2017
DOI: 10.1016/j.dsp.2017.08.009
|View full text |Cite
|
Sign up to set email alerts
|

Digital image integrity – a survey of protection and verification techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
61
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 113 publications
(61 citation statements)
references
References 95 publications
0
61
0
Order By: Relevance
“…Image forgery detection approaches are divided into active and passive (or blind) categories. Active approaches use detection of embedded watermarks or signatures to ensure the authenticity of images [18][19][20][21][22][23]. Such approaches are limited, because it is difficult to maintain prior information of such pre-embedded watermarks, signatures and secret keys [20].…”
Section: Related Workmentioning
confidence: 99%
“…Image forgery detection approaches are divided into active and passive (or blind) categories. Active approaches use detection of embedded watermarks or signatures to ensure the authenticity of images [18][19][20][21][22][23]. Such approaches are limited, because it is difficult to maintain prior information of such pre-embedded watermarks, signatures and secret keys [20].…”
Section: Related Workmentioning
confidence: 99%
“…It is important to identify fake information in order to avoid potential security issues. Therefore, determining the authenticity of images has attracted increasing attention in many applications, such as image forensics [1], [2] and biometric anti-spoofing [3].…”
Section: Introductionmentioning
confidence: 99%
“…Over the past few years, many approaches have been proposed in the field of blind image forensic technologies [1,2]. The existing methodologies can be roughly classified into three categories according to the forensic features used.…”
Section: Introductionmentioning
confidence: 99%