References
- Ahmed, N., Natarajan, T., & Rao, K. R. (1974). Discrete cosine transform. IEEE Transactions on Computers, C-23(1), 90–93. https://doi.org/https://doi.org/10.1109/T-C.1974.223784
- Alahmadi, A. A., Hussain, M., Aboalsamh, H., Muhammad, G., & Bebis, G. (2013). Splicing image forgery detection based on DCT and local binary pattern. In 2013 IEEE Global Conference on Signal and Information Processing (pp. 253–256). IEEE.
- Alahmadi, A., Hussain, M., Aboalsamh, H., Muhammad, G., Bebis, G., & Mathkour, H. (2017). Passive detection of image forgery using DCT and local binary pattern. Signal, Image and Video Processing, 11(1), 81–88. https://doi.org/https://doi.org/10.1007/s11760-016-0899-0
- Alkawaz, M. H., Sulong, G., Saba, T., & Rehman, A. (2018). Detection of copy-move image forgery based on discrete cosine transform. Neural Computing and Applications, 30(1), 183–192. https://doi.org/https://doi.org/10.1007/s00521-016-2663-3
- Ambili, B., & George, N. (2017). A robust technique for splicing detection in tampered blurred images. In 2017 International Conference on Trends in Electronics and Informatics (ICEI) (pp. 897–901). IEEE.
- Anusudha, K., Koshie, S. A., Ganesh, S. S., & Mohanaprasad, K. (2010). Image splicing detection involving moment-based feature extraction and classification using artificial neural networks. ACEEE International Journal on Signal & Image Processing, 1, 9–13.
- Bayar, B., & Stamm, M. C. (2016). A deep learning approach to universal image manipulation detection using a new convolutional layer. In IH and MMSec 2016 - Proceedings of the 2016 ACM Information Hiding and Multimedia Security Workshop (pp. 5–10). Association for Computing Machinery, Inc.
- Birajdar, G. K., & Mankar, V. H. (2013). Digital image forgery detection using passive techniques: A survey. Digital Investigation, 10(3), 226–245. https://doi.org/https://doi.org/10.1016/j.diin.2013.04.007
- Bouckaert, R. R. (2004). Bayesian network classifiers in weka. University of Waikato, Department of Computer Science.
- Breiman, L. (1996). Bagging predictors. Machine Learning, 24(2), 123–140. https://doi.org/https://doi.org/10.1007/BF00058655
- Breiman, L. (2001). Random forests. Machine Learning, 45(1), 5–32. https://doi.org/https://doi.org/10.1023/A:1010933404324
- Carvalho, T., Faria, F. A., Pedrini, H., Torres, R. S. D., & Rocha, A. (2016). Illuminant-based transformed spaces for image forensics. IEEE Transactions on Information Forensics and Security, 11(4), 720–733. https://doi.org/https://doi.org/10.1109/TIFS.2015.2506548
- Carvalho, TJd., Riess, C., Angelopoulou, E., Pedrini, H., & Rocha, AdR. (2013). Exposing digital image forgeries by illumination color classification. IEEE Transactions on Information Forensics and Security, 8(7), 1182–1194. https://doi.org/https://doi.org/10.1109/TIFS.2013.2265677
- Chang, C. C., & Lin, C. J. (2011). Libsvm: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2(3), 1–27. https://doi.org/https://doi.org/10.1145/1961189.1961199
- Chen, B., Qi, X., Sun, X., & Shi, Y. Q. (2017). Quaternion pseudo-zernike moments combining both of rgb information and depth information for color image splicing detection. Journal of Visual Communication and Image Representation, 49, 283–290. https://doi.org/https://doi.org/10.1016/j.jvcir.2017.08.011
- Chierchia, G., Poggi, G., Sansone, C., & Verdoliva, L. (2014). A bayesian-mrf approach for prnu-based image forgery detection. IEEE Transactions on Information Forensics and Security, 9(4), 554–567. https://doi.org/https://doi.org/10.1109/TIFS.2014.2302078
- Cohen, W. W. (1995). Fast effective rule induction. In Machine learning proceedings (pp. 115–123). Elsevier.
