2020
DOI: 10.1109/access.2020.3037735
|View full text |Cite
|
Sign up to set email alerts
|

Manipulation Classification for JPEG Images Using Multi-Domain Features

Abstract: Image forensics comprises the analyses and classifications of manipulations that have been applied to images. The ability to classify various manipulations that have been employed in the process of forgery is essential. Techniques to identify multiple manipulations applied to uncompressed images have been reported thus far, but the forensic approach for JPEG images compressed with various qualities has not been proposed. In this paper, we propose the manipulation classification network (MCNet) to exploit multi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 48 publications
0
10
0
1
Order By: Relevance
“…[ 53 ] proposes a method to classify the various types of manipulations that have occurred on images. The manipulation classification network (MCNet) exploits multi-domain features to extract multiple features from the frequency, spatial, and compression domains [ 53 ].…”
Section: Deepfakesmentioning
confidence: 99%
“…[ 53 ] proposes a method to classify the various types of manipulations that have occurred on images. The manipulation classification network (MCNet) exploits multi-domain features to extract multiple features from the frequency, spatial, and compression domains [ 53 ].…”
Section: Deepfakesmentioning
confidence: 99%
“…Note that the manipulated portion of the image could could be synthesized. Some common examples of image manipulation techniques include splicing [41] (replacing a section of an image with a section from another image), inpainting [42] (deleting a section of an image and synthesizing pixels to replace the content), copy-move [43] (duplicating a section of an image and moving it to another position within the same image), and photo-montage [44] (composite image from a combination of two or more images). Figure 1 shows examples of splicing and copy-move manipulations.…”
Section: Image Forensicsmentioning
confidence: 99%
“…Zhu et al decomposed face images into their 3D geometry and lighting parameters [74]. Other methods use media information, such as JPEG compression artifacts, for manipulation detection and localization [43,75,76]. Bonettini et al [77] proposed a manipulation detection method that focuses on the absence of camera sensor noise in images.…”
Section: Image Manipulation Detectionmentioning
confidence: 99%
“…In the early stages of the study, many researchers analyzed of neural network-based methods for detecting image forgery. And the scope of the research varies as follows: image manipulation classification [5,6,12,29,53], double JPEG detection [3,4,35], computer graphics detection [17,52], content-aware retargeting detection [32,33], and camera model identification [10,44]. Compared with conventional methods, the network-based approaches have achieved excellent performance; hence, their interest within CNN-based forensics is steadily increasing.…”
Section: Introductionmentioning
confidence: 99%