Media forensics and deepfakes: an overview

L Verdoliva - IEEE Journal of Selected Topics in Signal …, 2020 - ieeexplore.ieee.org
With the rapid progress in recent years, techniques that generate and manipulate
multimedia content can now provide a very advanced level of realism. The boundary …

Digital image forgery detection using passive techniques: A survey

GK Birajdar, VH Mankar - Digital investigation, 2013 - Elsevier
Today manipulation of digital images has become easy due to powerful computers,
advanced photo-editing software packages and high resolution capturing devices. Verifying …

Noiseprint: A CNN-based camera model fingerprint

D Cozzolino, L Verdoliva - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Forensic analyses of digital images rely heavily on the traces of in-camera and out-camera
processes left on the acquired images. Such traces represent a sort of camera fingerprint. If …

Detection of gan-generated fake images over social networks

F Marra, D Gragnaniello, D Cozzolino… - … IEEE conference on …, 2018 - ieeexplore.ieee.org
The diffusion of fake images and videos on social networks is a fast growing problem.
Commercial media editing tools allow anyone to remove, add, or clone people and objects …

A novel CNN based security guaranteed image watermarking generation scenario for smart city applications

D Li, L Deng, BB Gupta, H Wang, C Choi - Information Sciences, 2019 - Elsevier
The rise of machine learning increases the current computing capabilities and paves the
way to novel disruptive applications. In the current era of big data, the application of image …

A sift-based forensic method for copy–move attack detection and transformation recovery

I Amerini, L Ballan, R Caldelli… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
One of the principal problems in image forensics is determining if a particular image is
authentic or not. This can be a crucial task when images are used as basic evidence to …

Image forgery detection

H Farid - IEEE Signal processing magazine, 2009 - ieeexplore.ieee.org
We are undoubtedly living in an age where we are exposed to a remarkable array of visual
imagery. While we may have historically had confidence in the integrity of this imagery …

Information forensics: An overview of the first decade

MC Stamm, M Wu, KJR Liu - IEEE access, 2013 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …

Region duplication detection using image feature matching

X Pan, S Lyu - IEEE Transactions on Information Forensics and …, 2010 - ieeexplore.ieee.org
Region duplication is a simple and effective operation to create digital image forgeries,
where a continuous portion of pixels in an image, after possible geometrical and illumination …

The design of high-level features for photo quality assessment

Y Ke, X Tang, F Jing - 2006 IEEE Computer Society Conference …, 2006 - ieeexplore.ieee.org
We propose a principled method for designing high level features forphoto quality
assessment. Our resulting system can classify between high quality professional photos and …