Digital Image Processing
Object Recognition from Local Scale-Invariant Features
ICCV '99 Proceedings of the International Conference on Computer Vision-Volume 2 - Volume 2
Multiple embedding using robust watermarks for wireless medical images
Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia
A survey of watermarking algorithms for image authentication
EURASIP Journal on Applied Signal Processing
Image tampering detection using Bayer interpolation and JPEG compression
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Accurate detection of demosaicing regularity for digital image forensics
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Imaging sensor noise as digital X-ray for revealing forgeries
IH'07 Proceedings of the 9th international conference on Information hiding
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Exposing digital forgeries in color filter array interpolated images
IEEE Transactions on Signal Processing - Part II
Digital camera identification from sensor pattern noise
IEEE Transactions on Information Forensics and Security
Determining Image Origin and Integrity Using Sensor Noise
IEEE Transactions on Information Forensics and Security
Nonintrusive Component Forensics of Visual Sensors Using Output Images
IEEE Transactions on Information Forensics and Security
Hiding Traces of Resampling in Digital Images
IEEE Transactions on Information Forensics and Security
Multipurpose watermarking for image authentication and protection
IEEE Transactions on Image Processing
A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery
IEEE Transactions on Information Forensics and Security - Part 2
Hi-index | 0.00 |
Today, many digital forensic techniques for digital images are developed to serve the purpose of the origin identification and integrity verification for security reasons. Generally speaking, these methods can be divided into two classes, the methods based on the extracted features, which are usually the high frequency noise inside the investigating images and the methods based on the contents of the images. Different techniques may be developed specially against different forging attacks, while be vulnerable to other malicious manipulations on the images. This paper reviews the most popular techniques in order to help the user to understand the techniques and find the most proper methods for variety forensic purpose in different situations.