2010
DOI: 10.1016/j.optcom.2009.12.073
|View full text |Cite
|
Sign up to set email alerts
|

Probability-based tampering detection scheme for digital images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(27 citation statements)
references
References 5 publications
0
27
0
Order By: Relevance
“…One possible application of the proposed comparison method is tamper detection [5,33]. In Figure 8 we show an example, similar to the ones given in [33], of a tampered image with image synthesis attacks. As it appears in Figure 8.d, the algorithm successfully locates the tampered areas.…”
Section: Tamper and Damaged Areas Detectionmentioning
confidence: 97%
“…One possible application of the proposed comparison method is tamper detection [5,33]. In Figure 8 we show an example, similar to the ones given in [33], of a tampered image with image synthesis attacks. As it appears in Figure 8.d, the algorithm successfully locates the tampered areas.…”
Section: Tamper and Damaged Areas Detectionmentioning
confidence: 97%
“…These dependencies carry important information about the structure of the objects in the visual scene. The SSIM metric, given by (14), is calculated on various windows of an image. The measure relative to two windows x and y of common size (N × N).…”
Section: Perceptual Quality Of Watermarked Imagesmentioning
confidence: 99%
“…These approaches often use data embedding techniques [48] to achieve the goal of embedment. For example, Hsu and Tu [9] present an image authentication method by embedding authentication information into the least significant bits (LSBs) of image blocks. Their method is capable of detecting and locating tampered blocks of the spatial domain.…”
Section: Introductionmentioning
confidence: 99%