Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Toward real text manipulation detection: New dataset and new solution
AbstractWith the surge in realistic text tampering, detecting fraudulent text in images has gained prominence for maintaining information security. However, the high costs associated with professional text manipulation and annotation limit the ...
Highlights- A new dataset for text manipulation detection with diverse handcraft manipulations
- An asymmetric dual-stream baseline framework to exploit different transformed domains
- An aggregation hub and a fusion module for efficient multi-...
- ArticleAugust 2023
ICDAR 2023 Competition on Detecting Tampered Text in Images
- Dongliang Luo,
- Yu Zhou,
- Rui Yang,
- Yuliang Liu,
- Xianjin Liu,
- Jishen Zeng,
- Enming Zhang,
- Biao Yang,
- Ziming Huang,
- Lianwen Jin,
- Xiang Bai
Document Analysis and Recognition - ICDAR 2023Pages 587–600https://doi.org/10.1007/978-3-031-41679-8_36AbstractDocument analysis and recognition techniques are evolving quickly and have been widely used in real-world applications. However, detecting tampered text in images is rarely studied. Existing image forensics research mainly focuses on detecting ...
- research-articleMay 2020
Upscaling factor estimation on double JPEG compressed images
Multimedia Tools and Applications (MTAA), Volume 79, Issue 19-20Pages 12891–12914https://doi.org/10.1007/s11042-019-08519-8AbstractResampling detection is one of the most important topics in image forensics. Some methods can even estimate the resampling factors. However, it remains a challenge on the post-compressed images because the JPEG compression destroys the statistical ...
- research-articleMay 2020
Forensics of visual privacy protection in digital images
Multimedia Tools and Applications (MTAA), Volume 79, Issue 17-18Pages 12427–12445https://doi.org/10.1007/s11042-019-08304-7AbstractVisual privacy protection (VPP) is to protect individual’s privacy information in digital images or videos against being seen, such as portrait etc. Once being protected, the privacy may be imperceptible. Forensics of visual privacy protection is ...
- research-articleMarch 2020
Downscaling Factor Estimation on Pre-JPEG Compressed Images
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 30, Issue 3Pages 618–631https://doi.org/10.1109/TCSVT.2019.2893353Resampling detection is one of the most important topics in image forensics, and the most widely used method in resampling detection is spectral analysis. Since JPEG is the most widely used image format, it is reasonable that the resampling operation is ...
- articleJune 2019
Efficient halftone image steganography based on dispersion degree optimization
Journal of Real-Time Image Processing (SPJRTIP), Volume 16, Issue 3Pages 601–609https://doi.org/10.1007/s11554-018-0822-8Halftone images are usually used in facsimile and halftone image steganography can be used for facsimile channel. In recent years, real-time image processing becomes more and more important. In this paper, an efficient block-based steganographic method ...
- articleApril 2019
Scaling factor estimation on JPEG compressed images by cyclostationarity analysis
Multimedia Tools and Applications (MTAA), Volume 78, Issue 7Pages 7947–7964https://doi.org/10.1007/s11042-018-6411-9Scaling factor estimation is one of the most important topics in image forensics. The existing methods mainly employ the peak of the Fourier spectrum of the variance on image difference to detect the scaling factor. However, when the image is compressed,...
- research-articleAugust 2018
Binary image steganalysis based on local texture pattern
Journal of Visual Communication and Image Representation (JVCIR), Volume 55, Issue CPages 149–156https://doi.org/10.1016/j.jvcir.2018.06.004AbstractIn this paper, we propose a novel steganalytic scheme based on local texture pattern (LTP) to detect binary image steganography. We first assess how the expanded LTPs capture embedding distortions exactly. Considering curse of ...