We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 2,428 results
  1. Block-level double JPEG compression detection for image forgery localization

    Forged images in JPEG format have a ubiquitous presence in today’s world due to the ease of availability of image manipulation tools. This paper...

    Vinay Verma, Deepak Singh, Nitin Khanna in Multimedia Tools and Applications
    Article 30 June 2023
  2. Forgery detection using polynomial fitting in recompressed JPEG images

    Detection of double Joint photographic experts group (JPEG) compression is a major part of image forensics, especially double JPEG compression...

    **uli Chai, Yong Tan, ... **wei Wang in Signal, Image and Video Processing
    Article 24 December 2023
  3. Document Forgery Detection in the Context of Double JPEG Compression

    In this paper, we propose a strategy to train a CNN to detect document manipulations in JPEG documents under data scarcity scenario. As it comes to...
    Conference paper 2023
  4. Analysis of large-deviation multifractal spectral properties through successive compression for double JPEG detection

    Modern commercial software tools have the ability to deceive a viewer who is unable to determine whether the image content is authentic or not....

    Article 17 March 2023
  5. Robust primary quantization step estimation on resized and double JPEG compressed images

    As one of the most important forensic tasks, reconstruction of the original information in tampered images is a key step for tampering detection and...

    Lei Zhang, XuGuang Chen, ... Huaqing Wang in Multimedia Tools and Applications
    Article 20 May 2024
  6. Real-time double JPEG forensics for mobile devices

    Double JPEG compression is the most common process to hide image manipulation. Therefore, it becomes necessary to detect the double JPEG compression....

    Aanchal Agarwal, Abhinav Gupta in Journal of Real-Time Image Processing
    Article 10 May 2022
  7. A security JPEG image system accelerated by NEON technology based on FT-2000/4

    With the development of network bandwidth and the explosive growth of information, the number of users transmitting images to the public cloud for...

    Yu Hu, Ziteng Li, ... Lei Wang in CCF Transactions on High Performance Computing
    Article 22 January 2024
  8. Learning JPEG Compression Artifacts for Image Manipulation Detection and Localization

    Detecting and localizing image manipulation are necessary to counter malicious use of image editing techniques. Accordingly, it is essential to...

    Myung-Joon Kwon, Seung-Hun Nam, ... Changick Kim in International Journal of Computer Vision
    Article 25 May 2022
  9. An image forensic technique based on JPEG ghosts

    The unprecedented growth in the easy availability of photo-editing tools has endangered the power of digital images. An image was supposed to be...

    Divakar Singh, Priyanka Singh, ... Rajat Subhra Chakraborty in Multimedia Tools and Applications
    Article 30 September 2022
  10. Robust JPEG steganography based on the robustness classifier

    Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular...

    Jimin Zhang, **anfeng Zhao, **aolei He in EURASIP Journal on Information Security
    Article Open access 11 December 2023
  11. Fast Attack Algorithm for JPEG Image Encryption with Block Position Shuffle

    For traditional JPEG image encryption, block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack....

    Shanshan Li, Yali Guo, ... Ruoyun Gao in Journal of Shanghai Jiaotong University (Science)
    Article 13 December 2023
  12. A part-level learning strategy for JPEG image recompression detection

    Recompression is a prevalent form of multimedia content manipulation. Different approaches have been developed to detect this kind of alteration for...

    Ali Taimori, Farbod Razzazi, ... Massoud Babaie-Zadeh in Multimedia Tools and Applications
    Article 09 January 2021
  13. Assessing the impact of JPEG compression on the semantic segmentation of agricultural images

    Compression is a important issue when dealing with large amounts of data. We can reduce the size of a file by eliminating data, what is called lossy...

    Jocival Dantas Dias Júnior, João Batista Ribeiro, André Ricardo Backes in Signal, Image and Video Processing
    Article 20 July 2023
  14. Anti-forensics for Double JPEG Compression Based on Generative Adversarial Network

    The JPEG standard is one of the most widely used image formats. If a JPEG image is tampered and saved in JPEG format again, it would lead to double...
    Dequ Huang, Weixuan Tang, Bin Li in Image and Graphics
    Conference paper 2021
  15. Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture

    Estimating the primary quantization matrix of double JPEG compressed images is a problem of relevant importance in image forensics since it allows to...

    Benedetta Tondi, Andrea Costanzo, ... Bin Li in EURASIP Journal on Information Security
    Article Open access 17 May 2021
  16. Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics

    As Joint Photographic Experts Group (JPEG) compression is widely used in image processing and computer vision, the detection of JPEG forgery has...
    Hao Wang, **wei Wang, ... **sheng Sun in Digital Forensics and Watermarking
    Conference paper 2022
  17. jForge: An adversarial method to deceive JPEG forgery localization schemes

    Automatic localization of tampered regions of a JPEG image has attracted lots of attention in recent times. It is known that the statistical...

    Arkaprava Bhaduri Mandal, Tanmoy Kanti Das in Multimedia Tools and Applications
    Article 04 August 2021
  18. Chronological Dingo Optimizer-based Deep Maxout Network for skin cancer detection and skin lesion segmentation using Double U-Net

    Skin cancer is a dreadful disease, which is mainly caused due to the heavy exposure of the human body to the ultraviolet rays emitted from the sun....

    Chakkarapani V, Poornapushpakala S in Multimedia Tools and Applications
    Article 07 February 2024
  19. A video codec based on background extraction and moving object detection

    Cameras are the primary data sources in video surveillance systems and produce massive data every second. Video surveillance is an extremely...

    Soheib Hadi, Asadollah Shahbahrami, Hossien Azgomi in Multimedia Tools and Applications
    Article 29 December 2023
  20. Estimating Previous Quantization Factors on Multiple JPEG Compressed Images

    The JPEG compression algorithm has proven to be efficient in saving storage and preserving image quality thus becoming extremely popular. On the...

    Sebastiano Battiato, Oliver Giudice, ... Giovanni Puglisi in EURASIP Journal on Information Security
    Article Open access 28 June 2021
Did you find what you were looking for? Share feedback.