期刊文献+
共找到54篇文章
< 1 2 3 >
每页显示 20 50 100
Image Splicing Forgery Detection Using Feature-Based of Sonine Functions and Deep Features
1
作者 Ala’a R.Al-Shamasneh Rabha W.Ibrahim 《Computers, Materials & Continua》 SCIE EI 2024年第1期795-810,共16页
The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic.One of the most popular methods for manipulating digital images is image splicing,whic... The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic.One of the most popular methods for manipulating digital images is image splicing,which involves copying a specific area from one image and pasting it into another.Attempts were made to mitigate the effects of image splicing,which continues to be a significant research challenge.This study proposes a new splicing detectionmodel,combining Sonine functions-derived convex-based features and deep features.Two stages make up the proposed method.The first step entails feature extraction,then classification using the“support vector machine”(SVM)to differentiate authentic and spliced images.The proposed Sonine functions-based feature extraction model reveals the spliced texture details by extracting some clues about the probability of image pixels.The proposed model achieved an accuracy of 98.93% when tested with the CASIA V2.0 dataset“Chinese Academy of Sciences,Institute of Automation”which is a publicly available dataset for forgery classification.The experimental results show that,for image splicing forgery detection,the proposed Sonine functions-derived convex-based features and deep features outperform state-of-the-art techniques in terms of accuracy,precision,and recall.Overall,the obtained detection accuracy attests to the benefit of using the Sonine functions alongside deep feature representations.Finding the regions or locations where image tampering has taken place is limited by the study.Future research will need to look into advanced image analysis techniques that can offer a higher degree of accuracy in identifying and localizing tampering regions. 展开更多
关键词 Image forgery image splicing deep learning Sonine functions
在线阅读 下载PDF
A dual benchmarking study of facial forgery and facial forensics
2
作者 Minh Tam Pham Thanh Trung Huynh +5 位作者 Thanh Tam Nguyen Thanh Toan Nguyen Thanh Thi Nguyen Jun Jo Hongzhi Yin Quoc Viet Hung Nguyen 《CAAI Transactions on Intelligence Technology》 2024年第6期1377-1397,共21页
In recent years,visual facial forgery has reached a level of sophistication that humans cannot identify fraud,which poses a significant threat to information security.A wide range of malicious applications have emerge... In recent years,visual facial forgery has reached a level of sophistication that humans cannot identify fraud,which poses a significant threat to information security.A wide range of malicious applications have emerged,such as deepfake,fake news,defamation or blackmailing of celebrities,impersonation of politicians in political warfare,and the spreading of rumours to attract views.As a result,a rich body of visual forensic techniques has been proposed in an attempt to stop this dangerous trend.However,there is no comprehensive,fair,and unified performance evaluation to enlighten the community on best performing methods.The authors present a systematic benchmark beyond traditional surveys that provides in-depth insights into facial forgery and facial forensics,grounding on robustness tests such as contrast,brightness,noise,resolution,missing information,and compression.The authors also provide a practical guideline of the benchmarking results,to determine the characteristics of the methods that serve as a comparative reference in this never-ending war between measures and countermeasures.The authors’source code is open to the public. 展开更多
关键词 BENCHMARK deepfake digital forensics visual facial forgery
在线阅读 下载PDF
A Thorough Investigation on Image Forgery Detection
3
作者 Anjani Kumar Rai Subodh Srivastava 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1489-1528,共40页
Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for... Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for authenticity and the integrity of the image drive the detection of a fabricated image.There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files,including re-sampling or copy-moving.This work presents a high-level view of the forensics of digital images and their possible detection approaches.This work presents a thorough analysis of digital image forgery detection techniques with their steps and effectiveness.These methods have identified forgery and its type and compared it with state of the art.This work will help us to find the best forgery detection technique based on the different environments.It also shows the current issues in other methods,which can help researchers find future scope for further research in this field. 展开更多
