2015
DOI: 10.1007/978-3-319-24075-6_10
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Image Manipulation Forensics

Abstract: Abstract. In this paper, we present a unified understanding on the formal performance evaluation for image manipulation forensics techniques. With hypothesis testing model, security is qualified as the difficulty for defeating an existing forensics system and making it generate two types of forensic errors, i.e., missing and false alarm detection. We point out that the security on false alarm risk, which is rarely addressed in current literatures, is equally significant for evaluating the performance of manipu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Several studies [22,23,31,32] use neural networks (CNNs and GANs) to detect or generate forensic images, demonstrating their effectiveness in learning forensic traces and generating sophisticated anti-forensic attacks. Other approaches [25,26] are based on the analysis of first-and second-order statistics and Laplacian modeling to detect contrast enhancement and anti-forensic techniques.…”
mentioning
confidence: 99%
See 4 more Smart Citations
“…Several studies [22,23,31,32] use neural networks (CNNs and GANs) to detect or generate forensic images, demonstrating their effectiveness in learning forensic traces and generating sophisticated anti-forensic attacks. Other approaches [25,26] are based on the analysis of first-and second-order statistics and Laplacian modeling to detect contrast enhancement and anti-forensic techniques.…”
mentioning
confidence: 99%
“…Other approaches [25,26] are based on the analysis of first-and second-order statistics and Laplacian modeling to detect contrast enhancement and anti-forensic techniques. Methods based on CNN [22,31,32] and GAN (generative adversarial networks) [23,29] show high accuracy and robustness in detecting forgery and anti-forensic attacks. Anti-forensic approaches [25,29] focus on minimizing distortion and maintaining image quality, while others [26,27] identify anomalies introduced by anti-forensic techniques.…”
mentioning
confidence: 99%
See 3 more Smart Citations