2020
DOI: 10.1007/s11042-020-09585-z
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: A comprehensive survey of detecting tampered images and localization of the tampered region

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 53 publications
0
2
0
Order By: Relevance
“…These visually impaired finders are assembled utilizing AI, for example, to find a little bit change between the cover and stego image or objects a type of classifier or mechanism is prepared. Many tools are used by attackers to identify the basics highpoint of cover steganography [122], [123] and the spatial rich model SRM [124], a list of capabilities named discrete cosine change leftover (DCTR) was proposed [125] for steganalysis of JPEG pictures where the discovery accuracy is assessed utilizing the negligible complete mistake likelihood under equivalent priors and is given by the following formula:…”
Section: B Vulnerabilities To Cover Steganography or Extensive Stegan...mentioning
confidence: 99%
“…These visually impaired finders are assembled utilizing AI, for example, to find a little bit change between the cover and stego image or objects a type of classifier or mechanism is prepared. Many tools are used by attackers to identify the basics highpoint of cover steganography [122], [123] and the spatial rich model SRM [124], a list of capabilities named discrete cosine change leftover (DCTR) was proposed [125] for steganalysis of JPEG pictures where the discovery accuracy is assessed utilizing the negligible complete mistake likelihood under equivalent priors and is given by the following formula:…”
Section: B Vulnerabilities To Cover Steganography or Extensive Stegan...mentioning
confidence: 99%
“…Image tampering detection technology is currently mainly divided into active detection technology and passive detection technology. [4][5][6] Active detection technology requires watermarking or digital signature processing in advance, while passive detection technology does not perform any pre-processing, and directly analyzes and collects evidence based on the characteristics of the image to be detected. Passive detection technology is recognized as a method of blind forensics, with better adaptability, wider application range, and higher research value.…”
Section: Introductionmentioning
confidence: 99%