- Dang, L. M., Hassan, S. I., Im, S., & Moon, H. (2019). Face image manipulation detection based on a convolutional neural network. Expert Systems with Applications, 129, 156–168. https://doi.org/https://doi.org/10.1016/j.eswa.2019.04.005
- Dong, J., Wang, W., & Tan, T. (2013). Casia image tampering detection evaluation database. In 2013 IEEE China Summit and International Conference on Signal and Information Processing, China (pp. 422–426). IEEE.
- EL-Manzalawy, Y., Honavar, V. (2005). WLSVM: Integrating LibSVM into Weka Environment. Software available at http://www.cs.iastate.edu/∼yasser/wlsvm.
- Fan, W., Wang, K., Cayre, F., & Xiong, Z. (2012). 3d lighting-based image forgery detection using shape-from-shading. In 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO) (pp. 1777–1781). IEEE.
- Farid, H. (2009a). Exposing digital forgeries from jpeg ghosts. IEEE Transactions on Information Forensics and Security, 4(1), 154–160. https://doi.org/https://doi.org/10.1109/TIFS.2008.2012215
- Farid, H. (2009b). Image forgery detection a survey. IEEE Signal Processing Magazine, 26(2), 16–25. https://doi.org/https://doi.org/10.1109/MSP.2008.931079
- Farid, H. (2016). Photo forensics. MIT Press.
- Farid, H. (2019). Image forensics. Annual Review of Vision Science, 5(1), 549–573. https://doi.org/https://doi.org/10.1146/annurev-vision-091718-014827
- Ferreira, A., Felipussi, S. C., Alfaro, C., Fonseca, P., Vargas-Munoz, J. E., Dos Santos, J. A., & Rocha, A. (2016). Behavior knowledge space-based fusion for Copy-Move Forgery Detection. IEEE Transactions on Image Processing : A Publication of the IEEE Signal Processing Society, 25(10), 4729–4742. https://doi.org/https://doi.org/10.1109/TIP.2016.2593583
- Frank, E., Hall, M. A., & Witten, I. H. (2016). The WEKA workbench. Morgan Kaufmann.
- Frank, E., Wang, Y., Inglis, S., Holmes, G., & Witten, I. H. (1998). Using model trees for classification. Machine Learning, 32(1), 63–76. https://doi.org/https://doi.org/10.1023/A:1007421302149
- Frank, E., & Witten, I. H. (1998). Generating accurate rule sets without global optimization. University of Waikato, Department of Computer Science.
- Freund, Y., & Schapire, R. E. (1996). Experiments with a new boosting algorithm. In ICML’96: Proceedings of the Thirteenth International Conference on International Conference on Machine Learning (pp. 148–156). ACM
- Friedman, J., Hastie, T., & Tibshirani, R. (2000). Additive logistic regression: A statistical view of boosting (with discussion and a rejoinder by the authors). The Annals of Statistics, 28(2), 337–407. https://doi.org/https://doi.org/10.1214/aos/1016218223
- Ghorbani, M., Firouzmand, M., & Faraahi, A. (2011). DWT-DCT (QCD) based copy-move image forgery detection. In 2011 18th International Conference on Systems, Signals and Image Processing (pp. 1–4). IEEE.
- Gokhale, A., Mulay, P., Pramod, D., & Kulkarni, R. (2020). A bibliometric analysis of digital image forensics. Science & Technology Libraries, 39(1), 96–113. https://doi.org/https://doi.org/10.1080/0194262X.2020.1714529
- Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2014). Generative adversarial nets. In Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, & K. Q. Weinberger (Eds.), Advances in neural information processing systems (pp. 2672–2680). NIPS.
