2017
DOI: 10.1109/tifs.2017.2656842
|View full text |Cite
|
Sign up to set email alerts
|

Image Origin Classification Based on Social Network Provenance

Abstract: Recognizing information about the origin of a digital image has been individuated as a crucial task to be tackled by the image forensic scientific community. Understanding something on the previous history of an image could be strategic to address any successive assessment to be made on it: knowing the kind of device used for acquisition or, better, the model of the camera could focus investigations in a specific direction. Sometimes just revealing that a determined post-processing such as an interpolation or … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
57
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 69 publications
(60 citation statements)
references
References 40 publications
1
57
0
Order By: Relevance
“…The huge amount of images have been uploaded on social networks, and generally stored in a compressed form as JPEG images, after being re-compressed with different compression parameters from those of uploaded images [1]- [5].…”
Section: Introductionmentioning
confidence: 99%
“…The huge amount of images have been uploaded on social networks, and generally stored in a compressed form as JPEG images, after being re-compressed with different compression parameters from those of uploaded images [1]- [5].…”
Section: Introductionmentioning
confidence: 99%
“…Image forensic scientific community has to find image history to classify an image based on through which social network it has been uploaded [1], [2] and [3]. Understanding information about the image could be beneficial for the classification, it includes knowing the acquisition device [4], [5], [6], [7], the device model [8], [9], [10], [11], [12].…”
Section: Related Workmentioning
confidence: 99%
“…Although the problem of social network identification was only brought to the attention of multimedia forensic community recently, its importance has led to the introduction of new benchmarking datasets [7], [8], [9]. In [10], a preliminary work has proved that the process to upload images onto Facebook does leave unique and detectable traces in the content.…”
Section: Introductionmentioning
confidence: 99%
“…The same authors later refined their idea in order to classify, using a K-NN classifier, different social networks based on the traces of resizing, compression, renaming and metadata alterations left during the upload/download procedure [9]. Furthermore, in [8] and [11], methods to differentiate social networks such as Facebook, Flickr and Twitter are exploited by adopting only content-based information recovered from DCT (Discrete Cosine Transform) histograms of JPEG images. In [8], social network identification is achieved by means of a Bagged Decision Tree Classifier (BDTC), while a CNN is used to perform classification in [11].…”
Section: Introductionmentioning
confidence: 99%