2013 IEEE China Summit and International Conference on Signal and Information Processing 2013
DOI: 10.1109/chinasip.2013.6625374
|View full text |Cite
|
Sign up to set email alerts
|

CASIA Image Tampering Detection Evaluation Database

Abstract: Image forensics has now raised the anxiety of justice as increasing cases of abusing tampered images in newspapers and court for evidence are reported recently. With the goal of verifying image content authenticity, passive-blind image tampering detection is called for. More realistic open benchmark databases are also needed to assist the techniques. Recently, we collect a natural color image database with realistic tampering operations. The database is made publicly available for researchers to compare and ev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
292
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 527 publications
(295 citation statements)
references
References 9 publications
3
292
0
Order By: Relevance
“…For detecting color image splicing, we selected three datasets such as Columbia color DVMM [12], CASIA1, and CASIA2 [20]. The Columbia color image dataset consists of 183 authentic and 180 spliced images in TIFF format.…”
Section: Detection Results For Color Datasetsmentioning
confidence: 99%
See 1 more Smart Citation
“…For detecting color image splicing, we selected three datasets such as Columbia color DVMM [12], CASIA1, and CASIA2 [20]. The Columbia color image dataset consists of 183 authentic and 180 spliced images in TIFF format.…”
Section: Detection Results For Color Datasetsmentioning
confidence: 99%
“…Muhammad et al proposed an imposing image forgery detection method based on a steerable pyramid transform and local binary pattern with feature reduction [17]. This method demonstrated the best performance to rate of 97.33 % on CASIA2 dataset [20]. However, this scheme requires an enormous of features and additional feature selection techniques to reduce the number of features.…”
Section: Introductionmentioning
confidence: 99%
“…Since tampering generates a perceptually different image, therefore image hash of tampered images should be different from original ones. Further, we carried out the experiment to see the result of our algorithm towards malicious activities and verification for locating forged areas (discussed in Section 3.1) by using CASIA V2.0 tampered image database [42] with 800 selected image pairs. For example, some tampered image pairs and their experimental results are shown in Table 5.…”
Section: Analysis Of Sensitivity Towards Malicious Attacks (Forgery) mentioning
confidence: 99%
“…In the case of tampering (i.e., a small region is  à from h ' where p i = [x i y i w i h i ], x i and y i are corner coordinates, w i and h i are width and height, of a circumscribed rectangle of ith salient region. It has been experimentally observed that 96% of 2800 images has the number of salient regions less than six, only a few of the images has larger than it (for example, shown in the second and third columns of Table 5 in the result Section 4. , where T ' = 2 selected empirically from the experiment on 800 tampered image pairs taken from CASIA V2.0 tampered image database [42]). The regions 3 and 4 (i.e., p 0 3 and p 0 4 respectively) may have been inserted by an adversary in the received image.…”
Section: Tamper Localizationmentioning
confidence: 99%
“…Sensor tampering, which is also referred to as presentation attack [7] includes replay-attack and print-attack, which are all spoofing approaches to fool biometric sensors [6]. Database tampering includes splicing, copy/paste, inpainting and some pre-processing effects carried out maliciously on an authentic image [8]. Biometric systems are exposed to several attacks, but considering digital tampering, Ratha et al [9] noted that, templates stored in the database maybe modified or removed, or new templates may be introduced in the database.…”
mentioning
confidence: 99%