关键词 forgery detection digital forgery image forgery localization image segmentation image forensics multimedia security
在线阅读 下载PDF
A Survey on Digital Image Copy-Move Forgery Localization Using Passive Techniques 被引量:1
4
作者 Weijin Tan Yunqing Wu +1 位作者 Peng Wu Beijing Chen 《Journal of New Media》 2019年第1期11-25,共15页
Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the mo... Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the most common types of image forgeries.Thus,an overview of the traditional and the recent copy-move forgery localization methods using passive techniques is presented in this paper.These methods are classified into three types:block-based methods,keypoint-based methods,and deep learning-based methods.In addition,the strengths and weaknesses of these methods are compared and analyzed in robustness and computational cost.Finally,further research directions are discussed. 展开更多
关键词 Image forgery copy-move forgery localization passive techniques
在线阅读 下载PDF
Mining Fine-Grain Face Forgery Cues with Fusion Modality
5
作者 Shufan Peng Manchun Cai +1 位作者 Tianliang Lu Xiaowen Liu 《Computers, Materials & Continua》 SCIE EI 2023年第5期4025-4045,共21页
Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns.Despite the considerable progress in existing methods,we note that:Previous works overlooked finegrain f... Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns.Despite the considerable progress in existing methods,we note that:Previous works overlooked finegrain forgery cues with high transferability.Such cues positively impact the model’s accuracy and generalizability.Moreover,single-modality often causes overfitting of the model,and Red-Green-Blue(RGB)modal-only is not conducive to extracting the more detailed forgery traces.We propose a novel framework for fine-grain forgery cues mining with fusion modality to cope with these issues.First,we propose two functional modules to reveal and locate the deeper forged features.Our method locates deeper forgery cues through a dual-modality progressive fusion module and a noise adaptive enhancement module,which can excavate the association between dualmodal space and channels and enhance the learning of subtle noise features.A sensitive patch branch is introduced on this foundation to enhance the mining of subtle forgery traces under fusion modality.The experimental results demonstrate that our proposed framework can desirably explore the differences between authentic and forged images with supervised learning.Comprehensive evaluations of several mainstream datasets show that our method outperforms the state-of-the-art detection methods with remarkable detection ability and generalizability. 展开更多
关键词 Face forgery detection fine-grain forgery cues fusion modality adaptive enhancement
在线阅读 下载PDF
An effective copy-move forgery detection algorithm using fractional quaternion Zernike moments and improved PatchMatch algorithm 被引量:4
6
作者 Chen Beijing Gao Ye +2 位作者 Yu Ming Wu Peng Shu Huazhong 《Journal of Southeast University(English Edition)》 EI CAS 2019年第4期431-439,共9页
An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSA... An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSANNA)to modify the propagation process.Then,fractional quaternion Zernike moments(FrQZMs)are considered to be features extracted from color forged images.Finally,the extracted FrQZMs features are matched by the improved PatchMatch algorithm.The experimental results on two publicly available datasets(FAU and GRIP datasets)show that the proposed algorithm performs better than the state-of-the-art algorithms not only in objective criteria F-measure value but also in visual.Moreover,the proposed algorithm is robust to some attacks,such as additive white Gaussian noise,JPEG compression,rotation,and scaling. 展开更多
关键词 QUATERNION fractional Zernike moments PatchMatch algorithm copy-move forgery detection
在线阅读 下载PDF
Image Copy-Move Forgery Detection Using SURF in Opponent Color Space 被引量:4
7
作者 巩家昌 郭继昌 《Transactions of Tianjin University》 EI CAS 2016年第2期151-157,共7页
Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identif... Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identify the flat duplicated regions without reliable extracted features. In this paper, we propose a new CMFD method by using speeded-up robust feature(SURF)in the opponent color space. Our method starts by converting the inspected image from RGB to the opponent color space. The color gradient per pixel is calculated and taken as the work space for SURF to extract the keypoints. The matched keypoints are clustered and their geometric transformations are estimated. Finally, the false matches are removed. Experimental results show that the proposed technique can effectively expose the duplicated regions with various transformations, even when the duplication regions are flat. 展开更多
关键词 copy-move forgery flat region color descriptor OwSURF
在线阅读 下载PDF
Improving Image Copy-Move Forgery Detection with Particle Swarm Optimization Techniques 被引量:7
8
作者 SHI Wenchang ZHAO Fei +1 位作者 QIN Bo LIANG Bin 《China Communications》 SCIE CSCD 2016年第1期139-149,共11页
Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approach... Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approaches under the SIFT-based framework are the most acceptable ways to CMF detection due to their robust performance.However,for some CMF images,these approaches cannot produce satisfactory detection results.For instance,the number of the matched keypoints may be too less to prove an image to be a CMF image or to generate an accurate result.Sometimes these approaches may even produce error results.According to our observations,one of the reasons is that detection results produced by the SIFT-based framework depend highly on parameters whose values are often determined with experiences.These values are only applicable to a few images,which limits their application.To solve the problem,a novel approach named as CMF Detection with Particle Swarm Optimization(CMFDPSO) is proposed in this paper.CMFD-PSO integrates the Particle Swarm Optimization(PSO) algorithm into the SIFT-based framework.It utilizes the PSO algorithm to generate customized parameter values for images,which are used for CMF detection under the SIFT-based framework.Experimental results show that CMFD-PSO has good performance. 展开更多
关键词 copy-move forgery detection SIFT region duplication digital image forensics
在线阅读 下载PDF
Detecting JPEG image forgery based on double compression 被引量:1
9
作者 Wang Junwen Liu Guangjie Dai Yuewei Wang Zhiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第5期1096-1103,共8页
Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilis... Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilistic model with periodic effects in double quantization is analyzed, and the probability of quantized DCT coefficients in each block is calculated over the entire iraage. Secondly, the posteriori probability of each block is computed according to Bayesian theory and the results mentioned in first part. Then the mean and variance of the posteriori probability are to be used for judging whether the target block is tampered. Finally, the mathematical morphology operations are performed to reduce the false alarm probability. Experimental results show that the method can exactly locate the doctored part, and through the experiment it is also found that for detecting the tampered regions, the higher the second compression quality is, the more exact the detection efficiency is. 展开更多
关键词 image forgery JPEG double compression QUANTIZATION posteriori probability.
在线阅读 下载PDF
Detection of Copy-Move Forgery in Digital Images Using Singular Value Decomposition 被引量:1
10
作者 Zaid Nidhal Khudhair Farhan Mohamed +2 位作者 Amjad Rehman Tanzila Saba Saeed Ali bahaj 《Computers, Materials & Continua》 SCIE EI 2023年第2期4135-4147,共13页
This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding... This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding window with a determined size.At each step,the SVD is determined.First,the diagonal matrix’s maximum value(norm)is selected(representing the scaling factor for SVD and a fixed value for each set of matrix elements even when rotating thematrix or scaled).Then,the similar norms are grouped,and each leading group is separated into many subgroups(elements of each subgroup are neighbors)according to 8-adjacency(the subgroups for each leading group must be far from others by a specific distance).After that,a weight is assigned for each subgroup to classify the image as forgery or not.Finally,the F1 score of the proposed system is measured,reaching 99.1%.This approach is robust against rotation,scaling,noisy images,and illumination variation.It is compared with other similarmethods and presents very promised results. 展开更多
关键词 forgery image forensic image processing region duplication SVD transformation technological development
在线阅读 下载PDF
ITALIAN MONEY TESTED FOR FORGERY BY MOSSBAUER SPECTROSCOPY
11
作者 I.Ortalli G.Pedrazzi +1 位作者 蒋可玉 张秀芳 《Nuclear Science and Techniques》 SCIE CAS CSCD 1993年第1期39-41,共3页
Italian money has been investigated by Mossbauer spectroscopy. The results indicated that the spectrum of a 10000 lire bank-note consisted of three magnetic sextets and two quadrupole doublets, the spectrum of a 50000... Italian money has been investigated by Mossbauer spectroscopy. The results indicated that the spectrum of a 10000 lire bank-note consisted of three magnetic sextets and two quadrupole doublets, the spectrum of a 50000 lire note consisted of two Zeeman sextets, but in the "false" money there are two quadrupole doublets only. 展开更多
关键词 MOSSBAUER spectroscopy forgery BANK NOTE
在线阅读 下载PDF
Extended Forgery Detection Framework for COVID-19 Medical Data Using Convolutional Neural Network
12
作者 Sajid Habib Gill Noor Ahmed Sheikh +7 位作者 Samina Rajpar Zain ul Abidin N.Z.Jhanjhi Muneer Ahmad Mirza Abdur Razzaq Sultan S.Alshamrani Yasir Malik Fehmi Jaafar 《Computers, Materials & Continua》 SCIE EI 2021年第9期3773-3787,共15页
Medical data tampering has become one of the main challenges in the field of secure-aware medical data processing.Forgery of normal patients’medical data to present them as COVID-19 patients is an illegitimate action... Medical data tampering has become one of the main challenges in the field of secure-aware medical data processing.Forgery of normal patients’medical data to present them as COVID-19 patients is an illegitimate action that has been carried out in different ways recently.Therefore,the integrity of these data can be questionable.Forgery detection is a method of detecting an anomaly in manipulated forged data.An appropriate number of features are needed to identify an anomaly as either forged or non-forged data in order to find distortion or tampering in the original data.Convolutional neural networks(CNNs)have contributed a major breakthrough in this type of detection.There has been much interest from both the clinicians and the AI community in the possibility of widespread usage of artificial neural networks for quick diagnosis using medical data for early COVID-19 patient screening.The purpose of this paper is to detect forgery in COVID-19 medical data by using CNN in the error level analysis(ELA)by verifying the noise pattern in the data.The proposed improved ELA method is evaluated using a type of data splicing forgery and sigmoid and ReLU phenomenon schemes.The proposed method is verified by manipulating COVID-19 data using different types of forgeries and then applying the proposed CNN model to the data to detect the data tampering.The results show that the accuracy of the proposed CNN model on the test COVID-19 data is approximately 92%. 展开更多
关键词 Data security data privacy medical-data forgery COVID-19 convolutional neural network machine learning deep learning
在线阅读 下载PDF
Protecting the trust and credibility of data by tracking forgery trace based on GANs
13
作者 Shuai Xiao Jiachen Yang Zhihan Lv 《Digital Communications and Networks》 SCIE CSCD 2022年第6期877-884,共8页
With the advent of the 5G Internet of Things era,communication and social interaction in our daily life have changed a lot,and a large amount of social data is transmitted to the Internet.At the same time,with the rap... With the advent of the 5G Internet of Things era,communication and social interaction in our daily life have changed a lot,and a large amount of social data is transmitted to the Internet.At the same time,with the rapid development of deep forgery technology,a new generation of social data trust crisis has also followed.Therefore,how to ensure the trust and credibility of social data in the 5G Internet of Things era is an urgent problem to be solved.This paper proposes a new method for forgery detection based on GANs.We first discover the hidden gradient information in the grayscale image of the forged image and use this gradient information to guide the generation of forged traces.In the classifier,we replace the traditional binary loss with the focal loss that can focus on difficult-to-classify samples,which can achieve accurate classification when the real and fake samples are unbalanced.Experimental results show that the proposed method can achieve high accuracy on the DeeperForensics dataset and with the highest accuracy is 98%. 展开更多
关键词 forgery detection Trace generation Social data Privacy protection
在线阅读 下载PDF
A NEW FORGERY ATTACK ON MESSAGE RECOVERY SIGNATURES
14
