2017 IEEE International Conference on Image Processing (ICIP) 2017
DOI: 10.1109/icip.2017.8296532
|View full text |Cite
|
Sign up to set email alerts
|

Provenance filtering for multimedia phylogeny

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…Bharati et al [9] propose an undirected graph to show the relationships between images based on spatial information given by representative key points and match consistency. Pinto et al [10] present a provenance filtering method to improve retrieval of candidate images by incorporating the context of top results. More recently, Bharati et al [11] design an IPA approach that utilizes commonly present file metadata tags, e.g., date, location, camera, editing, and thumbnail related metadata.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Bharati et al [9] propose an undirected graph to show the relationships between images based on spatial information given by representative key points and match consistency. Pinto et al [10] present a provenance filtering method to improve retrieval of candidate images by incorporating the context of top results. More recently, Bharati et al [11] design an IPA approach that utilizes commonly present file metadata tags, e.g., date, location, camera, editing, and thumbnail related metadata.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, researchers began to actively study IPA, and a few approaches are introduced in [5,[8][9][10][11]. But the IPA systems still have much room to improve their performance.…”
Section: Introductionmentioning
confidence: 99%
“…Following the protocol proposed by NIST [54], we perform both end-to-end and oracle-filter provenance analysis over this dataset. End-to-end analysis requires performing provenance filtering prior to graph construction [58]. In this case, for each query image, graphs are built upon a list of ranked images that might include distractors and miss genuinely related images due to imperfect image filtering.…”
Section: Provenance Analysis For Digital Forensicsmentioning
confidence: 99%
“…In the literature, a few studies were proposed to find the provenance of manipulated images. In Reference [22], the provenance of spliced images was searched in two tiers using Speeded-Up Robust Features. The first tier was responsible to find the host (target) images, and then the search was refined in the second tier to find the donor (source) images.…”
Section: Introductionmentioning
confidence: 99%
“…Provenance graph-construction methods were proposed in References [23,24] to show the relationships among images with multiple manipulation operations, such as splicing, spatial operations and enhancement. The experimental results in References [22][23][24] were performed using only a small number of test images and the results show that their methods achieved moderate retrieval performance for the source images. This paper aims to address the shortcomings of previous works and provide a convincing provenance of spliced images.…”
Section: Introductionmentioning
confidence: 99%