Diallo et al., 2019 - Google Patents
Improving robustness of image tampering detection for compressionDiallo et al., 2019
View PDF- Document ID
- 15145918716770965429
- Author
- Diallo B
- Urruty T
- Bourdon P
- Fernandez-Maloigne C
- Publication year
- Publication venue
- MultiMedia Modeling: 25th International Conference, MMM 2019, Thessaloniki, Greece, January 8–11, 2019, Proceedings, Part I 25
External Links
Snippet
The task of verifying the originality and authenticity of images puts numerous constraints on tampering detection algorithms. Since most images are acquired on the internet, there is a significant probability that they have undergone transformations such as compression …
- 238000001514 detection method 0 title abstract description 43
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/52—Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
- G06K9/527—Scale-space domain transformation, e.g. with wavelet analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10024—Color image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Walia et al. | Digital image forgery detection: a systematic scrutiny | |
Meena et al. | Image forgery detection: survey and future directions | |
Zanardelli et al. | Image forgery detection: a survey of recent deep-learning approaches | |
Qazi et al. | Survey on blind image forgery detection | |
Sharma et al. | Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluation | |
Armas Vega et al. | Copy-move forgery detection technique based on discrete cosine transform blocks features | |
Bharti et al. | A survey of image forgery detection techniques | |
Kaur et al. | Image forgery techniques: a review | |
Diallo et al. | Improving robustness of image tampering detection for compression | |
Amerini et al. | Deep learning for multimedia forensics | |
Liu et al. | Image deblocking detection based on a convolutional neural network | |
Itier et al. | Color noise correlation-based splicing detection for image forensics | |
Meena et al. | Image splicing forgery detection techniques: A review | |
Isaac et al. | Multiscale local gabor phase quantization for image forgery detection | |
Du et al. | Towards face presentation attack detection based on residual color texture representation | |
Li et al. | Recaptured screen image identification based on vision transformer | |
Prabakar et al. | Hybrid deep learning model for copy move image forgery detection | |
Nataraj et al. | Seam carving detection and localization using two-stage deep neural networks | |
Singhal et al. | Passive authentication image forgery detection using multilayer cnn | |
Shukla et al. | A survey on digital image forensic methods based on blind forgery detection | |
Thakur et al. | Design of Semantic Segmentation Algorithm to Classify Forged Pixels | |
Chaitra et al. | Digital image forgery: taxonomy, techniques, and tools–a comprehensive study | |
Long et al. | Face morphing detection based on a two-stream network with channel attention and residual of multiple color spaces | |
Remy et al. | Comparative Compression Robustness Evaluation of Digital Image Forensics | |
Iseed et al. | Forensic approach for distinguishing between source and destination regions in copy-move forgery |