- Guan, H., Kozak, M., Robertson, E., Lee, Y., Yates, A. N., Delgado, A., Zhou, D., Kheyrkhah, T., Smith, J., & Fiscus, J. (2019). Mfc datasets: Large-scale benchmark datasets for media forensic challenge evaluation [Paper presentation]. 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW) (pp. 63–72). IEEE. https://doi.org/https://doi.org/10.1109/WACVW.2019.00018
- Han, J. G., Park, T. H., Moon, Y. H., & Eom, I. K. (2016). Efficient Markov feature extraction method for image splicing detection using maximization and threshold expansion. Journal of Electronic Imaging, 25(2), 023031. https://doi.org/https://doi.org/10.1117/1.JEI.25.2.023031
- He, Z., Lu, W., Sun, W., & Huang, J. (2012). Digital image splicing detection based on markov features in DCT and DWT domain. Pattern Recognition, 45(12), 4292–4299. https://doi.org/https://doi.org/10.1016/j.patcog.2012.05.014
- Hearst, M. A., Dumais, S. T., Osuna, E., Platt, J., & Scholkopf, B. (1998). Support vector machines. IEEE Intelligent Systems and Their Applications, 13(4), 18–28. https://doi.org/https://doi.org/10.1109/5254.708428
- Hinton, G. E. (1987). Learning translation invariant recognition in a massively parallel networks. In International Conference on Parallel Architectures and Languages Europe (pp. 1–13). Springer.
- Hsu, C. C., Lee, C. Y., & Zhuang, Y. X. (2018). Learning to detect fake face images in the wild [Paper presentation]. 2018 International Symposium on Computer, Consumer and Control (IS3C) (pp. 388–391), Taichung, Taiwan. IEEE. https://doi.org/https://doi.org/10.1109/IS3C.2018.00104
- Hsu, Y. F., & Chang, S. F. (2006). Detecting image splicing using geometry invariants and camera characteristics consistency [Paper presentation]. 2006 IEEE International Conference on Multimedia and Expo (pp. 549–552), Toronto, Ontario, Canada. https://doi.org/https://doi.org/10.1109/ICME.2006.262447
- IEEE. 2013. IFS-TC image forensics challenge. Retrieved May 25, 2020, from https://signalprocessingsociety.org/newsletter/2013/06/ifs-tc-image-forensics-challenge
- Jaiswal, A. K., & Srivastava, R. (2020). A technique for image splicing detection using hybrid feature set. Multimedia Tools and Applications, 79(17–18), 11837–11824. https://doi.org/https://doi.org/10.1007/s11042-019-08480-6
- John, G. H., & Langley, P. (1995). Estimating continuous distributions in bayesian classifiers. In UAI’95: Proceedings of the Eleventh conference on Uncertainty in artificial intelligence (pp. 338–345). Morgan Kaufmann Publishers Inc.
- Johnson, M. K., & Farid, H. (2006). Exposing digital forgeries through chromatic aberration. In Proceedings of the 8th workshop on Multimedia and security (pp. 48–55). ACM.
- Johnson, M. K., & Farid, H. (2007a). Exposing digital forgeries in complex lighting environments. IEEE Transactions on Information Forensics and Security, 2(3), 450–461. https://doi.org/https://doi.org/10.1109/TIFS.2007.903848
- Kee, E., & Farid, H. (2010). Exposing digital forgeries from 3-d lighting environments. In 2010 IEEE International Workshop on Information Forensics and Security (pp. 1–6). IEEE.
- Kee, E., Johnson, M. K., & Farid, H. (2011). Digital image authentication from jpeg headers. IEEE Transactions on Information Forensics and Security, 6(3), 1066–1075. https://doi.org/https://doi.org/10.1109/TIFS.2011.2128309
- Kee, E., O’brien, J. F., & Farid, H. (2014). Exposing photo manipulation from shading and shadows. ACM Transactions on Graphics, 33(5), 1–1. https://doi.org/https://doi.org/10.1145/2629646
- Kekre, H., & Thepade, S. D. (2008). Boosting block truncation coding with Kekre’s luv color space for image retrieval. International Journal of Electrical, Computer, and Systems Engineering, 2, 172–180.
- Kekre, H., & Thepade, S. D. (2009). Image retrieval using non-involutional orthogonal Kekre’s transform. International Journal of Multidisciplinary Research and Advances in Engineering (IJMRAE), Ascent Publication House, 1, 189–203.