作者 Li Zichen Li Zhongxian Yang Yixian , Wu Weilin (PO Box 126, Information Security Center, Beijing Univ. of Posts and Telecom., Beijing 100876) 《Journal of Electronics(China)》 2000年第3期234-237,共4页
After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery att... After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery attacks to (F1), (F2) and Nyberg-Rueppel’s signatures are presented. 展开更多
关键词 MESSAGE recovery SIGNATURE Discrete LOGARITHM forgery ATTACK
在线阅读 下载PDF
Exposing Image Forgery with Inconsistent Reflection Line Midpoint
15
作者 葛华勇 MALIK Hafiz +1 位作者 蒋学芹 房树娟 《Journal of Donghua University(English Edition)》 EI CAS 2017年第1期44-48,共5页
In recent years,there has been a backlash of sorts and the authenticity of images has been routinely questioned.Seeing is no longer believing.There is an urgent need for robust image forensic techniques to expose phot... In recent years,there has been a backlash of sorts and the authenticity of images has been routinely questioned.Seeing is no longer believing.There is an urgent need for robust image forensic techniques to expose photo forgery.This paper proposed a novel and effective technique to expose image forgery using inconsistent reflection.More specifically,a new technique was presented to calculate reflection line midpoint,the definition of midpoint ratio was given,and three standards were proposed and employed to detect image forgery.Accuracy and effectiveness of the proposed technique were evaluated using a data set consisting of 200 authentic and forged images.Experimental results indicate that the proposed method can detect image forgery with very high success rate. 展开更多
关键词 image forgery inconsistent reflection midpoint ratio image forensics
在线阅读 下载PDF
Metaheuristics with Optimal Deep Transfer Learning Based Copy-Move Forgery Detection Technique
16
作者 C.D.Prem Kumar S.Saravana Sundaram 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期881-899,共19页
The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content.An effective technique for tampering the identification is the copy-mo... The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content.An effective technique for tampering the identification is the copy-move forgery.Conventional image processing techniques generally search for the patterns linked to the fake content and restrict the usage in massive data classification.Contrast-ingly,deep learning(DL)models have demonstrated significant performance over the other statistical techniques.With this motivation,this paper presents an Optimal Deep Transfer Learning based Copy Move Forgery Detection(ODTL-CMFD)technique.The presented ODTL-CMFD technique aims to derive a DL model for the classification of target images into the original and the forged/tampered,and then localize the copy moved regions.To perform the feature extraction process,the political optimizer(PO)with Mobile Networks(MobileNet)model has been derived for generating a set of useful vectors.Finally,an enhanced bird swarm algorithm(EBSA)with least square support vector machine(LS-SVM)model has been employed for classifying the digital images into the original or the forged ones.The utilization of the EBSA algorithm helps to properly modify the parameters contained in the Multiclass Support Vector Machine(MSVM)technique and thereby enhance the classification performance.For ensuring the enhanced performance of the ODTL-CMFD technique,a series of simulations have been performed against the benchmark MICC-F220,MICC-F2000,and MICC-F600 datasets.The experimental results have demonstrated the improvised performance of the ODTL-CMFD approach over the other techniques in terms of several evaluation measures. 展开更多
关键词 Copy move detection image forgery deep learning machine learning parameter tuning FORENSICS
在线阅读 下载PDF
An Active Image Forgery Detection Approach Based on Edge Detection
17
作者 Hüseyin Bilal Macit Arif Koyun 《Computers, Materials & Continua》 SCIE EI 2023年第4期1603-1619,共17页
Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Mo... Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression. 展开更多
关键词 Image forgery image tampering edge detection
在线阅读 下载PDF
Fast Forgery Detection with the Intrinsic Resampling Properties
18
作者 Cheng-Chang Lien Cheng-Lun Shih Chih-Hsun Chou 《Journal of Information Security》 2010年第1期11-22,共12页
