Sciweavers

TIFS
2010
144views more  TIFS 2010»
13 years 2 months ago
Forensic detection of image manipulation using statistical intrinsic fingerprints
—As the use of digital images has increased, so has the means and the incentive to create digital image forgeries. Accordingly, there is a great need for digital image forensic t...
Matthew C. Stamm, K. J. Ray Liu
PAMI
2007
336views more  PAMI 2007»
13 years 4 months ago
Topological Equivalence between a 3D Object and the Reconstruction of Its Digital Image
— Digitization is not as easy as it looks. If one digitizes a 3D object even with a dense sampling grid, the reconstructed digital object may have topological distortions and in ...
Peer Stelldinger, Longin Jan Latecki, Marcelo Siqu...
DCG
2007
83views more  DCG 2007»
13 years 4 months ago
The Genus of a Digital Image Boundary Is Determined by Its Foreground, Background, and Reeb Graphs
Weprovethatthegenusoftheboundaryofadigitalimageispreciselyhalfofthe sum of the cycle ranks of three particular graphs: the “foreground graph” and “background graph,” which ...
Lowell Abrams, Donniell E. Fishkind
ICASSP
2010
IEEE
13 years 4 months ago
Anti-forensics of JPEG compression
The widespread availability of photo editing software has made it easy to create visually convincing digital image forgeries. To address this problem, there has been much recent w...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
SIP
2007
13 years 5 months ago
Geometrically robust image watermarking using star patterns
Digital copyright protection has become increasingly important in recent times due to the rapid growth of the Internet and the proliferation of P2P technologies. Copyright protect...
J. R. Zhang, Jon G. Rokne
RT
2004
Springer
13 years 9 months ago
Bixels: Picture Samples with Sharp Embedded Boundaries
Pixels store a digital image as a grid of point samples that can reconstruct a limited-bandwidth continuous 2-D source image. Although convenient for anti-aliased display, these b...
Jack Tumblin, Prasun Choudhury
ICIAR
2005
Springer
13 years 10 months ago
A Steganographic Method for Digital Images Robust to RS Steganalysis
Digital images are increasingly being used as steganographic covers for secret communication. The Least Significant Bit (LSB) encoding is one of the most widely used methods for e...
André R. S. Marçal, Patricia R. Pere...
ICMCS
2007
IEEE
163views Multimedia» more  ICMCS 2007»
13 years 10 months ago
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
Digital images can be forged easily with today’s widely available image processing software. In this paper, we describe a passive approach to detect digital forgeries by checkin...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ICASSP
2008
IEEE
13 years 11 months ago
Forensic techniques for classifying scanner, computer generated and digital camera images
Digital images can be captured or generated by a variety of sources including digital cameras, scanners and computer graphics softwares. In many cases it is important to be able t...
Nitin Khanna, George T.-C. Chiu, Jan P. Allebach, ...
ICIP
2004
IEEE
14 years 6 months ago
Blind source camera identification
An interesting problem in digital forensics is that given a digital image, would it be possible to identify the camera model which was used to obtain the image. In this paper we l...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon