2016
DOI: 10.1007/s11042-016-3660-3
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Image Splicing Based on Noise Level Inconsistency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 59 publications
(28 citation statements)
references
References 29 publications
0
28
0
Order By: Relevance
“…Thus, the predicted values after their two motion compensations are approximately equal (i.e., F t−1 ∼ = F t−1 ). According to (5) and (6), the quantized value Q 2 t is greater than Q 2 t−1 . In other words, it is necessary to use a longer string of data bits to represent the t th frame than the (t − 1) th frame.…”
Section: Periodic Artifact In the P-frame String Of Data Bitsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the predicted values after their two motion compensations are approximately equal (i.e., F t−1 ∼ = F t−1 ). According to (5) and (6), the quantized value Q 2 t is greater than Q 2 t−1 . In other words, it is necessary to use a longer string of data bits to represent the t th frame than the (t − 1) th frame.…”
Section: Periodic Artifact In the P-frame String Of Data Bitsmentioning
confidence: 99%
“…At first, tampering-detection research mainly focused on images, and the existing techniques for image forgery detection can be roughly grouped into three aspects: image forensic-hashing techniques [1][2][3], image fragile-watermarking techniques [4,5], and image passive-forensic techniques [6][7][8]. Although the methods using the former two techniques can provide more accurate detection accuracy, the main disadvantage of hashing and watermarking techniques is that the hash information needs to be extracted in advance and watermark information needs to be embedded during the image-generating process.…”
Section: Introductionmentioning
confidence: 99%
“…In the literature, a large number of algorithms have been introduced to effectively detect image splicing [1][2][3][4][5][6] and some algorithms achieved nearly perfect detection performance [2,3]. In recent years, researchers have been focusing more on image-splicing localization and achieved promising results [7] thanks to the advances in machine learning and deep learning [8][9][10]. Tampered regions of grayscale images were localized by different image-authentication techniques [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…These features were then utilized as the input for an iterative clustering algorithm to estimate the tampering mask. The difference between noise levels of tampered and original regions was employed to find the splicing traces [8,13]. The noise level was estimated using principal component analysis and then clustered by a k-means algorithm to localize the spliced regions [13].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation