2020
DOI: 10.3390/sym12111811
|View full text |Cite
|
Sign up to set email alerts
|

Recent Advances in Digital Multimedia Tampering Detection for Forensics Analysis

Abstract: In the digital multimedia era, digital forensics is becoming an emerging area of research thanks to the large amount of image and video files generated. Ensuring the integrity of such media is of great importance in many situations. This task has become more complex, especially with the progress of symmetrical and asymmetrical network structures which make their authenticity difficult. Consequently, it is absolutely imperative to discover all possible modes of manipulation through the development of new forens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 128 publications
0
10
0
Order By: Relevance
“…More recently, the advent of deep learning techniques has enhanced the capabilities of image integrity detection and verification, outperforming traditional methods in several image-related tasks, especially in these where anti-forensic tools were used [109], [110], [115]. In the context of video files, we can find surveys on video steganalysis [109], [110], [116], video forgery detection [91], [92], [94], [110], [117], [118], video forensic tools [91], [109], [119], [120], video surveillance analysis [121], [122], and video content authentication [123]. Finally, digital audio forensics has also been studied in [124].…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…More recently, the advent of deep learning techniques has enhanced the capabilities of image integrity detection and verification, outperforming traditional methods in several image-related tasks, especially in these where anti-forensic tools were used [109], [110], [115]. In the context of video files, we can find surveys on video steganalysis [109], [110], [116], video forgery detection [91], [92], [94], [110], [117], [118], video forensic tools [91], [109], [119], [120], video surveillance analysis [121], [122], and video content authentication [123]. Finally, digital audio forensics has also been studied in [124].…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
“…Standardized evaluation procedures and benchmarks [90], [94]- [96], [98], [100], [101], [104], [109]- [114], [116], [117], [123] Explore the use of novel AI methods and novel data types [88], [91], [93], [95], [99], [100], [103], [104], [106], [107], [109], [110], [112], [113], [115], [118], [121]- [124] Robust pre-processing and feature extraction [90], [91], [94], [97], [99], [101], [102], [105], [106], [109], [115], [117], [118], [121], [123], [124] Reduce training and data acquisition overheads [89], [91]…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
“…These are two techniques used in active forensic techniques to inject legitimate information into images. When there is a doubt regarding the validity of a picture, the embedded authentication information is retrieved to establish the image’s authenticity [ 7 ]. It is followed by the limitation of multiple processing steps of digital images.…”
Section: Classification Of Active Image Forgery Detectionmentioning
confidence: 99%
“…Two incidences of image forgery are discussed in Figs. 1 [ 90 ] and 2 [ 7 ] and are included here to describe the severity of the issue (Fig. 2 ).…”
Section: Introductionmentioning
confidence: 99%
“…Another challenge is the complexity of hiding innumerable types of digital information in a carrier signal over multimedia systems causing the carrier's channel's to prove their authenticity and validity during a cyber incident [7]. Furthermore, the remote evidence acquisition process itself is highly vulnerable while collecting digital evidence from different sources on the network including handling data nodes from an entry point of discovery to evidence remote data recovery, reconstruction, and verification [8,9]. This traditional layered process is considered insecure, while collecting, preserving, and storing the digital evidence [10].…”
Section: Introductionmentioning
confidence: 99%