Digital image integrity–a survey of protection and verification techniques

P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …

Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection

B Bayar, MC Stamm - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Identifying the authenticity and processing history of an image is an important task in
multimedia forensics. By analyzing traces left by different image manipulations, researchers …

A deep learning approach to universal image manipulation detection using a new convolutional layer

B Bayar, MC Stamm - Proceedings of the 4th ACM workshop on …, 2016 - dl.acm.org
When creating a forgery, a forger can modify an image using many different image editing
operations. Since a forensic examiner must test for each of these, significant interest has …

Robust detection of image operator chain with two-stream convolutional neural network

X Liao, K Li, X Zhu, KJR Liu - IEEE Journal of Selected Topics …, 2020 - ieeexplore.ieee.org
Many forensic techniques have recently been developed to determine whether an image
has undergone a specific manipulation operation. When multiple consecutive operations are …

Fake faces identification via convolutional neural network

H Mo, B Chen, W Luo - Proceedings of the 6th ACM workshop on …, 2018 - dl.acm.org
Generative Adversarial Network (GAN) is a prominent generative model that are widely used
in various applications. Recent studies have indicated that it is possible to obtain fake face …

Multi-scale analysis strategies in PRNU-based tampering localization

P Korus, J Huang - IEEE Transactions on Information Forensics …, 2016 - ieeexplore.ieee.org
Accurate unsupervised tampering localization is one of the most challenging problems in
digital image forensics. In this paper, we consider a photo response non-uniformity analysis …

The ALASKA steganalysis challenge: A first step towards steganalysis

R Cogranne, Q Giboulot, P Bas - Proceedings of the ACM Workshop on …, 2019 - dl.acm.org
This paper presents ins and outs of the ALASKA challenge, a steganalysis challenge built to
reflect the constraints of a forensic steganalyst. We motivate and explain the main …

Identification of various image operations using residual-based features

H Li, W Luo, X Qiu, J Huang - … on Circuits and Systems for Video …, 2016 - ieeexplore.ieee.org
Image forensics has attracted wide attention during the past decade. However, most existing
works aim at detecting a certain operation, which means that their proposed features usually …

Automatic detection of object-based forgery in advanced video

S Chen, S Tan, B Li, J Huang - IEEE Transactions on Circuits …, 2015 - ieeexplore.ieee.org
Passive multimedia forensics has become an active topic in recent years. However, less
attention has been paid to video forensics. Research on video forensics, and especially on …

[PDF][PDF] Design principles of convolutional neural networks for multimedia forensics

B Bayar, MC Stamm - Electronic Imaging, 2017 - library.imaging.org
Convolutional neural networks (CNNs) have received significant attention due to their ability
to adaptively learn classification features directly from data. While CNNs have helped cause …