Multi-scale analysis strategies in PRNU-based tampering localization

P Korus, J Huang - IEEE Transactions on Information Forensics …, 2016 - ieeexplore.ieee.org
Accurate unsupervised tampering localization is one of the most challenging problems in
digital image forensics. In this paper, we consider a photo response non-uniformity analysis …

A tutorial review on entropy-based handcrafted feature extraction for information fusion

RC Guido - Information Fusion, 2018 - Elsevier
Entropy (H) is the main subject of this article, concisely written to serve as a tutorial
introducing two feature extraction (FE) methods for usage in digital signal processing (DSP) …

Image forgery localization based on multi-scale convolutional neural networks

Y Liu, Q Guan, X Zhao, Y Cao - Proceedings of the 6th ACM workshop on …, 2018 - dl.acm.org
In this paper, we propose to utilize Convolutional Neural Networks (CNNs) and the
segmentation-based multi-scale analysis to locate tampered areas in digital images. First, to …

Image forgery localization via integrating tampering possibility maps

H Li, W Luo, X Qiu, J Huang - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Over the past decade, many efforts have been made in passive image forensics. Although it
is able to detect tampered images at high accuracies based on some carefully designed …

A PUF-based data-device hash for tampered image detection and source camera identification

Y Zheng, Y Cao, CH Chang - IEEE Transactions on information …, 2019 - ieeexplore.ieee.org
With the increasing prevalent of digital devices and their abuse for digital content creation,
forgeries of digital images and video footage are more rampant than ever. Digital forensics is …

[PDF][PDF] Development of photo forensics algorithm by detecting photoshop manipulation using error level analysis

TS Gunawan, SAM Hanafiah, M Kartiwi… - Indonesian Journal of …, 2017 - academia.edu
Nowadays, image manipulation is common due to the availability of image processing
software, such as Adobe Photoshop or GIMP. The original image captured by digital camera …

Image forgery detection and localization via a reliability fusion map

H Yao, M Xu, T Qiao, Y Wu, N Zheng - Sensors, 2020 - mdpi.com
Moving away from hand-crafted feature extraction, the use of data-driven convolution neural
network (CNN)-based algorithms facilitates the realization of end-to-end automated forgery …

Optimal semi-fragile watermarking based on maximum entropy random walk and swin transformer for tamper localization

P Aberna, L Agilandeeswari - IEEE Access, 2024 - ieeexplore.ieee.org
In the multimedia arena, image tampering is an uncontrollable process that necessitates
content authentication and tamper detection in a variety of applications. One method that is …

Markov chains with maximum entropy for robotic surveillance

M George, S Jafarpour, F Bullo - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper provides a comprehensive analysis of the following optimization problem:
Maximize the entropy rate generated by a Markov chain over a connected graph of order n …

Non-backtracking centrality based random walk on networks

Y Lin, Z Zhang - The Computer Journal, 2019 - academic.oup.com
Random walks are a fundamental tool for analyzing realistic complex networked systems
and implementing randomized algorithms to solve diverse problems such as searching and …