2019
DOI: 10.1142/s0219467819500141
|View full text |Cite
|
Sign up to set email alerts
|

Image Forensics Based on Lighting Estimation

Abstract: Computer generated images are assumed to be a key part in each person’s life in this era of information technology, where individuals effectively inhabit the advertisements, magazines, websites, televisions and many more. At the point when digital images played their role, the event of violations in terms of misrepresentation of information, use of their wrong doings winds up and also becomes easier with the help of image editing application programs. To be legitimate, if anyone does wrong anything then the pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…They devise a method for evaluating the side of a lighting source in the first degree of freedom to demonstrate the effects of tampering. Kumar et al [ 53 ] proposed an approach that works for photographs with any sort of item present in the scene, i.e. it is not restricted to human faces and image selection of same intensity regions.…”
Section: Experimentationmentioning
confidence: 99%
“…They devise a method for evaluating the side of a lighting source in the first degree of freedom to demonstrate the effects of tampering. Kumar et al [ 53 ] proposed an approach that works for photographs with any sort of item present in the scene, i.e. it is not restricted to human faces and image selection of same intensity regions.…”
Section: Experimentationmentioning
confidence: 99%
“…The outcome of applying the lighting estimation technique reveals that the method is only marginally improved by excluding specific observations, such as geometry depending on shadowing and upgrade and improve characteristics on selected input images [13]. The technique to identify image modifications is approved by the publication in consideration of the abnormal illumination.…”
Section: Related Workmentioning
confidence: 99%
“…Some methods designed to detect such attacks are presented in [45,46]. Another approach that is used to validate document image source is estimation and control of lighting [47].…”
Section: Fig 3 General Scheme Of the Identity Document Recognition Pi...mentioning
confidence: 99%