2021
DOI: 10.1109/access.2021.3091161
|View full text |Cite
|
Sign up to set email alerts
|

Image Tampering Localization Using Demosaicing Patterns and Singular Value Based Prediction Residue

Abstract: Almost all image sensors measure only one color per pixel through the color filter array. Missing pixels are estimated using a demosaicing process. For this reason, a demosaiced image leaves a particular trace. When an image is manipulated or tampered, the demosaicing trace can be changed. This change can serve as a basic clue for detecting or localizing image tampering. Demosaicing pattern-based tampering localization algorithms require a re-interpolation process, and the prediction residue between the given … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 46 publications
0
3
0
Order By: Relevance
“…Uncompressed JPEG Q = 95 JPEG Q = 90 Mimic 0.724 0.311 0.196 4Point [7] 0.709 0.307 0.151 AdaCFA [6] 0.692 0.005 0.003 DDem [10] 0.401 0.129 0.093 Shin [35] 0.104 0.001 0.001 Choi [11,4] 0.603 0.156 0.070 Ferrara [18,37] 0.071 0.000 0.000 Dirik [16,37] -0.002 0.000 0.001 Park [33] 0.116 0.001 0.000…”
Section: Methodsmentioning
confidence: 99%
“…Uncompressed JPEG Q = 95 JPEG Q = 90 Mimic 0.724 0.311 0.196 4Point [7] 0.709 0.307 0.151 AdaCFA [6] 0.692 0.005 0.003 DDem [10] 0.401 0.129 0.093 Shin [35] 0.104 0.001 0.001 Choi [11,4] 0.603 0.156 0.070 Ferrara [18,37] 0.071 0.000 0.000 Dirik [16,37] -0.002 0.000 0.001 Park [33] 0.116 0.001 0.000…”
Section: Methodsmentioning
confidence: 99%
“…Results on the Trace [31] database, with the CFA Grid (Grid) and CFA Algorithm (Alg) datasets, are presented in Table I. We compare our method with six demosaicing-based forensic tools, Bammey [12], Shin [19], Choi [10], [11], Ferrara [7], Dirik [27], Park [28], and with two generic forgery detection methods Splicebuster [30] and Noiseprint [29]. The original Choi and Shin methods [10], [19] only detect mosaic patterns, but do not detect forgeries.…”
Section: Methodsmentioning
confidence: 99%
“…The implementations for Ferrara [7] and Dirik [27] are taken from [32]. Bammey [12], Park [28], Splicebuster [30] and Noiseprint [29] are used directly with the authors' implementations.…”
Section: Methodsmentioning
confidence: 99%