Registration of Translated and Rotated Images Using Finite Fourier Transforms
IEEE Transactions on Pattern Analysis and Machine Intelligence
Proceedings of the 25th annual conference on Computer graphics and interactive techniques
Normalized Cuts and Image Segmentation
IEEE Transactions on Pattern Analysis and Machine Intelligence
Detecting LSB Steganography in Color and Gray-Scale Images
IEEE MultiMedia
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Detecting Doctored Images Using Camera Response Normality and Consistency
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
Exposing digital forgeries by detecting inconsistencies in lighting
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Image completion with structure propagation
ACM SIGGRAPH 2005 Papers
Digital Image Processing (3rd Edition)
Digital Image Processing (3rd Edition)
Physics-motivated features for distinguishing photographic images and computer graphics
Proceedings of the 13th annual ACM international conference on Multimedia
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
Exposing digital forgeries in scientific images
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Image steganalysis with binary similarity measures
EURASIP Journal on Applied Signal Processing
Exposing digital forgeries in video by detecting duplication
Proceedings of the 9th workshop on Multimedia & security
A natural image model approach to splicing detection
Proceedings of the 9th workshop on Multimedia & security
The ultimate steganalysis benchmark?
Proceedings of the 9th workshop on Multimedia & security
Can we trust digital image forensics?
Proceedings of the 15th international conference on Multimedia
Weighted Stego-Image Steganalysis for JPEG Covers
Information Hiding
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Digital video forensics
Progressive randomization: Seeing the unseen
Computer Vision and Image Understanding
Exposing digital forgeries through specular highlights on the eye
IH'07 Proceedings of the 9th international conference on Information hiding
Imaging sensor noise as digital X-ray for revealing forgeries
IH'07 Proceedings of the 9th international conference on Information hiding
Radiometric calibration from a single image
CVPR'04 Proceedings of the 2004 IEEE computer society conference on Computer vision and pattern recognition
Towards multi-class blind steganalyzer for JPEG images
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
Statistical tools for digital forensics
IH'04 Proceedings of the 6th international conference on Information Hiding
Detecting doctored JPEG images via DCT coefficient analysis
ECCV'06 Proceedings of the 9th European conference on Computer Vision - Volume Part III
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Exposing digital forgeries by detecting traces of resampling
IEEE Transactions on Signal Processing
How realistic is photorealistic?
IEEE Transactions on Signal Processing
Exposing digital forgeries in color filter array interpolated images
IEEE Transactions on Signal Processing - Part II
Exposing Digital Forgeries in Complex Lighting Environments
IEEE Transactions on Information Forensics and Security - Part 1
Exposing Digital Forgeries in Interlaced and Deinterlaced Video
IEEE Transactions on Information Forensics and Security - Part 1
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Digital camera identification from sensor pattern noise
IEEE Transactions on Information Forensics and Security
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
IEEE Transactions on Information Forensics and Security
Mission impossible? [FBI computer network]
IEEE Spectrum
Listening in [electronic spying]
IEEE Spectrum
IEEE Spectrum
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Steganalysis using image quality metrics
IEEE Transactions on Image Processing
Detecting non-stereoscopic to stereoscopic image splicing with the use of disparity maps
Proceedings of the South African Institute of Computer Scientists and Information Technologists Conference on Knowledge, Innovation and Leadership in a Diverse, Multidisciplinary Environment
Exploring heuristic and optimum branching algorithms for image phylogeny
Journal of Visual Communication and Image Representation
A novel video inter-frame forgery model detection scheme based on optical flow consistency
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Journal of Visual Communication and Image Representation
On the reliability of forensic schemes using resampling for image copy-move forgery
International Journal of Electronic Security and Digital Forensics
Open set source camera attribution and device linking
Pattern Recognition Letters
Hi-index | 0.00 |
Digital images are everywhere—from our cell phones to the pages of our online news sites. How we choose to use digital image processing raises a surprising host of legal and ethical questions that we must address. What are the ramifications of hiding data within an innocent image? Is this an intentional security practice when used legitimately, or intentional deception? Is tampering with an image appropriate in cases where the image might affect public behavior? Does an image represent a crime, or is it simply a representation of a scene that has never existed? Before action can even be taken on the basis of a questionable image, we must detect something about the image itself. Investigators from a diverse set of fields require the best possible tools to tackle the challenges presented by the malicious use of today's digital image processing techniques. In this survey, we introduce the emerging field of digital image forensics, including the main topic areas of source camera identification, forgery detection, and steganalysis. In source camera identification, we seek to identify the particular model of a camera, or the exact camera, that produced an image. Forgery detection's goal is to establish the authenticity of an image, or to expose any potential tampering the image might have undergone. With steganalysis, the detection of hidden data within an image is performed, with a possible attempt to recover any detected data. Each of these components of digital image forensics is described in detail, along with a critical analysis of the state of the art, and recommendations for the direction of future research.