2018
DOI: 10.1016/j.eng.2018.02.008
|View full text |Cite
|
Sign up to set email alerts
|

Recent Advances in Passive Digital Image Security Forensics: A Brief Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 74 publications
(32 citation statements)
references
References 34 publications
0
32
0
Order By: Relevance
“…The images file is used as evidence and digital forensic based analysis [4,5,13]. The acquisition of image files called bitstream is implemented to maintain valid evidence according to digital forensic provisions [14]. The bitstream technique copies the original bit-by-bit files that are in the system file in the form of binary numbers.…”
Section: Results Of Internal Investigationsmentioning
confidence: 99%
“…The images file is used as evidence and digital forensic based analysis [4,5,13]. The acquisition of image files called bitstream is implemented to maintain valid evidence according to digital forensic provisions [14]. The bitstream technique copies the original bit-by-bit files that are in the system file in the form of binary numbers.…”
Section: Results Of Internal Investigationsmentioning
confidence: 99%
“…Techniques such as double JPEG, JPEG blocks and JPEG quantization are exploited for detection in compressed images 4. Camera-based: used unique signature left by during the image acquisition and image storage in term of the lens, and sensor noises [10]. Some of the artifacts studied are color correlation, white balancing, quantization tables, filtering and JPEG compression.…”
Section: Various Passive Methods Are Implemented To Negate the Image mentioning
confidence: 99%
“…Here we provide more experiments on Ver 1 and Ver 2 subsets (summarized in Tables. 4,5,6,7,8,9). We test with more classifiers including Extra Trees classifiers (ET1, ET2), Nearest Neighbor classifier with different distance measures (L1,L2,Chebyshev), SVM on full feature and varying number of principal components (32,64,128,256), and a single layer dense neural network classifier trained for different lengths of time (exponential with respect to parameter shown in column header).…”
Section: Author Biographymentioning
confidence: 99%