2008
DOI: 10.1109/tifs.2008.2008214
|View full text |Cite
|
Sign up to set email alerts
|

Hiding Traces of Resampling in Digital Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
114
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 189 publications
(114 citation statements)
references
References 19 publications
0
114
0
Order By: Relevance
“…In [54], Kirchner and Bohme introduce a technique to hide traces of region re-sampling. The study is targeted on Popescu and Farid's tampering detector (see section 4.2.3, [80]), which exposes forgeries by detecting the linear dependencies that re-sampling typically induces among pixels.…”
Section: Tamper Hidingmentioning
confidence: 99%
See 1 more Smart Citation
“…In [54], Kirchner and Bohme introduce a technique to hide traces of region re-sampling. The study is targeted on Popescu and Farid's tampering detector (see section 4.2.3, [80]), which exposes forgeries by detecting the linear dependencies that re-sampling typically induces among pixels.…”
Section: Tamper Hidingmentioning
confidence: 99%
“…Kirchner and Fridrich [56] targeted the median filter attack perpetrated in [54], also arguing that since many detectors rely on the detection of linearities, the use of median filtering can be a general symptom of tampering. The authors propose to inspect image by measuring streaking artifacts, typically originated from the application of median filters.…”
Section: Countering Counter-forensicsmentioning
confidence: 99%
“…Recently, some authors [6,7] designed testing frameworks to evaluate and compare the robustness of different resampling detectors. With the aim to assess the security of resampling detection, Kirchner and Boehme [8] designed several targeted attacks against the technique of Popescu and Farid [2]. Inspired by the above works, in this paper we propose some other simple but effective targeted attacks to conceal traces of resampling from common forensic tools.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, anti-forensic operations may be used to provide intellectual property protection by preventing the reverse engineering of proprietary signal processing operations used by digital cameras through digital forensic means. To the best of our knowledge, there are only two existing anti-forensic techniques: a set of operations designed to render image rotation and resizing undetectable and an technique to synthesize color lter array patterns [6] [7].…”
Section: Introductionmentioning
confidence: 99%