Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Digital image source coder forensics via intrinsic fingerprints
IEEE Transactions on Information Forensics and Security
Detection of quantization artifacts and its applications to transform encoder identification
IEEE Transactions on Information Forensics and Security
Identification of bitmap compression history: JPEG detection and quantizer estimation
IEEE Transactions on Image Processing
Analysis of non-aligned double JPEG artifacts for the localization of image forgeries
WIFS '11 Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security
Hi-index | 0.00 |
The extensive use of multimedia editing tools suitable for non-skilled users has significantly reduced the trust on audiovisual contents. Simultaneously, a new branch of multimedia security, named multimedia forensics, has been developed to cope with this problem. Nevertheless, most of the schemes proposed so far are heuristic and ad-hoc solutions that try to deal with a particular signal processing operator (or a simple combination of them). In a previous work by the authors, fundamental limits to forensics applications are provided, based on the use of two well-known measures, originated at the detection and information theory fields. In the current work the suitability of those measures for establishing the topology and ordering of the operator chain a multimedia content has gone through is illustrated. The provided results show that in general different operator chains can be distinguished, although in some particular cases (e.g., comparison between double and triple quantization) the considered operator chains can be completely indistinguishable.