85
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Photo forgery detection using RGB color model permutations

& ORCID Icon
Pages 87-101 | Received 23 Mar 2020, Accepted 25 Dec 2022, Published online: 31 Jan 2023

References

  • Pathak D, Krahenbuhl P, Donahue J, et al. Context encoders: feature learning by inpainting. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2016: 2536–2544. doi:10.1109/CVPR.2016.278.
  • Luan F, Paris S, Shechtman E, et al. Deep photo style transfer. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2017: 6997–7005. doi:10.1109/CVPR.2017.740.
  • Korus P, Huang J. Multi-scale analysis strategies in PRNU-based tampering localization. IEEE Trans Inf Forensics Secur. 2017. doi:10.1109/TIFS.2016.2636089.
  • Chierchia G, Poggi G, Sansone C, et al. A Bayesian-MRF approach for PRNU-based image forgery detection. IEEE Trans Inf Forensics Secur. 2014;9(4):554–567. doi:10.1109/TIFS.2014.2302078.
  • Ferrara P, Bianchi T, De Rosa A, et al. Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans Inf Forensics Secur. 2012;7(5):1566–1577. doi:10.1109/TIFS.2012.2202227.
  • Singh A, Singh G, Singh K. A Markov based image forgery detection approach by analyzing CFA artifacts. Multimed Tools Appl. 2018. doi:10.1007/s11042-018-6075-5.
  • Matern F, Riess C, Stamminger M. Gradient-based illumination description for image forgery detection. IEEE Trans Inf Forensics Secur. 2020;15:1303–1317. doi:10.1109/TIFS.2019.2935913.
  • “Images corpus of the 1st IEEE IFS-TC image forensics challenge,” Available at: http://ifc.recod.ic. unicamp.br/fc.website/index.py?sec=5.
  • Carvalho T, Farid H, Kee E. SPIE proceedings. Media Watermarking, Security, and Forensics 2015. 2015. doi:10.1117/12.2075544.
  • Peng B, Wang W, Dong J, et al. Optimized 3D lighting environment estimation for image forgery detection. IEEE Trans Inf Forensics Secur. 2017;12(2):479–494. doi:10.1109/TIFS.2016.2623589.
  • Wei H, Yao H, Qin C, et al. Advances in intelligent systems and computing. Advances in Intelligent Systems and Computing. 2020. doi:10.1007/978-3-030-16946-6_18.
  • Lin C-S, Tsay J-J. Passive forgery detection using discrete cosine transform coefficient analysis in JPEG compressed images. J Electron Imaging. 2016. doi:10.1117/1.jei.25.3.033010.
  • He Z, Lu W, Sun W, et al. Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognit. 2012;45(12):4292–4299. doi:10.1016/j.patcog.2012.05.014.
  • Muhammad G, Al-Hammadi MH, Hussain M, et al. Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl. 2014 May;25(4):985–995. doi:10.1007/s00138-013-0547-4.
  • Moghaddasi Z, Jalab HA, Md Noor R, et al. Improving RLRN image splicing detection with the use of PCA and Kernel PCA. Scientific World J. 2014;2014:1–10. doi:10.1155/2014/606570.
  • Agarwal S, Chand S. Threshold based image fusion in dual tree complex wavelet domain. Int J Image, Graph Signal Process. 2016;8:64–74. doi:10.5815/ijigsp.2015.10.08.
  • Hakimi F, Hariri M, Gharehbaghi F. Image splicing forgery detection using local binary pattern and discrete wavelet transform. in Conference Proceedings of 2015 2nd International Conference on Knowledge-Based Engineering and Innovation, KBEI 2015. 2015: 1074–1077. doi:10.1109/KBEI.2015.7436195.
  • Kanwal N, Girdhar A, Kaur L, et al. Digital image splicing detection technique using optimal threshold based local ternary pattern. Multimed Tools Appl. 2020. doi:10.1007/s11042-020-08621-2.
