Discrete-time signal processing
Discrete-time signal processing
The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
Digital watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Reading between the lines: lessons from the SDMI challenge
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Blind inverse gamma correction
IEEE Transactions on Image Processing
Exposing digital forgeries in video by detecting double MPEG compression
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Detecting fake images using watermarks and support vector machines
Computer Standards & Interfaces
Image tampering detection using Bayer interpolation and JPEG compression
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Detecting digital audio forgeries by checking frame offsets
Proceedings of the 10th ACM workshop on Multimedia and security
Exposing digital forgeries in video by detecting double quantization
Proceedings of the 11th ACM workshop on Multimedia and security
Detection of seam carving and localization of seam insertions in digital images
Proceedings of the 11th ACM workshop on Multimedia and security
A Survey of Passive Image Tampering Detection
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Design and deployment of a digital forensics service platform for online videos
MiFor '09 Proceedings of the First ACM workshop on Multimedia in forensics
IVForensic: a digital forensics service platform for internet videos
MM '09 Proceedings of the 17th ACM international conference on Multimedia
Exposing digital forgeries from JPEG ghosts
IEEE Transactions on Information Forensics and Security
Digital image source coder forensics via intrinsic fingerprints
IEEE Transactions on Information Forensics and Security
The 'Dresden Image Database' for benchmarking digital image forensics
Proceedings of the 2010 ACM Symposium on Applied Computing
Watermark-based digital fake image detection
International Journal of Computer Applications in Technology
Linear row and column predictors for the analysis of resized images
Proceedings of the 12th ACM workshop on Multimedia and security
FLD-based detection of re-compressed speech signals
Proceedings of the 12th ACM workshop on Multimedia and security
Forensic detection of image manipulation using statistical intrinsic fingerprints
IEEE Transactions on Information Forensics and Security
Detecting double JPEG compression with the same quantization matrix
IEEE Transactions on Information Forensics and Security
Region duplication detection using image feature matching
IEEE Transactions on Information Forensics and Security
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Tampered region localization of digital color images based on JPEG compression noise
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Revealing digital fakery using multiresolution decomposition and higher order statistics
Engineering Applications of Artificial Intelligence
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
Exposing image forgery with blind noise estimation
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Image fakery and neural network based detection
ISNN'06 Proceedings of the Third international conference on Advnaces in Neural Networks - Volume Part II
Detecting doctored JPEG images via DCT coefficient analysis
ECCV'06 Proceedings of the 9th European conference on Computer Vision - Volume Part III
Homomorphic signatures for digital photographs
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Exposing MP3 audio forgeries using frame offsets
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on Multimedia Security
Median filtering detection using edge based prediction matrix
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Blind detection of digital forgery image based on the edge width
IScIDE'11 Proceedings of the Second Sino-foreign-interchange conference on Intelligent Science and Intelligent Data Engineering
Detection of doctored images using correlations of PSF
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
Detection and classification of double compressed MP3 audio tracks
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.01 |
A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longer hold the unique stature as a definitive recording of events. We describe several statistical techniques for detecting traces of digital tampering in the absence of any digital watermark or signature. In particular, we quantify statistical correlations that result from specific forms of digital tampering, and devise detection schemes to reveal these correlations.