An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

A review of digital image forensics

WD Ferreira, CBR Ferreira, G da Cruz Júnior… - Computers & Electrical …, 2020 - Elsevier
The manipulation of digital images has become very common in recent years. Thus, it is
possible to cut, clone, and resize an image very quickly, which makes it challenging to …

Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluation

P Sharma, M Kumar, H Sharma - Multimedia Tools and Applications, 2023 - Springer
The digital image proves critical evidence in the fields like forensic investigation, criminal
investigation, intelligence systems, medical imaging, insurance claims, and journalism to …

A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions

ST Nabi, M Kumar, P Singh, N Aggarwal, K Kumar - Multimedia Systems, 2022 - Springer
With the advent of Internet, images and videos are the most vulnerable media that can be
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …

Efficient source camera identification with diversity-enhanced patch selection and deep residual prediction

Y Liu, Z Zou, Y Yang, NFB Law, AA Bharath - Sensors, 2021 - mdpi.com
Source camera identification has long been a hot topic in the field of image forensics.
Besides conventional feature engineering algorithms developed based on studying the …

Machine learning in digital forensics: a systematic literature review

T Nayerifard, H Amintoosi, AG Bafghi… - arXiv preprint arXiv …, 2023 - arxiv.org
Development and exploitation of technology have led to the further expansion and
complexity of digital crimes. On the other hand, the growing volume of data and …

A PUF-based data-device hash for tampered image detection and source camera identification

Y Zheng, Y Cao, CH Chang - IEEE Transactions on information …, 2019 - ieeexplore.ieee.org
With the increasing prevalent of digital devices and their abuse for digital content creation,
forgeries of digital images and video footage are more rampant than ever. Digital forensics is …

A width-growth model with subnetwork nodes and refinement structure for representation learning and image classification

W Zhang, QMJ Wu, Y Yang, T Akilan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article presents a new supervised multilayer subnetwork-based feature refinement and
classification model for representation learning. The novelties of this algorithm are as …

A study on source device attribution using still images

S Gupta, N Mohan, M Kumar - Archives of Computational Methods in …, 2021 - Springer
Images are acquired and stored digitally these days. Image forensics is a science which is
concerned with revealing the underlying facts about an image. The universal approaches …

Source camera model identification based on convolutional neural networks with local binary patterns coding

B Wang, J Yin, S Tan, Y Li, M Li - Signal Processing: Image Communication, 2018 - Elsevier
Source camera model identification has always been one of the main fields of digital image
forensics since it is the foundation of solving a wide range of forensic problems. Several …