2010
DOI: 10.1117/12.839100
|View full text |Cite
|
Sign up to set email alerts
|

On detection of median filtering in digital images

Abstract: In digital image forensics, it is generally accepted that intentional manipulations of the image content are most critical and hence numerous forensic methods focus on the detection of such 'malicious' post-processing. However, it is also beneficial to know as much as possible about the general processing history of an image, including content-preserving operations, since they can affect the reliability of forensic methods in various ways. In this paper, we present a simple yet effective technique to detect me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
185
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 177 publications
(185 citation statements)
references
References 19 publications
0
185
0
Order By: Relevance
“…In pre-processing, the RGB fundus image is transformed into the HSI image space. Afterwards, the technique of median filtering is performed on the intensity band (I-band) in order to suppress noise [16]. Next, the contrast limited adaptive histogram equalization technique is used so as to enhance the contrast in order to avoid over-saturation in the identical regions in the image of the retina [17].…”
Section: Methodsmentioning
confidence: 99%
“…In pre-processing, the RGB fundus image is transformed into the HSI image space. Afterwards, the technique of median filtering is performed on the intensity band (I-band) in order to suppress noise [16]. Next, the contrast limited adaptive histogram equalization technique is used so as to enhance the contrast in order to avoid over-saturation in the identical regions in the image of the retina [17].…”
Section: Methodsmentioning
confidence: 99%
“…As an example, section 4.2.1 treated malicious image processing, which can be either exploited for explicit tampering purposes (Fig. 5) or to cover forgery traces [56,85]. Those techniques are usually applied on a whole image, which could be, in turn, already a composite: for this reason, methods targeting image processing detection can be assimilated to those that will be described in the following.…”
Section: Tampering Detection Independent On the Type Of Forgerymentioning
confidence: 99%
“…Kirchner and Fridrich [56] targeted the median filter attack perpetrated in [54], also arguing that since many detectors rely on the detection of linearities, the use of median filtering can be a general symptom of tampering. The authors propose to inspect image by measuring streaking artifacts, typically originated from the application of median filters.…”
Section: Countering Counter-forensicsmentioning
confidence: 99%
“…The MF works by moving through the image pixel by pixel, replacing each value with the median value of neighboring pixels. The MF algorithm is defined as (5), which proposed by (Kirchnera and Fridrich, 2010) Equation 5:…”
Section: Noise Removalmentioning
confidence: 99%