2017
DOI: 10.1007/978-3-319-68560-1_67
|View full text |Cite
|
Sign up to set email alerts
|

Tampering Detection and Localization in Images from Social Networks: A CBIR Approach

Abstract: Verifying the authenticity of an image on social networks is crucial to limit the dissemination of false information. In this paper, we propose a system that provides information about tampering localization on such images, in order to help either the user or automatic methods to discriminate truth from falsehood. These images may be subjected to a large number of possible forgeries, which calls for the use of generic methods. Image forensics methods based on local features proved to be effective for the speci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…CBIR systems are commonly designed and implemented for specific domains, such as Medical [Bedo and et. al 2016;Santos et al 2018], agricultural [Ruiz et al 2018], remote sensing [Rosu et al 2017], and social networks [Maigrot et al 2017]. Such lack of a general solution is mainly due to the variety of parameters involved in the search process, e.g., feature vector extractor, distance function, query operator, and relevance feedback technique, which can impact negatively in the quality of CBIR results [Bedo and et.…”
Section: Final Resultsmentioning
confidence: 99%
“…CBIR systems are commonly designed and implemented for specific domains, such as Medical [Bedo and et. al 2016;Santos et al 2018], agricultural [Ruiz et al 2018], remote sensing [Rosu et al 2017], and social networks [Maigrot et al 2017]. Such lack of a general solution is mainly due to the variety of parameters involved in the search process, e.g., feature vector extractor, distance function, query operator, and relevance feedback technique, which can impact negatively in the quality of CBIR results [Bedo and et.…”
Section: Final Resultsmentioning
confidence: 99%
“…We plan to expand the coverage of the image database. We are also exploring ways to improve the content comparison module to eliminate false positives, and to locate modified areas in these images [27]. From an application point of view, the presentation of information to the user must also be studied.…”
Section: Discussionmentioning
confidence: 99%
“…It was also used for the Zhiyuan Fake News Recognition Competition ( Cao et al, 2019 ). D3: The Twitter dataset(D3) was one of the components of MediaEval ( Maigrot, Claveau, Kijak, & Sicre, 2016 ), which was applied to validate the usage task of Multimedia as well as aims to detect the fake multimedia content on social media. The dataset is composed of tweets (short messages posted on Twitter) and each tweet has either text, image/video or social context information.…”
Section: Methodsmentioning
confidence: 99%