2015
DOI: 10.4018/ijdcf.2015100103
|View full text |Cite
|
Sign up to set email alerts
|

Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting

Abstract: Facebook images get distributed within a fraction of a second, which hackers may tamper and redistribute on cyberspace. JPEG fingerprint based tampering detection techniques have major scope in tampering localization within standard JPEG images. The majority of these algorithms fails to detect tampering created using Facebook images. Facebook utilizes down-sampling followed by compression, which makes difficult to locate tampering created with these images. In this paper, the authors have proposed the tamperin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…leaves a trace on the picture itself, so to infer the image authenticity. A study on social network services is done in [38], [39] where it tries to detect JPEG images on Facebook. In particular, in [38] the authors define a metric to measure the distance between two JPEG images in which one image is obtained by compressing the other and in [39] a technique to reveal tampering created using Facebook images is proposed.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…leaves a trace on the picture itself, so to infer the image authenticity. A study on social network services is done in [38], [39] where it tries to detect JPEG images on Facebook. In particular, in [38] the authors define a metric to measure the distance between two JPEG images in which one image is obtained by compressing the other and in [39] a technique to reveal tampering created using Facebook images is proposed.…”
Section: Related Workmentioning
confidence: 99%
“…A study on social network services is done in [38], [39] where it tries to detect JPEG images on Facebook. In particular, in [38] the authors define a metric to measure the distance between two JPEG images in which one image is obtained by compressing the other and in [39] a technique to reveal tampering created using Facebook images is proposed. In [40] an analysis on how the social networks like Facebook, Badoo and Google+ process the uploaded images and what changes are made to some of the characteristics, such as JPEG quantization table, pixel resolution and related metadata is performed.…”
Section: Related Workmentioning
confidence: 99%
“…In [33] to conform facebook image's authenticity various algorithms used for image processing are exploited and traces are found with it. A study on social network services to detect JPEG images on Facebook is done in [34], [35]. In particular, the authors define a metric to measure the distance between JPEG image and its compressed version [34] …”
Section: ©Ijraset (Ugc Approved Journal): All Rights Are Reservedmentioning
confidence: 99%