2020
DOI: 10.1109/access.2020.2999308
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Spliced Image Forensics Using Texture Analysis of Median Filter Residual

Abstract: In the image forensics, detection of Cut-Paste manipulation is complicated computing. In this paper, the texture analysis of the spliced image is used to detect image forensics. From the local entropy of the median filter residual (MFR) of the forged image, the feature set is extracted for the ground truth mask 'Find Gray level regional Maxima (FGM),' and 'Entropy-based Edge (EbE).' Also, from the local range, the feature set is extracted for ground truth mask {'Morphological-Open Image (MOI), and 'Morphologic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The SupCon loss is a generalization of Equation (8), which leverages the label information [26]. The SupCon loss is formulated as follows:…”
Section: Supervised Contrastive Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…The SupCon loss is a generalization of Equation (8), which leverages the label information [26]. The SupCon loss is formulated as follows:…”
Section: Supervised Contrastive Learningmentioning
confidence: 99%
“…As a countermeasure, there is an urgent need to deploy algorithms that can accurately and reliably discriminate between CGIs and NIs. Thus, multimedia forensics draws the community's attention to methods to encounter all kinds of attacks within image forensics [5], including approaches for universal image forensics [6], copy-move forgery detection [7], splice detection [8], and face anti-spoofing detection [9]. Many approaches have also been introduced in the context of image forgery detection that leverage gradient-based illumination [10], decision fusion [11], pairwise relations [12], and transformed spaces based on image illuminant maps [13].…”
Section: Introductionmentioning
confidence: 99%
“…Image authenticity comes into focus when encountering deepfakes on social media [1]. Image authenticity identification specifically refers to the scientific judgment of whether an image has undergone post-processing (or tampering) using technical means.…”
Section: Introductionmentioning
confidence: 99%
“…If there is image manipulation by such aggressive means, a defensive means to detect it is needed. Therefore, Cut-Paste [1,2] and Copy-Move detection [3,4] methods are being developed day by day as countermeasures. Copy-Move operation selects one part of an image and copies it to another region of the same image.…”
Section: Introductionmentioning
confidence: 99%