Image Forensic
750 Followers
Recent papers in Image Forensic
This paper describes the implementation of a system that addresses the issues in the area of Forensic Signature Verification. Two main approaches exist in this field-signature verification and signature identification. Our efforts focus... more
With the advent of powerful image editing tools, manipulating images and changing their content is becoming a trivial task. Now, you can add, change or delete significant information from an image, without leaving any visible signs of... more
Laporan Hasil Analisis Gambar Menggunakan Aplikasi Web Fotoforensics dan Forensicallybeta Serta Laporan Hasil Analisis Gambar Menggunakan Metode ORB dan SHIFT
Studies towards image forensics are about a decade old and various forms of research techniques have been presented till date towards image forgery detection. Majority of the existing techniques deals with identification of tampered... more
Abstrak Pesatnya perkembangan teknologi informasi memungkinkan pengguna untuk melakukan pengolahan citra digital dengan menggunakan software editing tools yang banyak tersedia saat ini dengan sangat mudah. Pengolahan citra digital yang... more
Due to the ease of access to platforms that can be used by forgers to tamper digital documents, providing automatic tools for identifying forged images is now a hot research field in image processing. This paper presents a novel forgery... more
The use of machine-learning for multimedia forensics is gaining more and more consensus, especially due to the amazing possibilities offered by modern machine learning techniques. By exploiting deep learning tools, new approaches have... more
Rapid penetration of internet and advancements in communication technology is a paved way to easy access of digital images. Nevertheless, these advancements also create ways for malicious users to pirate and sell the copyrighted... more
Last-generation GAN models allow to generate synthetic images which are visually indistinguishable from natural ones, raising the need to develop tools to distinguish fake and natural images thus contributing to preserve the... more
Copy–move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to... more
Amidst the continual march of technology, we find ourselves relying on digital videos to proffer visual evidence in several highly sensitive areas such as journalism, politics, civil and criminal litigation, and military and intelligence... more
Introductory material to the online course "Digital Video Forensics: Uncovering the Truth in a World of Distorted Realities"
Due to the ease of access to platforms that can be used by forgers to tamper digital documents, providing automatic tools for identifying forged images is now a hot research field in image processing. This paper presents a novel forgery... more
Digital image tampering becomes a common information falsification trend. Copy-Move forgery is one of the tampering types that are used. Image forgery is the science of detecting image tempering whether with a previous knowledge about the... more
Determining the authenticity of an image is now an important area of research .In our work,we attempt to classify whether a digital image is a genuine image or is a manipulated version of some authentic image.We have applied three... more
The study of facial growth is explored in many fields of science, including anatomy, genetics, and forensics. In the field of forensics, it acts as a valuable tool for combating child pornography. The present research proposes a new... more
With the tremendous growth and usage of digital images nowadays, the integrity and authenticity of digital content is becoming increasingly important, and a growing concern to many government and commercial sectors. Image Forensics, based... more
Data and information security technique is a way to keep an object confidential. eXchangable Image File Format (EXIF) Metadata is data information about digital image. In the digital forensic investigation, this is very useful for... more
Apart from robustness and accuracy of copy-paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the... more
The study of facial growth is explored in many fields of science, including anatomy, genetics, and forensics. In the field of forensics, it acts as a valuable tool for combating child pornography. The present research proposes a new... more
Apart from robustness and accuracy of copy-paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the... more
We investigate if the random feature selection approach proposed in [1] to improve the robustness of forensic detectors to targeted attacks, can be extended to detectors based on deep learning features. In particular, we study the... more
We investigate if the random feature selection approach proposed in [1] to improve the robustness of forensic detectors to targeted attacks , can be extended to detectors based on deep learning features. In particular, we study the... more
Apart from robustness and accuracy of copy–paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the... more
Digital image tampering becomes a common information falsification trend. Copy-Move forgery is one of the tampering types that are used. Image forgery is the science of detecting image tempering whether with a previous knowledge about the... more
The study of facial growth is explored in many fields of science, including anatomy, genetics, and forensics. In the field of forensics, it acts as a valuable tool for combating child pornography. The present research proposes a new... more
Copy move (CM) is a common type of forgery which creates tampered image by covering some important part of the image by replacing it with some other part of the same image. Therefore, forgery detection techniques are required to identify... more
Image forgery is nowadays widely used as digital images are easy to manipulate due to high availability of powerful image processing tools. It is possible to add or remove objects from an image without leaving any visible traces of... more
Postmortem analysis of the ocular globe is an important topic for forensic pathology and transplantology. Although crucial elements may be gathered from examining cadaveric eyes, the latter do not routinely undergo in-depth analysis. The... more
Image forgery detection is currently one of the interested research fields of image processing. Copy-Move (CM) forgery is one of the most commonly techniques. In this paper, we propose an efficient methodology for fast CM forgery... more
Digital image tampering becomes a common information falsification trend. Copy-Move forgery is one of the tampering types that are used. Image forgery is the science of detecting image tempering whether with a previous knowledge about the... more
We investigate if the random feature selection approach proposed in [1] to improve the robustness of forensic detectors to targeted attacks , can be extended to detectors based on deep learning features. In particular, we study the... more
Image retrieval from large databases, such as popular social networks, collections of surveillance images and videos, or digital investigation archives, is a very important task for a number of applications. In digital investigation,... more
Digital image tampering becomes a common information falsification trend. Copy-Move forgery is one of the tampering types that are used. Image forgery is the science of detecting image tempering whether with a previous knowledge about the... more
Whilst it is sometimes essential that a scene is well lit before image capture, too much light can cause exposure or glare-based problems. Typically, glare is introduced to images when the camera is pointed towards the light source, and... more
The distribution of digital images with the classic and newest technologies available on Internet (e.g., emails, social networks, digital repositories) has induced a growing interest on systems able to protect the visual content against... more