The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
Exposing digital forgeries by detecting inconsistencies in lighting
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Exposing digital forgeries through chromatic aberration
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Exposing digital forgeries through specular highlights on the eye
IH'07 Proceedings of the 9th international conference on Information hiding
Statistical tools for digital forensics
IH'04 Proceedings of the 6th international conference on Information Hiding
Detecting doctored JPEG images via DCT coefficient analysis
ECCV'06 Proceedings of the 9th European conference on Computer Vision - Volume Part III
Exposing digital forgeries by detecting traces of resampling
IEEE Transactions on Signal Processing
Exposing digital forgeries in color filter array interpolated images
IEEE Transactions on Signal Processing - Part II
Exposing Digital Forgeries in Complex Lighting Environments
IEEE Transactions on Information Forensics and Security - Part 1
Detection of seam carving and localization of seam insertions in digital images
Proceedings of the 11th ACM workshop on Multimedia and security
A Survey of Passive Image Tampering Detection
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Digital forgery estimation into DCT domain: a critical analysis
MiFor '09 Proceedings of the First ACM workshop on Multimedia in forensics
A bibliography on blind methods for identifying image forgery
Image Communication
JPEG error analysis and its applications to digital image forensics
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Detecting and extracting the photo composites using planar homography and graph cut
IEEE Transactions on Information Forensics and Security
Detecting double JPEG compression with the same quantization matrix
IEEE Transactions on Information Forensics and Security
Scene illumination as an indicator of image manipulation
IH'10 Proceedings of the 12th international conference on Information hiding
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications
Passive detection of paint-doctored JPEG images
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Robust copy-move image forgery detection using undecimated wavelets and Zernike moments
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
A robust approach to detect tampering by exploring correlation patterns
CAIP'11 Proceedings of the 14th international conference on Computer analysis of images and patterns - Volume Part II
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Markovian rake transform for digital image tampering detection
Transactions on data hiding and multimedia security VI
Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Blind detection of digital forgery image based on the edge width
IScIDE'11 Proceedings of the Second Sino-foreign-interchange conference on Intelligent Science and Intelligent Data Engineering
A fuzzy approach to deal with uncertainty in image forensics
Image Communication
Rapid image splicing detection based on relevance vector machine
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person's head onto another person's body. If these images were originally of different JPEG compression quality, then the digital composite may contain a trace of the original compression qualities. To this end, we describe a tfchnique to detect whether the part of an image was initially compressed at a lower quality than the rest of the image. This approach is applicable to images of high and low quality as well as resolution.