With the rapid progress of the image processing software, the image forgery can leave no visual clues on the tampered regions and make us unable to authenticate the image. In general, the image forgery technologies of... With the rapid progress of the image processing software, the image forgery can leave no visual clues on the tampered regions and make us unable to authenticate the image. In general, the image forgery technologies often utilizes the scaling, rotation or skewing operations to tamper some regions in the image, in which the resampling and interpolation processes are often demanded. By observing the detectable periodic distribution properties generated from the resampling and interpolation processes, we propose a novel method based on the intrinsic properties of resampling scheme to detect the tampered regions. The proposed method applies the pre-calculated resampling weighting table to detect the periodic properties of prediction error distribution. The experimental results show that the proposed method outperforms the conventional methods in terms of efficiency and accuracy. 展开更多
关键词 IMAGE forgery RESAMPLING forgery Detection INTRINSIC PROPERTIES of RESAMPLING
在线阅读 下载PDF
Deep Learning-Based Digital Image Forgery Detection Using Transfer Learning
19
作者 Emad Ul Haq Qazi Tanveer Zia +1 位作者 Muhammad Imran Muhammad Hamza Faheem 《Intelligent Automation & Soft Computing》 2023年第12期225-240,共16页
Deep learning is considered one of the most efficient and reliable methods through which the legitimacy of a digital image can be verified.In the current cyber world where deepfakes have shaken the global community,co... Deep learning is considered one of the most efficient and reliable methods through which the legitimacy of a digital image can be verified.In the current cyber world where deepfakes have shaken the global community,confirming the legitimacy of a digital image is of great importance.With the advancements made in deep learning techniques,now we can efficiently train and develop state-of-the-art digital image forensic models.The most traditional and widely used method by researchers is convolution neural networks(CNN)for verification of image authenticity but it consumes a considerable number of resources and requires a large dataset for training.Therefore,in this study,a transfer learning based deep learning technique for image forgery detection is proposed.The proposed methodology consists of three modules namely;preprocessing module,convolutional module,and the classification module.By using our proposed technique,the training time is drastically reduced by utilizing the pre-trained weights.The performance of the proposed technique is evaluated by using benchmark datasets,i.e.,BOW and BOSSBase that detect five forensic types which include JPEG compression,contrast enhancement(CE),median filtering(MF),additive Gaussian noise,and resampling.We evaluated the performance of our proposed technique by conducting various experiments and case scenarios and achieved an accuracy of 99.92%.The results show the superiority of the proposed system. 展开更多
关键词 Image forgery transfer learning deep learning BOW dataset BOSSBase dataset
在线阅读 下载PDF
A Survey of Anti-forensic for Face Image Forgery
20
作者 Haitao Zhang 《Journal of Information Hiding and Privacy Protection》 2022年第1期41-51,共11页
Deep learning related technologies,especially generative adversarial network,are widely used in the fields of face image tampering and forgery.Forensics researchers have proposed a variety of passive forensic and rela... Deep learning related technologies,especially generative adversarial network,are widely used in the fields of face image tampering and forgery.Forensics researchers have proposed a variety of passive forensic and related anti-forensic methods for image tampering and forgery,especially face images,but there is still a lack of overview of anti-forensic methods at this stage.Therefore,this paper will systematically discuss the anti-forensic methods for face image tampering and forgery.Firstly,this paper expounds the relevant background,including the relevant tampering and forgery methods and forensic schemes of face images.The former mainly includes four aspects:conventional processing,fake face generation,face editing and face swapping;The latter is mainly the relevant forensic means based on spatial domain and frequency domain using deep learning technology.Then,this paper divides the existing anti-forensic works into three categories according to their method characteristics,namely hiding operation traces,forgery reconstruction and adversarial attack.Finally,this paper summarizes the limitations and prospects of the existing anti-forensic technologies. 展开更多
关键词 ANTI-FORENSICS face tempering and forgery FORENSICS generative adversarial network
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部