Digital image forgery detection using passive techniques: A survey

GK Birajdar, VH Mankar - Digital investigation, 2013 - Elsevier
Today manipulation of digital images has become easy due to powerful computers,
advanced photo-editing software packages and high resolution capturing devices. Verifying …

An overview on image forensics

A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …

Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection

B Bayar, MC Stamm - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Identifying the authenticity and processing history of an image is an important task in
multimedia forensics. By analyzing traces left by different image manipulations, researchers …

Aligned and non-aligned double JPEG detection using convolutional neural networks

M Barni, L Bondi, N Bonettini, P Bestagini… - Journal of Visual …, 2017 - Elsevier
Due to the wide diffusion of JPEG coding standard, the image forensic community has
devoted significant attention to the development of double JPEG (DJPEG) compression …

Image forgery localization via block-grained analysis of JPEG artifacts

T Bianchi, A Piva - IEEE Transactions on Information Forensics …, 2012 - ieeexplore.ieee.org
In this paper, we propose a forensic algorithm to discriminate between original and forged
regions in JPEG images, under the hypothesis that the tampered image presents a double …

An improvised CNN model for fake image detection

Y Hamid, S Elyassami, Y Gulzar… - International Journal of …, 2023 - Springer
The last decade has witnessed a multifold growth of image data courtesy of the emergence
of social networking services like Facebook, Instagram, LinkedIn etc. The major menace …

Detection of nonaligned double JPEG compression based on integer periodicity maps

T Bianchi, A Piva - IEEE transactions on Information Forensics …, 2011 - ieeexplore.ieee.org
In this paper, a simple yet reliable algorithm to detect the presence of nonaligned double
JPEG compression (NA-JPEG) in compressed images is proposed. The method evaluates a …

A bibliography on blind methods for identifying image forgery

B Mahdian, S Saic - Signal Processing: Image Communication, 2010 - Elsevier
Verifying the integrity of digital images and detecting the traces of tampering without using
any protecting pre-extracted or pre-embedded information have become an important and …

Digital image authentication from JPEG headers

E Kee, MK Johnson, H Farid - IEEE transactions on information …, 2011 - ieeexplore.ieee.org
It is often desirable to determine if an image has been modified in any way from its original
recording. The JPEG format affords engineers many implementation trade-offs which give …

[HTML][HTML] Recent advances in passive digital image security forensics: A brief review

X Lin, JH Li, SL Wang, F Cheng, XS Huang - Engineering, 2018 - Elsevier
With the development of sophisticated image editing and manipulation tools, the originality
and authenticity of a digital image is usually hard to determine visually. In order to detect …