2020
DOI: 10.11591/ijece.v10i5.pp5198-5207
|View full text |Cite
|
Sign up to set email alerts
|

Novel framework for optimized digital forensic for mitigating complex image attacks

Abstract: Digital Image Forensic is significantly becoming popular owing to the increasing usage of the images as a media of information propagation. However, owing to the presence of various image editing tools and softwares, there is also an increasing threats over image content security. Reviewing the existing approaches of identify the traces or artifacts states that there is a large scope of optimization to be implmentation to further enhance teh processing. Therfore, this paper presents a novel framework that perf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…Using (6) we can state that πœ‡ 𝑗,π‘˜ = 1 provided 𝑗 = π‘˜; otherwise πœ‡ 𝑗,π‘˜ = 0. The parameters 𝑗 ↓ (𝑑) and 𝑗 ↑ (𝑑) define the feature vector with the smallest and largest 𝑑 π‘‘β„Ž component.…”
Section: Aggregation Of Features and Decision Using Cnn For Tampering Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Using (6) we can state that πœ‡ 𝑗,π‘˜ = 1 provided 𝑗 = π‘˜; otherwise πœ‡ 𝑗,π‘˜ = 0. The parameters 𝑗 ↓ (𝑑) and 𝑗 ↑ (𝑑) define the feature vector with the smallest and largest 𝑑 π‘‘β„Ž component.…”
Section: Aggregation Of Features and Decision Using Cnn For Tampering Detectionmentioning
confidence: 99%
“…The emergence of social networks in our daily life spurs the advent of various digital image editing tools which leads to belief issues of multimedia content being circulated. Designing high-quality tampering employing a machine learning model that is visually undetectable through the human eye [1], [2] is well within reach of the user through the following tool such as FaceApp [3], Adobe Sensiei [4], DeepPhoto editor [5], and Adobe sky Replace [6]. Thus, classifying an image as tampered with or not is becoming an extremely difficult task.…”
Section: Introductionmentioning
confidence: 99%
“…In recent times, the number of deep learning-based tampering detection [10]- [12] such as convolutional neural networks (CNN) [13]- [15], long-short term memory (LSTM) and stacked auto-encoders (SAE) [16] have been presented. In media crime scene investigation, the majority of state-of-art tampering detection methodologies have focused on detecting certain types of tampering only such as splicing [17] and copy-clone [18], [19]. As a result, these methodologies cannot be used for detecting hybrid tampering detection.…”
Section: Introductionmentioning
confidence: 99%