2010 IEEE International Conference on Image Processing 2010
DOI: 10.1109/icip.2010.5652553
|View full text |Cite
|
Sign up to set email alerts
|

Undetectable image tampering through JPEG compression anti-forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
57
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 76 publications
(57 citation statements)
references
References 9 publications
0
57
0
Order By: Relevance
“…For a given image, the detector re-compresses it using different quality factors q, as a function of which, TV(q) is computed. Lai and Bohme [27] proposed another calibration-based detector to counter Stamm et al's JPEG anti-forensic method [17,18]. They borrowed the idea of calibration from steganalysis [2].…”
Section: Jpeg Compression Counter Anti-forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…For a given image, the detector re-compresses it using different quality factors q, as a function of which, TV(q) is computed. Lai and Bohme [27] proposed another calibration-based detector to counter Stamm et al's JPEG anti-forensic method [17,18]. They borrowed the idea of calibration from steganalysis [2].…”
Section: Jpeg Compression Counter Anti-forensicsmentioning
confidence: 99%
“…The first attempts to make JPEG footprints forensically undetectable on the basis of DCT artifacts are the techniques introduced by stamm et al in their papers in [17,18]. In the first paper, quantisation gaps in the DCT histogram are reduced by spreading the coefficients with an additive noise called anti-forensic dither.…”
Section: Jpeg Compression Anti-forensicsmentioning
confidence: 99%
“…A second study [42] addresses the counterfeiting pattern noise attack [87]. In this case, plausible scenarios are studied, assuming that for the burglar to synthesize some specific camera pattern noise, he/she should have access at least to some images that are also accessible to the investigator.…”
Section: Countering Counter-forensicsmentioning
confidence: 99%
“…blockiness. For this reason, technique [87] cleans blocking artifacts by applying first a median filter and then adding low-power white noise to the image. It is shown that this operation outperforms existing de-blocking techniques when coupled to method [86] for compression hiding.…”
Section: Image Source Counterfeitingmentioning
confidence: 99%
See 1 more Smart Citation