- Kekre, H., Sarode, T. K., Thepade, S. D., & Vaishali, V. (2011). Improved texture feature based image retrieval using Kekre’s fast codebook generation algorithm. In Thinkquest˜2010 (pp. 143–149). Springer.
- Kekre, H., Thepade, S. D., & Maloo, A. (2010b). Image retrieval using fractional coefficients of transformed image using DCT and Walsh transform. International Journal of Computer Applications, 4(10), 1–371. https://doi.org/https://doi.org/10.5120/866-1216
- Kekre, H., Thepade, S. D., & Maloo, A. (2010c). Performance comparison of image retrieval using fractional coefficients of transformed image using DCT, Walsh, Haar and Kekre’s transform. International Journal of Computer Applications, 4(10), 1–155. https://doi.org/https://doi.org/10.5120/866-1216
- Kekre, H., Thepade, S. D., Athawale, A., Shah, A., Verlekar, P., & Shirke, S. (2010a). Energy compaction and image splitting for image retrieval using Kekre transform over row and column feature vectors. International Journal of Computer Science and Network Security, 10, 289–298.
- Kleinbaum, D.G., & Klein, M. (2010). Introduction to logistic regression. In Logistic regression. Statistics for Biology and Health (pp. 1–39). Springer.
- Kohavi, R. (1995). The power of decision tables. In European conference on machine learning (pp. 174–189). Springer.
- Landwehr, N., Hall, M., & Frank, E. (2005). Logistic model trees. Machine Learning, 59(1–2), 161–205. https://doi.org/https://doi.org/10.1007/s10994-005-0466-3
- Li, X., Jing, T., & Li, X. (2010). Image splicing detection based on moment features and Hilbert-Huang transform. In 2010 IEEE international conference on information theory and information security (pp. 1127–1130). IEEE.
- Lin, C. S., & Tsay, J. J. (2016). Passive forgery detection using discrete cosine transform coefficient analysis in jpeg compressed images. Journal of Electronic Imaging, 25(3), 033010. https://doi.org/https://doi.org/10.1117/1.JEI.25.3.033010
- Mahmood, T., Mehmood, Z., Shah, M., & Saba, T. (2018). A robust technique for copymove forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. Journal of Visual Communication and Image Representation, 53, 202–214. https://doi.org/https://doi.org/10.1016/j.jvcir.2018.03.015
- Mayer, O., & Stamm, M. C. (2018). Accurate and efficient image forgery detection using lateral chromatic aberration. IEEE Transactions on Information Forensics and Security, 13(7), 1762–1777. https://doi.org/https://doi.org/10.1109/TIFS.2018.2799421
- Mayer, O., Bayar, B., & Stamm, M. C. (2018). Learning unified deep-features for multiple forensic tasks [Paper presentation]. IH and MMSec 2018 - Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security (pp. 79–84), Association for Computing Machinery, Inc, Innsbruck, Austria. https://doi.org/https://doi.org/10.1145/3206004.3206022
- McCallum, A., & Nigam, K. (1998). A comparison of event models for Naive Bayes text classification. In AAAI-98 workshop on learning for text categorization (pp. 41–48). AAAI Press.
- Menard, S. (2002). Applied logistic regression analysis. vol. 106. SAGE.
- Muhammad, G., Al-Hammadi, M. H., Hussain, M., & Bebis, G. (2014). Image forgery detection using steerable pyramid transform and local binary pattern. Machine Vision and Applications, 25(4), 985–995. https://doi.org/https://doi.org/10.1007/s00138-013-0547-4
- Neubert, T. (2017). Face morphing detection: An approach based on image degradation analysis. In International Workshop on Digital Watermarking (pp. 93–106). Springer.
- Ng, T. T., & Chang, S. F. (2006). An online system for classifying computer graphics images from natural photographs [Paper presentation]. Security, steganography, and watermarking of multimedia contents VIII (p. 607211), International Society for Optics and Photonics, San Jose, CA, USA. https://doi.org/https://doi.org/10.1117/12.650162
- Ng, T., & Chang, S. (2004). Blind detection of digital photomontage using higher (ADVENT Technical Report #201-2004-1). Columbia University.
