Academic literature on the topic 'Image tamperings'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Image tamperings.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Image tamperings"
Gaffar, Achmad Fanany Onnilita, Supriadi Supriadi, Arief Bramanto Wicaksono Saputra, Rheo Malani, and Agusma Wajiansyah. "A Splicing Technique for Image Tampering using Morphological Operations." Signal and Image Processing Letters 1, no. 2 (July 19, 2019): 36–45. http://dx.doi.org/10.31763/simple.v1i2.4.
Full textSinghania, Shruti, Arju N.A, and Raina Singh. "Image Tampering Detection Using Convolutional Neural Network." International Journal of Synthetic Emotions 10, no. 1 (January 2019): 54–63. http://dx.doi.org/10.4018/ijse.2019010103.
Full textAgarwal, Ritu, and Mallika Pant. "Image tampering detection using genetic algorithm." MATEC Web of Conferences 277 (2019): 02026. http://dx.doi.org/10.1051/matecconf/201927702026.
Full textLi, Su Ying. "Round Descriptor Based on SIFT Operator Copy and Paste Forensics." Advanced Materials Research 912-914 (April 2014): 1379–82. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1379.
Full textZhan, Cai, Lu Leng, Chin-Chen Chang, and Ji-Hwei Horng. "Reversible Image Fragile Watermarking with Dual Tampering Detection." Electronics 13, no. 10 (May 11, 2024): 1884. http://dx.doi.org/10.3390/electronics13101884.
Full textChang, Yu Hong. "Based on Digital Image Forensics Double JPEG Compression Algorithm." Advanced Materials Research 1044-1045 (October 2014): 1098–101. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1098.
Full textLee, Chin-Feng, Chin-Ting Yeh, Jau-Ji Shen, and Taeshik Shon. "Image Authentication and Restoration Using Block-Wise Variational Automatic Encoding and Generative Adversarial Networks." Electronics 12, no. 16 (August 10, 2023): 3402. http://dx.doi.org/10.3390/electronics12163402.
Full textZeng, Pingping, Lianhui Tong, Yaru Liang, Nanrun Zhou, and Jianhua Wu. "Multitask Image Splicing Tampering Detection Based on Attention Mechanism." Mathematics 10, no. 20 (October 17, 2022): 3852. http://dx.doi.org/10.3390/math10203852.
Full textMire, Archana V., Sanjay B. Dhok, Narendra J. Mistry, and Prakash D. Porey. "Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting." International Journal of Digital Crime and Forensics 7, no. 4 (October 2015): 33–54. http://dx.doi.org/10.4018/ijdcf.2015100103.
Full textThabit, Rasha, Jaffer Ali, and Doaa Subhi. "Tampering Reveal Technique for Iris Images." International Journal of Computer Networks and Communications Security 8, no. 6 (June 30, 2020): 46–51. http://dx.doi.org/10.47277/ijcncs/8(6)1.
Full textDissertations / Theses on the topic "Image tamperings"
Xin, Xing. "A Singular-Value-Based Semi-Fragile Watermarking Scheme for Image Content Authentication with Tampering Localization." DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/645.
Full textAbecidan, Rony. "Stratégies d'apprentissage robustes pour la détection de manipulation d'images." Electronic Thesis or Diss., Centrale Lille Institut, 2024. http://www.theses.fr/2024CLIL0025.
