The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
Digital image processing: principles and applications
Digital image processing: principles and applications
Exposing digital forgeries in video by detecting double quantization
Proceedings of the 11th ACM workshop on Multimedia and security
IEEE Spectrum
Exposing photo manipulation with inconsistent reflections
ACM Transactions on Graphics (TOG)
Detection of Copy-Create Image Forgery Using Luminance Level Techniques
NCVPRIPG '11 Proceedings of the 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics
Exposing digital forgeries by detecting traces of resampling
IEEE Transactions on Signal Processing
Digital Image Authentication From JPEG Headers
IEEE Transactions on Information Forensics and Security - Part 2
Hi-index | 0.00 |
Digital Photo images are everywhere, on the covers of magazines, in newspapers, in courtrooms, and all over the Internet. We are exposed to them throughout the day and most of the time. Ease with which images can be manipulated, we need to be aware that seeing does not always imply believing. We propose methodologies to identify such unbelievable photo images and succeeded to identify forged region by given only the forged image. Formats are additive tag for every file system and contents are relatively expressed with extension based on most popular digital camera uses JPEG and Other image formats like png, bmp etc. We have designed algorithm running behind with the concept of abnormal anomalies and identify the forgery regions.