  • Jaiswal AK, Srivastava R. A technique for image splicing detection using hybrid feature set. Multimed Tools Appl. 2020 Jan. doi:10.1007/s11042-019-08480-6.
  • Dong J, Wang W, Tan T. CASIA image tampering detection evaluation database. 2013 IEEE China Summit Int Conf Signal Inf Process. ChinaSIP 2013 - Proc. 2013: 422–426. doi:10.1109/ChinaSIP.2013.6625374.
  • Ahonen T, Hadid A, Pietikäinen M. Face recognition with local binary patterns. Eur Conf Comput Vis. 2004;3021:469–481. doi:10.1007/978-3-540-24670-1_36.
  • Hsu Y, Chang S. Detecting image splicing using geometry invariants and camera characteristics consistency. 2006 IEEE International Conference on Multimedia and Expo. 2006;vol. 2006:549–552. doi:10.1109/ICME.2006.262447.
  • Lenz R, Latorre Carmona P. Communications in computer and information science. Communications in Computer and Information Science. 2010;68 CCIS(3):188–200. doi:10.1007/978-3-642-11840-1_14
  • Smeulders AWM, Worring M, Santini S, et al. Content-based image retrieval at the end of the early years. IEEE Trans Pattern Anal Mach Intell. 2000;22(12):1349–1380. doi:10.1109/34.895972.
  • Gevers T, Smeulders AWM. Pictoseek: combining color and shape invariant features for image retrieval. IEEE Trans Image Process. 2000;9(1):102–119. doi:10.1109/83.817602.
  • Weber A. The USC-SIPI image data base: version 4. Tech. Report#244. 1993.
  • Yang Y, Kamboh A, Mason AJ. Adaptive threshold spike detection using stationary wavelet transform for neural recording implants. 2010 IEEE Biomedical Circuits and Systems Conference, BioCAS 2010. 2010: 9–12. doi:10.1109/BIOCAS.2010.5709558.
  • Agarwal S, Chand S. Image Forgery Detection Using Markov Features in Undecimated Wavelet Transform. 2016.
  • Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur. 2010 Jun;5(2):215–224. doi:10.1109/TIFS.2010.2045842.
  • Agarwal S, Chand S. A content-adaptive median filtering detection using Markov transition probability matrix of pixel intensity residuals. J Appl Secur Res. 2019 Jan;14(1):88–105. doi:10.1080/19361610.2019.1545274.
  • Nosaka R, Ohkawa Y, Fukui K. Lecture notes in computer science. Proc 5th Pacific Rim Conf Adv Image Video Technol. - Vol. Part II. 2012: 82–91. doi:10.1007/978-3-642-25346-1_8.
  • Gragnaniello D, Poggi G, Sansone C, et al. An investigation of local descriptors for biometric spoofing detection. IEEE Trans Inf Forensics Secur. 2015;10(4):849–863. doi:10.1109/TIFS.2015.2404294.
  • Lumini A, Nanni L, Brahnam S. Ensemble of texture descriptors and classifiers for face recognition. Appl Comput Informatics. 2017 Jan;13(1):79–91. doi:10.1016/j.aci.2016.04.001.
  • Roffo G, Melzi S, Cristani M. Infinite feature selection. 2015 IEEE International Conference on Computer Vision (ICCV). 2015;2015 Inter:4202–4210. doi:10.1109/ICCV.2015.478.
  • Bhanot K, Peddoju SK, Bhardwaj T. A model to find optimal percentage of training and testing data for efficient ECG analysis using neural network. Int J Syst Assur Eng Manag. Feb. 2018;9(1):12–17. doi:10.1007/s13198-015-0398-7.
  • Cozzolino D, Gragnaniello D, Verdoliva L. Image forgery detection based on the fusion of machine learning and block-matching methods. arXiv Prepr. arXiv1311.6934. Nov. 2013: 268–271.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.