Full textToday, it is easier than ever to manipulate images for unethical purposes. This practice is therefore increasingly prevalent in social networks and advertising. Malicious users can for instance generate convincing deep fakes in a few seconds to lure a naive public. Alternatively, they can also communicate secretly hidding illegal information into images. Such abilities raise significant security concerns regarding misinformation and clandestine communications. The Forensics community thus actively collaborates with Law Enforcement Agencies worldwide to detect image manipulations. The most effective methodologies for image forensics rely heavily on convolutional neural networks meticulously trained on controlled databases. These databases are actually curated by researchers to serve specific purposes, resulting in a great disparity from the real-world datasets encountered by forensic practitioners. This data shift addresses a clear challenge for practitioners, hindering the effectiveness of standardized forensics models when applied in practical situations.Through this thesis, we aim to improve the efficiency of forensics models in practical settings, designing strategies to mitigate the impact of data shift. It starts by exploring literature on out-of-distribution generalization to find existing strategies already helping practitioners to make efficient forensic detectors in practice. Two main frameworks notably hold promise: the implementation of models inherently able to learn how to generalize on images coming from a new database, or the construction of a representative training base allowing forensics models to generalize effectively on scrutinized images. Both frameworks are covered in this manuscript. When faced with many unlabeled images to examine, domain adaptation strategies matching training and testing bases in latent spaces are designed to mitigate data shifts encountered by practitioners. Unfortunately, these strategies often fail in practice despite their theoretical efficiency, because they assume that scrutinized images are balanced, an assumption unrealistic for forensic analysts, as suspects might be for instance entirely innocent. Additionally, such strategies are tested typically assuming that an appropriate training set has been chosen from the beginning, to facilitate adaptation on the new distribution. Trying to generalize on a few images is more realistic but much more difficult by essence. We precisely deal with this scenario in the second part of this thesis, gaining a deeper understanding of data shifts in digital image forensics. Exploring the influence of traditional processing operations on the statistical properties of developed images, we formulate several strategies to select or create training databases relevant for a small amount of images under scrutiny. Our final contribution is a framework leveraging statistical properties of images to build relevant training sets for any testing set in image manipulation detection. This approach improves by far the generalization of classical steganalysis detectors on practical sets encountered by forensic analyst and can be extended to other forensic contexts
Nyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.
Full textDiallo, Boubacar. "Mesure de l'intégrité d'une image : des modèles physiques aux modèles d'apprentissage profond." Thesis, Poitiers, 2020. http://www.theses.fr/2020POIT2293.
Full textDigital images have become a powerful and effective visual communication tool for delivering messages, diffusing ideas, and proving facts. The smartphone emergence with a wide variety of brands and models facilitates the creation of new visual content and its dissemination in social networks and image sharing platforms. Related to this phenomenon and helped by the availability and ease of use of image manipulation softwares, many issues have arisen ranging from the distribution of illegal content to copyright infringement. The reliability of digital images is questioned for common or expert users such as court or police investigators. A well known phenomenon and widespread examples are the "fake news" which oftenly include malicious use of digital images.Many researchers in the field of image forensic have taken up the scientific challenges associated with image manipulation. Many methods with interesting performances have been developed based on automatic image processing and more recently the adoption of deep learning. Despite the variety of techniques offered, performance are bound to specific conditions and remains vulnerable to relatively simple malicious attacks. Indeed, the images collected on the Internet impose many constraints on algorithms questioning many existing integrity verification techniques. There are two main peculiarities to be taken into account for the detection of a falsification: one is the lack of information on pristine image acquisition, the other is the high probability of automatic transformations linked to the image-sharing platforms such as lossy compression or resizing.In this thesis, we focus on several of these image forensic challenges including camera model identification and image tampering detection. After reviewing the state of the art in the field, we propose a first data-driven method for identifying camera models. We use deep learning techniques based on convolutional neural networks (CNNs) and develop a learning strategy considering the quality of the input data versus the applied transformation. A family of CNN networks has been designed to learn the characteristics of the camera model directly from a collection of images undergoing the same transformations as those commonly used on the Internet. Our interest focused on lossy compression for our experiments, because it is the most used type of post-processing on the Internet. The proposed approach, therefore, provides a robust solution to compression for camera model identification. The performance achieved by our camera model detection approach is also used and adapted for image tampering detection and localization. The performances obtained underline the robustness of our proposals for camera model identification and image forgery detection
Hsiao, Dun-Yu. "Digital Image Tampering Synthesis and Identification." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2207200517502800.
Full textZou, Chuang Lou, and 莊潤洲. "The Study of Image Tampering Detection." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/58825581948530138596.
Full text國立中正大學
資訊工程研究所
88
Nowadays, Internet has become more and more popular. However, images are most oftenly used in Internet. Images can be used as the trademarks of company symbolization, electronic commerce (EC), multimedia, etc. However, there are also some security issues of images. Among them, the illegal like illegal copy and modification of image is a popular security problem which oftenly occurs in our daily life. Therefore, how to protect the intellectual property of images is an important research topic. The thesis planes to use image authentication to protect the images. Based on the image authentication, the modified places of the images will be pointed out; thus the images can preserve the image integrity. This thesis proposes two new methods for image authentication. The first method uses the RSA signatures and quadtree structure to achieve the image integrity. Based on those digital signatures, we can claim the authorship of the image and detect efficiently whether the image has been modified or not. On the other hand, we use quadtree structure to organize digital signatures; thus the detection procedure will be more efficient. The traditional image authentication methods cannot allow JPEG lossy compression since the JPEG lossy compression may destroy the signatures embedded in images. However, JPEG lossy compression method is often required and popularly used everywhere. Thus, the JPEG lossy compression should be taken into consideration. To improve the traditional methods, we propose a new image authentication that not only can prevent images tampered with but also allow reasonable JPEG lossy compression. Our method will extract some significant DCT coefficients and set a compression tolerant range of them. An extracted DCT coefficient will be survived after the image is not further modified or lossily compressed.
