Multimedia Security 1 2022
DOI: 10.1002/9781119901808.ch1
|View full text |Cite
|
Sign up to set email alerts
|

How to Reconstruct the History of a Digital Image, and of Its Alterations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
12
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(13 citation statements)
references
References 51 publications
1
12
0
Order By: Relevance
“…We used the Trace database [3] to evaluate the method. The Trace database is made of 1000 images taken from the Raise dataset [9].…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…We used the Trace database [3] to evaluate the method. The Trace database is made of 1000 images taken from the Raise dataset [9].…”
Section: Methodsmentioning
confidence: 99%
“…We observe that the size of the blocks w highly impacts the performance of the method, being 3 the optimal value among the tested ones. 2: Scores obtained on the endomasks noise level dataset from the Trace database [3] when setting w to 3, 5 and 8, while keeping the rest of the parameters to their optimal value. Figure 1 shows an example of the results obtained when setting w to 3, 5 and 8.…”
Section: Impact Of the Block Size Of The Blocks Used For Noise Analys...mentioning
confidence: 99%
See 3 more Smart Citations