EXPLOITING NOISE AND TEXTURAL FEATURES FOR PASSIVE IMAGE FORENSICS
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
A. Rocha, W. Scheirer, T. Boult, S. Goldenstein, “Vision of the unseen: current trends and challenges in digital image and video forensicsâ€. ACM Computer Survey, 2011; 43(4):26:1–26:42.
H. Farid, “Detecting digital forgeries using bispectral analysisâ€, Technical Report AIM-1657, AI Lab, Massachusetts Institute of Technology; 1999.
G. K. Birajdar and V. H. Mankar, “Digital image forgery detection using passive techniques: A surveyâ€, Digital Investigation, 2013, 10(3), 226-245.
Li. Xin, “Blind image quality assessmentâ€, Proceedings of International Conference on Image Processing, 2002, Vol. 1. IEEE.
I. Avcibas, S. Bayram, N. Memon, M. Ramkumar, B. Sankur, “A classifier design for detecting image manipulationsâ€, Proc. International conference on image processing (ICIP), 2004. p. 2645–8.
A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regionsâ€, Technical Report TR 2004-515, Department of Computer Science, Dartmouth College, 2004.
S. Bayram, I. Avcibas, B. Sankur and N. Memon, “Image manipulation detection â€, Electron Imaging, 2006;15(4). 041102-1–041102-17.
H. Gou, A. Swaminathan, M. Wu, “Noise features for image tampering detection and steganalysisâ€, Proc. International conference on image processing (ICIP) 2007. p. 97–100.
Z. Zhang, J. Kang, Y. Ren, “An effective algorithm of image splicing detectionâ€, Proc. International conference on computer science and software engineering, 2008. p. 1035–9.
B. Mahdian and S. Saic, “Using noise inconsistencies for blind image forensicsâ€. Image and Vision Computing, 2009, 27(10), 1497-1503.
W. Wang, J. Dong and T. Tan, “Effective image splicing detection based on image chromaâ€. 16th IEEE International Conference on Image Processing (ICIP), 2009, (pp. 1257-1260). IEEE.
F. Battisti, M. Carli and A. Neri, “Image forgery detection by means of no-reference quality metricsâ€. IS&T/SPIE Electronic Imaging, 2012, pp. 83030K-83030K, International Society for Optics and Photonics.
Y. Ke, Q. Zhang, W. Min and S. Zhang, “Detecting Image Forgery Based on Noise Estimationâ€, 2014, International Journal of Multimedia and Ubiquitous Engineering, 9(1), 325-336.
B. Liu and C. M. Pun, “Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepanciesâ€, 2015, International Journal of Computer and Communication Engineering, 4(1), 33.
Y. Q. Shi, C. Chen and W. Chen, “A natural image model approach to splicing detectionâ€, Proc. of the 9th Workshop on Multimedia & Security (ACM), 51–62 (2007).
Z. He, W. Lu, W. Sun and J. Huang, “Digital image splicing detection based on Markov features in DCT and DWT domainâ€, Pattern Recognition, 45(12), 4292–4299 (2012).
G. Muhammad, M. S. Dewan, M. Moniruzzaman, M. Hussain and M. N. Huda, “Image forgery detection using Gabor filters and DCTâ€, Proc. IEEE Int. Conf. Electrical Engineering Inf. Communication Technol., Dhaka, Bangladesh, 1–5 (2014).
M. Hussain, S. Qasem, G. Bebis, G. Muhammad, H. Aboalsamh and H. Mathkour, “Evaluation of image forgery detection using multi-scale Weber local descriptorsâ€, International Journal on Artificial Intelligence Tools, 24(4), 1540016-1540042 (2015).
X. Shen, Z. Shi, and H. Chen, “Splicing image forgery detection using textural features based on the grey level co-occurrence matricesâ€, IET Image Processing, 11(1), 44-53 (2016).
J. Dong and W. Wang, “CASIA tampered image detection evaluation databaseâ€, http://forensics.idealtest.org (2011).
C. C. Chang and C. J. Lin, “LIBSVM: a library for support vector machinesâ€, ACM Transactions on Intelligent Systems and Technology, 2:27:1--27:27, (2011).