Hsiao, Dun-Yu, and 蕭敦育. "Digital Image Tampering Synthesis and Identification." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/11083859577614039919.
Full text國立臺灣大學
電信工程學研究所
93
Have you ever edited some unsatisfied digital photographs of yours? If the answer is yes, then you have made some digital tampering. With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most of the time, digital tampering is not perceptible by human; however, some traces of digital tampering may be left in the media during the process. Based on this idea, several detection methods are proposed in this thesis to against various common digital tampering without any help of embedded information such as the well-known atermarking technique. Effectiveness and results will be presented in each method, robustness will also be discussed.
Chen, Yi-Lei, and 陳以雷. "Tampering Detection in JPEG Images." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/43195323821600534654.
Full text國立清華大學
資訊工程學系
97
Since JPEG has been a popularly used image compression standard, tampering detection in JPEG images now plays an important role. Tampering on compressed images often involve recompression and tend to erase those tampering traces existed in uncompressed images. We could, however, try to discover new traces caused by recompression and use these traces to detect the recompression tampering. The artifacts introduced by lossy JPEG compression can be seen as an inherent signature for recompressed images. In this thesis, we first propose a robust tampered image detection approach by periodicity analysis with the compression artifacts both in spatial and DCT domain. To locate the forged regions, we then propose a forged regions localization method via quantization noise model and image restoration techniques. Finally, we conduct a series of experiments to demonstrate the validity of the proposed periodic features and quantization noise model, which all outperform the existing methods. Also, we show the effectiveness and feasibility of our forged regions localization method with proposed image restoration techniques.
Chen, Wei-Yu, and 陳威宇. "A novel image tampering proof scheme using image heterogeneous channel." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/24686228296813647540.
Full text國立勤益科技大學
資訊工程系
102
In the paperless applications world, the document contents protection becomes more and more important. And, many documents contain owners’ secret assets. In this thesis, we use the PNG (portable network graphics) format images to illustrate our scheme. PNG format image contains basic channel and heterogeneous channel, named alpha channel. Alpha channel is used to define the degree of image transparency. We can use alpha channel to hide important information. We use the transparently fuzzy cognitive of human eyes to achieve secret information hiding and retrieving. Accordingly, the usage of the alpha channel to hide secret is a non-visible watermark technology. When a part content of the document is marked as important, we will use three colors, black, gray, and white, to parse the marked content. After ternarization, three values of the attributes will be calculated from the marked document image. In our experimental results, we show that our methods can valid and meaningful hiding secrets using alpha channel.
李明倫. "Watermarking Scheme for Tampering Detection and Image Recovery." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/9469vm.
Full textBooks on the topic "Image tamperings"
Forensic Analysis of Digital Image Tampering. Storming Media, 2004.
Find full textBook chapters on the topic "Image tamperings"
Xu, Guanshuo, Jingyu Ye, and Yun-Qing Shi. "New Developments in Image Tampering Detection." In Digital-Forensics and Watermarking, 3–17. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19321-2_1.
Full textManu, V. T., and B. M. Mehtre. "Review of Image Tampering Detection Techniques." In Cryptographic and Information Security, 723–44. Boca Raton, Florida : CRC Press, [2019]: CRC Press, 2018. http://dx.doi.org/10.1201/9780429435461-24.
Full textNair, S. Hridya, Kasthuri A. S. Nair, Niharika Padmanabhan, S. Remya, and Riya Ratnakaran. "Image Forgery and Image Tampering Detection Techniques: A Review." In Proceedings of Third International Conference on Sustainable Expert Systems, 159–79. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-7874-6_13.
Full textIakovidou, Chryssanthi, Symeon Papadopoulos, and Yiannis Kompatsiaris. "Knowledge-Based Fusion for Image Tampering Localization." In IFIP Advances in Information and Communication Technology, 177–88. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49161-1_16.