- Otsu, N. (1979). A threshold selection method from gray-level histograms. IEEE Transactions on Systems, Man, and Cybernetics, 9(1), 62–66. https://doi.org/https://doi.org/10.1109/TSMC.1979.4310076
- Peng, B., Wang, W., Dong, J., & Tan, T. (2017). Optimized 3d lighting environment estimation for image forgery detection. IEEE Transactions on Information Forensics and Security, 12(2), 479–494. https://doi.org/https://doi.org/10.1109/TIFS.2016.2623589
- Platt, J. (1998). Sequential minimal optimization: A fast algorithm for training support vector machines (Technical Report MSR-TR-98-14), 1–21. Microsoft, Research.
- Pomari, T., Ruppert, G., Rezende, E., Rocha, A., & Carvalho, T. (2018). Image splicing detection through illumination inconsistencies and deep learning [Paper presentation]. 2018 25th IEEE International Conference on Image Processing (ICIP) (pp. 3788–3792), IEEE Computer Society, Athens, Greece. https://doi.org/https://doi.org/10.1109/ICIP.2018.8451227
- Quinlan, J. R. (1993). C4. 5: Programs for machine learning. Morgan Kaufmann Publishers.
- Qureshi, M. A., & Deriche, M. (2015). A bibliography of pixel-based blind image forgery detection techniques. Signal Processing: Image Communication, 39, 46–74. https://doi.org/https://doi.org/10.1016/j.image.2015.08.008
- Rao, Y., & Ni, J. (2016). A deep learning approach to detection of splicing and copy-move forgeries in images. In 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016 (pp. 1–6). Institute of Electrical and Electronics Engineers Inc.
- Rao, Y., Ni, J., & Zhao, H. (2020). Deep learning local descriptor for image splicing detection and localization. IEEE Access, 8, 25611–25625. https://doi.org/https://doi.org/10.1109/ACCESS.2020.2970735
- Rosebrock, A. (2017). Image difference with OpenCV and Python. Retrieved May 25, 2020, from https://www.pyimagesearch.com/2017/06/19/image-difference-with-opencv-and-python/
- Salloum, R., Ren, Y., & Kuo, C. C. J. (2018). Image splicing localization using a multitask fully convolutional network (MFCN). Journal of Visual Communication and Image Representation, 51, 201–209. https://doi.org/https://doi.org/10.1016/j.jvcir.2018.01.010
- Salzberg, S. L. (1994). C4.5: Programs for machine learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993. Machine Learning, 16, 235–240.
- Shi, Y. Q., Chen, C., & Chen, W. (2007). A natural image model approach to splicing detection [Paper presentation]. MM and Sec’07 - Proceedings of the Multimedia and Security Workshop 2007 (pp. 51–62), Dallas, Texas, USA.
- Vidyadharan, D. S., & Thampi, S. M. (2017). Digital image forgery detection using compact multi-texture representation. Journal of Intelligent & Fuzzy Systems, 32(4), 3177–3188. https://doi.org/https://doi.org/10.3233/JIFS-169261
- Watson, A. B. (1994). Image compression using the discrete cosine transform. Mathematica Journal, 4, 81.
- Witten, I. H., Frank, E., Trigg, L. E., Hall, M. A., Holmes, G., & Cunningham, S. J. (1999). Weka: Practical machine learning tools and techniques with Java implementations. University of Waikato, Department of Computer Science.
- Yao, H., Wang, S., Zhang, X., Qin, C., & Wang, J. (2017). Detecting image splicing based on noise level inconsistency. Multimedia Tools and Applications, 76(10), 12457–12479. https://doi.org/https://doi.org/10.1007/s11042-016-3660-3
- Zampoglou, M., Papadopoulos, S., & Kompatsiaris, Y. (2015). Detecting image splicing in the wild (web). In 2015 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2015 (pp. 1–6). Institute of Electrical and Electronics Engineers Inc.
- Zheng, L., Zhang, Y., & Thing, V. L. L. (2019). A survey on image tampering and its detection in real-world photos. Journal of Visual Communication and Image Representation, 58, 380–399. https://doi.org/https://doi.org/10.1016/j.jvcir.2018.12.022