The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
JPEG Still Image Data Compression Standard
JPEG Still Image Data Compression Standard
Psychovisual and Statistical Optimization of Quantization Tables for DCT Compression Engines
ICIAP '01 Proceedings of the 11th International Conference on Image Analysis and Processing
Digital Image Processing (3rd Edition)
Digital Image Processing (3rd Edition)
Color features comparison for retrieval in personal photo collections
ACS'08 Proceedings of the 8th conference on Applied computer scince
Adobe Photoshop Forensics
Exposing digital forgeries from JPEG ghosts
IEEE Transactions on Information Forensics and Security
Detecting doctored JPEG images via DCT coefficient analysis
ECCV'06 Proceedings of the 9th European conference on Computer Vision - Volume Part III
A bibliography on blind methods for identifying image forgery
Image Communication
Crop detection through blocking artefacts analysis
ICIAP'11 Proceedings of the 16th international conference on Image analysis and processing: Part I
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
A comparative analysis of forgery detection algorithms
SSPR'12/SPR'12 Proceedings of the 2012 Joint IAPR international conference on Structural, Syntactic, and Statistical Pattern Recognition
Moment feature based forensic detection of resampled digital images
Proceedings of the 21st ACM international conference on Multimedia
Hi-index | 0.00 |
One of the key characteristics of digital images with a discrete representation is its pliability to manipulation. Recent trends in the field of unsupervised detection of digital forgery includes several advanced strategies devoted to reveal anomalies just considering several aspects of multimedia content. One of the promising approach, among others, considers the possibility to exploit the statistical distribution of DCT coefficients in order to reveal the irregularities due to the presence of a superimposed signal over the original one (e.g., copy and paste). As recently proved the ratio between the quantization tables used to compress the signal before and after the malicious forgery alter the histograms of the DCT coefficients especially for some basis that are close in terms of frequency content. In this work we analyze in more details the performances of existing approaches evaluating their effectiveness by making use of different input datasets with respect to resolution size, compression ratio and just considering different kind of forgeries (e.g., presence of duplicate regions or images composition). We also present possible post-processing techniques able to manipulate the forged image just to reduce the performance of the current state-of-art solution. Finally we conclude the papers providing future improvements devoted to increase robustness and reliability of forgery detection into DCT domain.