Full textWang, Wei, Jing Dong, and Tieniu Tan. "A Survey of Passive Image Tampering Detection." In Digital Watermarking, 308–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03688-0_27.
Full textAsaad, Aras, and Sabah Jassim. "Topological Data Analysis for Image Tampering Detection." In Digital Forensics and Watermarking, 136–46. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64185-0_11.
Full textGarcía-Ordás, Diego, Laura Fernández-Robles, Enrique Alegre, María Teresa García-Ordás, and Oscar García-Olalla. "Automatic Tampering Detection in Spliced Images with Different Compression Levels." In Pattern Recognition and Image Analysis, 416–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38628-2_49.
Full textChen, Luyi, Shilin Wang, Shenghong Li, and Jianhua Li. "Countering Universal Image Tampering Detection with Histogram Restoration." In Digital Forensics and Watermaking, 282–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40099-5_23.
Full textLiu, Qingzhong, Andrew H. Sung, Zhongxue Chen, and Lei Chen. "Exposing Image Tampering with the Same Quantization Matrix." In Multimedia Data Mining and Analytics, 327–43. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14998-1_15.
Full textYe, Kui, Xiaobo Sun, Jindong Xu, Jing Dong, and Tieniu Tan. "Influence Evaluation for Image Tampering Using Saliency Mechanism." In Communications in Computer and Information Science, 518–27. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-7299-4_43.
Full textConference papers on the topic "Image tamperings"
Reddy, B. Ramasubba, M. Sunil Kumar, P. Neelima, C. Sushama, Vedala Naga Sailaja, and D. Ganesh. "Medical Image Tampering Detection using Deep Learning." In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC), 1480–85. IEEE, 2024. http://dx.doi.org/10.1109/icosec61587.2024.10722104.
Full textZhao, Liyang, and Longfang Wen. "Improved YOLOv8 for substation image tampering detection." In 2024 3rd International Conference on Smart Grids and Energy Systems (SGES), 21–25. IEEE, 2024. https://doi.org/10.1109/sges63808.2024.10824170.
Full textLi, Zhenjiang, and Jingzhe Sun. "Image Tampering Detection in Bilingual Scenes Based on Semantic." In 2024 International Conference on Data Science and Network Security (ICDSNS), 1–5. IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10691209.
Full textLi, Ruiyang, Jing Zhu, Xiaohu Luo, and Zhao Ma. "Image Tampering Detection Method Based on Multi-Feature Fusion." In 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C), 345–56. IEEE, 2024. http://dx.doi.org/10.1109/qrs-c63300.2024.00051.
Full textShi, Jiayi, Haihong E, Jianhua Liu, Tianyi Hu, Xiaodong Qiao, Junpeng Ding, and Jiayu Huang. "Hybrid Dual-Channel Input Image Tampering Detection for Scientific Papers." In 2024 11th International Conference on Behavioural and Social Computing (BESC), 1–6. IEEE, 2024. https://doi.org/10.1109/besc64747.2024.10780708.
Full textAnkilla, Mayank Reddy, Suraj Tirumani, and R. Siva. "Forgery and Tampering Detection for Images Using Deep Learning." In 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE), 1–6. IEEE, 2024. http://dx.doi.org/10.1109/icspcre62303.2024.10675216.
Full textCalderon, Felix, Juan J. Flores, and Sergio Bravo-Solorio. "Watermarks based on Pyramidal Images for Tampering Image Self-Restoration." In 2022 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC). IEEE, 2022. http://dx.doi.org/10.1109/ropec55836.2022.10018582.
Full textGaborini, Lorenzo, Paolo Bestagini, Simone Milani, Marco Tagliasacchi, and Stefano Tubaro. "Multi-Clue Image Tampering Localization." In 2014 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2014. http://dx.doi.org/10.1109/wifs.2014.7084315.
Full textYi-Lei Chen and Chiou-Ting Hsu. "Image tampering detection by blocking periodicity analysis in JPEG compressed images." In 2008 IEEE 10th Workshop on Multimedia Signal Processing (MMSP). IEEE, 2008. http://dx.doi.org/10.1109/mmsp.2008.4665184.
Full textSwaminathan, Ashwin, Min Wu, and K. J. Ray Liu. "Image Tampering Identification using Blind Deconvolution." In 2006 International Conference on Image Processing. IEEE, 2006. http://dx.doi.org/10.1109/icip.2006.312848.
Full text