Vision of the unseen: Current trends and challenges in digital image and video forensics

A Rocha, W Scheirer, T Boult… - ACM Computing Surveys …, 2011 - dl.acm.org
Digital images are everywhere—from our cell phones to the pages of our online news sites.
How we choose to use digital image processing raises a surprising host of legal and ethical …

A sift-based forensic method for copy–move attack detection and transformation recovery

I Amerini, L Ballan, R Caldelli… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
One of the principal problems in image forensics is determining if a particular image is
authentic or not. This can be a crucial task when images are used as basic evidence to …

Learning a blind measure of perceptual image quality

H Tang, N Joshi, A Kapoor - CVPR 2011, 2011 - ieeexplore.ieee.org
It is often desirable to evaluate an image based on its quality. For many computer vision
applications, a perceptually meaningful measure is the most relevant for evaluation; …

Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection

YL Chen, CT Hsu - IEEE Transactions on Information Forensics …, 2011 - ieeexplore.ieee.org
Due to the popularity of JPEG as an image compression standard, the ability to detect
tampering in JPEG images has become increasingly important. Tampering of compressed …

Digital image forgery detection based on lens and sensor aberration

I Yerushalmy, H Hel-Or - International journal of computer vision, 2011 - Springer
A new approach to detecting forgery in digital photographs is suggested. The method does
not necessitate adding data to the image (such as a Digital Watermark) nor require other …

Steganalysis of DCT-embedding based adaptive steganography and YASS

Q Liu - Proceedings of the thirteenth ACM multimedia …, 2011 - dl.acm.org
Recently well-designed adaptive steganographic systems, including±1 embedding in the
DCT domain with optimized costs to achieve the minimal-distortion [8], have posed serious …

Neighboring joint density-based JPEG steganalysis

Q Liu, AH Sung, M Qiao - ACM Transactions on Intelligent Systems and …, 2011 - dl.acm.org
The threat posed by hackers, spies, terrorists, and criminals, etc. using steganography for
stealthy communications and other illegal purposes is a serious concern of cyber security …

Identifying computer generated graphics via histogram features

R Wu, X Li, B Yang - 2011 18th IEEE International Conference …, 2011 - ieeexplore.ieee.org
Discriminating computer generated graphics from photographic images is a challenging
problem of digital forensics. An important approach to this issue is to explore usual image …

[PDF][PDF] Automated forensic method for copy-move forgery detection based on Harris interest points and SIFT descriptors

B Shivakumar, SS Baboo - International Journal of Computer Applications, 2011 - Citeseer
We are undoubtedly living in an age where we are exposed to a remarkable array of visual
imagery. Nowadays, accepting digital images of official documents is common practice …

Differentiating between images using wavelet-based transforms: a comparative study

L Ozparlak, I Avcibas - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
We propose statistical image models for wavelet-based transforms, investigate their use,
and compare their relative merits within the context of digital image forensics. We consider …