2019
DOI: 10.1007/s11042-019-08425-z
|View full text |Cite
|
Sign up to set email alerts
|

Improving the security of image manipulation detection through one-and-a-half-class multiple classification

Abstract: Protecting image manipulation detectors against perfect knowledge attacks requires the adoption of detector architectures which are intrinsically difficult to attack. In this paper, we do so, by exploiting a recently proposed multiple-classifier architecture combining the improved security of 1-Class (1C) classification and the good performance ensured by conventional 2-Class (2C) classification in the absence of attacks. The architecture, also known as 1.5-Class (1.5C) classifier, consists of one 2C classifie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 39 publications
0
9
0
Order By: Relevance
“…In the second category, generally more secure detectors, most anti-CF methods are developed without considering developing a technique that analysts react appropriately against various kinds of attacks. Barni et al [48] proposed a detector against PK attacks through multiple-classifier architecture. The architecture is also known as a 1.5C classifier, consisting of one 2C classifier, two 1C classifiers, and a final 1C classifier.…”
Section: Rq3: What Methods Are Available To Improve the Security Of M...mentioning
confidence: 99%
See 4 more Smart Citations
“…In the second category, generally more secure detectors, most anti-CF methods are developed without considering developing a technique that analysts react appropriately against various kinds of attacks. Barni et al [48] proposed a detector against PK attacks through multiple-classifier architecture. The architecture is also known as a 1.5C classifier, consisting of one 2C classifier, two 1C classifiers, and a final 1C classifier.…”
Section: Rq3: What Methods Are Available To Improve the Security Of M...mentioning
confidence: 99%
“…Different kinds of attacks to the general ML system can be employed based on the above taxonomy, as done in [48].…”
Section: Counter-forensic Attacksmentioning
confidence: 99%
See 3 more Smart Citations