An overview on image forensics

A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …

Image forgery techniques: a review

G Kaur, N Singh, M Kumar - Artificial Intelligence Review, 2023 - Springer
Image forensics is an investigation of digital images to identify manipulations that have been
done on them. Nowadays, due to the availability of different low-cost devices for capturing …

Detecting documents forged by printing and copying

S Shang, N Memon, X Kong - EURASIP Journal on Advances in Signal …, 2014 - Springer
This paper describes a method to distinguish documents produced by laser printers, inkjet
printers, and electrostatic copiers, three commonly used document creation devices. The …

Analysis of seam-carving-based anonymization of images against PRNU noise pattern-based source attribution

AE Dirik, HT Sencar, N Memon - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The availability of sophisticated source attribution techniques raises new concerns about
privacy and anonymity of photographers, activists, and human right defenders who need to …

Source cell-phone recognition from recorded speech using non-speech segments

C Hanilçi, T Kinnunen - Digital Signal Processing, 2014 - Elsevier
In a recent study, we have introduced the problem of identifying cell-phones using recorded
speech and shown that speech signals convey information about the source device, making …

Forensic use of photo response non-uniformity of imaging sensors and a counter method

AE Dirik, A Karaküçük - Optics express, 2014 - opg.optica.org
Analogous to use of bullet scratches in forensic science, the authenticity of a digital image
can be verified through the noise characteristics of an imaging sensor. In particular, photo …

Optimizing acoustic features for source cell-phone recognition using speech signals

C Hanilçi, F Ertas - Proceedings of the first ACM workshop on …, 2013 - dl.acm.org
This paper presents comparison and optimization of acoustic features for source cell-phone
recognition using recorded speech signals. Different acoustic feature extraction methods …

Document forgery detection using distortion mutation of geometric parameters in characters

S Shang, X Kong, X You - Journal of Electronic Imaging, 2015 - spiedigitallibrary.org
Tampering related to document forgeries is often accomplished by copy-pasting or add-
printing. These tampering methods introduce character distortion mutation in documents. We …

Forensic scanner identification using machine learning

R Shao, EJ Delp - 2020 IEEE Southwest Symposium on Image …, 2020 - ieeexplore.ieee.org
Due to the increasing availability and functionality of image editing tools, many forensic
techniques such as digital image authentication, source identification and tamper detection …

A printer forensics method using halftone dot arrangement model

H Wu, X Kong, S Shang - 2015 IEEE China Summit and …, 2015 - ieeexplore.ieee.org
In this paper, we present a printed image forensics method based on detection of halftone
dots arrangement. The proposed method can be applied to identify printers and expose …