Exposing digital forgeries by detecting inconsistencies in lighting
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Exposing digital forgeries in scientific images
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Exposing digital forgeries in video by detecting double MPEG compression
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Exposing digital forgeries through chromatic aberration
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Calibration and removal of lateral chromatic aberration in images
Pattern Recognition Letters
Can we trust digital image forensics?
Proceedings of the 15th international conference on Multimedia
An interpolation-based watermarking scheme
Signal Processing
Detecting fake images using watermarks and support vector machines
Computer Standards & Interfaces
Image tampering detection using Bayer interpolation and JPEG compression
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Image authentication using added signal-dependent noise
Research Letters in Signal Processing
Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue
Proceedings of the 10th ACM workshop on Multimedia and security
Information Hiding
Detecting Photographic Composites of People
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Additive spread-spectrum watermark detection in demosaicked images
Proceedings of the 11th ACM workshop on Multimedia and security
Detection of seam carving and localization of seam insertions in digital images
Proceedings of the 11th ACM workshop on Multimedia and security
Multimedia Forensics Is Not Computer Forensics
IWCF '09 Proceedings of the 3rd International Workshop on Computational Forensics
A Survey of Passive Image Tampering Detection
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis
ICIAP '09 Proceedings of the 15th International Conference on Image Analysis and Processing
Fast copy-move forgery detection
WSEAS Transactions on Signal Processing
Scanner identification using feature-based processing and analysis
IEEE Transactions on Information Forensics and Security
Exposing digital forgeries from JPEG ghosts
IEEE Transactions on Information Forensics and Security
Intrinsic sensor noise features for forensic analysis on scanners and scanned images
IEEE Transactions on Information Forensics and Security
Accurate detection of demosaicing regularity for digital image forensics
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Tamper hiding: defeating image forensics
IH'07 Proceedings of the 9th international conference on Information hiding
Imaging sensor noise as digital X-ray for revealing forgeries
IH'07 Proceedings of the 9th international conference on Information hiding
Image tamper detection based on demosaicing artifacts
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Source camera identification using enahnced sensor pattern noise
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Source camera identification using enhanced sensor pattern noise
IEEE Transactions on Information Forensics and Security
A bibliography on blind methods for identifying image forgery
Image Communication
Estimating vignetting function from a single image for image authentication
Proceedings of the 12th ACM workshop on Multimedia and security
Forensic detection of image manipulation using statistical intrinsic fingerprints
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Building fingerprints with information from three color bands for source camera identification
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Detection of quantization artifacts and its applications to transform encoder identification
IEEE Transactions on Information Forensics and Security
Camera response functions for image forensics: an automatic algorithm for splicing detection
IEEE Transactions on Information Forensics and Security
Region duplication detection using image feature matching
IEEE Transactions on Information Forensics and Security
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications
Detecting digital image splicing in chroma spaces
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Tampered region localization of digital color images based on JPEG compression noise
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Digital Image Forgery Detection Based on Lens and Sensor Aberration
International Journal of Computer Vision
Revealing digital fakery using multiresolution decomposition and higher order statistics
Engineering Applications of Artificial Intelligence
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
A passive image authentication scheme for detecting region-duplication forgery with rotation
Journal of Network and Computer Applications
CFA pattern identification of digital cameras using intermediate value counting
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
A robust approach to detect tampering by exploring correlation patterns
CAIP'11 Proceedings of the 14th international conference on Computer analysis of images and patterns - Volume Part II
Who clicks there!: anonymising the photographer in a camera saturated society
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Exposing photo manipulation with inconsistent reflections
ACM Transactions on Graphics (TOG)
Detecting doctored JPEG images via DCT coefficient analysis
ECCV'06 Proceedings of the 9th European conference on Computer Vision - Volume Part III
Classification of digital camera-models based on demosaicing artifacts
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A survey of forensic characterization methods for physical devices
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A comprehensive study on third order statistical features for image splicing detection
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Robust evidence detection of copy-rotate-move forgery in image based on singular value decomposition
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
A forgery detection algorithm for exemplar-based inpainting images using multi-region relation
Image and Vision Computing
Digital Image Authentication: A Review
International Journal of Digital Library Systems
A Survey of Digital Forensic Techniques for Digital Libraries
International Journal of Digital Library Systems
Robustness of color interpolation identification against anti-forensic operations
IH'12 Proceedings of the 14th international conference on Information Hiding
Expert Systems with Applications: An International Journal
Journal of Visual Communication and Image Representation
Open set source camera attribution and device linking
Pattern Recognition Letters
Hi-index | 0.00 |
With the advent of low-cost and high-resolution digital cameras, and sophisticated photo editing software, digital images can be easily manipulated and altered. Although good forgeries may leave no visual clues of having been tampered with, they may, nevertheless, alter the underlying statistics of an image. Most digital cameras, for example, employ a single sensor in conjunction with a color filter array (CFA), and then interpolate the missing color samples to obtain a three channel color image. This interpolation introduces specific correlations which are likely to be destroyed when tampering with an image. We quantify the specific correlations introduced by CFA interpolation, and describe how these correlations, or lack thereof, can be automatically detected in any portion of an image. We show the efficacy of this approach in revealing traces of digital tampering in lossless and lossy compressed color images interpolated with several different CFA algorithms.