Digital image integrity–a survey of protection and verification techniques

P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …

[HTML][HTML] Recent advances in passive digital image security forensics: A brief review

X Lin, JH Li, SL Wang, F Cheng, XS Huang - Engineering, 2018 - Elsevier
With the development of sophisticated image editing and manipulation tools, the originality
and authenticity of a digital image is usually hard to determine visually. In order to detect …

Privacy-preserving TPE-based JPEG image retrieval in cloud-assisted internet of things

Y Ma, X Chai, Z Gan, Y Zhang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the large-scale deployment of the Internet of Things (IoT), lots of images are generated
and outsourced to the cloud to alleviate storage burdens. Encrypted image retrieval has …

Aligned and non-aligned double JPEG detection using convolutional neural networks

M Barni, L Bondi, N Bonettini, P Bestagini… - Journal of Visual …, 2017 - Elsevier
Due to the wide diffusion of JPEG coding standard, the image forensic community has
devoted significant attention to the development of double JPEG (DJPEG) compression …

Multi-task SE-network for image splicing localization

Y Zhang, G Zhu, L Wu, S Kwong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Image splicing can be easily used for illegal activities such as falsifying propaganda for
political purposes and reporting false news, which may result in negative impacts on society …

[HTML][HTML] Robust data hiding method based on frequency coefficient variance in repetitive compression

S Solak, AM Abdirashid, A Adjevi, AK Sahu - Engineering Science and …, 2024 - Elsevier
Sharing accurate and lossless images with higher quality through digital mediums is
challenging, particularly, images shared on social media platforms can serve as good …

JPEG quantization step estimation and its applications to digital image forensics

TH Thai, R Cogranne, F Retraint - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The goal of this paper is to propose an accurate method for estimating quantization steps
from an image that has been previously JPEG-compressed and stored in lossless format …

Improving the robustness of adaptive steganographic algorithms based on transport channel matching

Z Zhao, Q Guan, H Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Moving steganography and steganalysis from the laboratory into the real world, the
robustness of steganography needs to be further considered. In this paper, we propose a …

Feature pyramid network for diffusion-based image inpainting detection

Y Zhang, F Ding, S Kwong, G Zhu - Information Sciences, 2021 - Elsevier
Inpainting is a technique that can be employed to tamper with the content of images. In this
paper, we propose a novel forensics analysis method for diffusion-based image inpainting …

Detecting double JPEG compressed color images with the same quantization matrix in spherical coordinates

J Wang, H Wang, J Li, X Luo, YQ Shi… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Detection of double Joint Photographic Experts Group (JPEG) compression is an important
part of image forensics. Although methods in the past studies have been presented for …