniques in image tampering, including copy-move, image splicing, and image retouching [4]. The copy-move method refers to the process of copying some parts from a source image and putting them into a target image, whereas the image splicing technique combines two or more images to create a composite image.…”
Section: Introductionmentioning
confidence: 99%
“…Silva et al (2015) proposed a method tailored for copy-move image forgery detection based on a multi-scale analysis of the input image. The input Figure 4 -Overview of the method proposed by Carvalho et al (2016). An image is analyzed by segmenting all suspected faces.…”
Section: (B)mentioning
confidence: 99%