Abstract
In this chapter, an introduction to the essence of digital image forensics has been given, including its differences with more widely known multimedia security techniques such as watermarking and steganography. Using illustrative examples, several image forensics techniques have been discussed. This chapter aims to make the reader interested in this budding research domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10(3), 226–245 (2013)
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, vol. 2. Morgan Kaufmann Publishers (2008)
Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of gans for improved quality, stability, and variation (2017). arXiv preprint arXiv:1710.10196
Metro Journalist: Morphed photo of Obama. https://ametrojournalist.wordpress.com/2014/02/06/morphed-photo-of-obama-obama-watching//-modis-speech-namo-metro-journalist/
Naskar, R., Malviya, P., Chakraborty, R.S.: Digital forensics: state-of-the-art and open problems. Innovative Research in Attention Modeling and Computer Vision Applications, pp. 260 (2015)
Roy, A., Chakraborty, R.S.: Optimal distortion estimation for prediction error expansion based reversible watermarking. In: International Workshop on Digital Watermarking, pp. 265–279. Springer (2016)
Roy, A., Chakraborty, R. S.: Towards optimal prediction error expansion based reversible image watermarking. In: IEEE Transactions on Circuits and Systems for Video Technology (2019). https://doi.org/10.1109/TCSVT.2019.2911042
Roy, A., Chakraborty, R.S., Naskar, R.: Reversible color image watermarking in the YCoCg-R color space. In: International Conference on Information Systems Security, pp. 480–498. Springer (2015)
Roy, A., Maiti, A.K., Ghosh, K.: A perception based color image adaptive watermarking scheme in YCbCr space. In: 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), pp. 537–543. IEEE (2015)
Roy, A., Maiti, A.K., Ghosh, K.: An HVS inspired robust non-blind watermarking scheme in YCbCr color space. Int. J. Image Graph. 18(03), 1850015 (2018)
Roy, A., Tariang, D.B., Chakraborty, R.S., Naskar, R.: Discrete cosine transform residual feature based filtering forgery and splicing detection in JPEG images. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1552–1560 (2018)
Tariang, D.B., Roy, A., Chakraborty, R.S., Naskar, R.: Automated JPEG forgery detection with correlation based localization. In: 2017 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pp. 226–231. IEEE (2017)
The New York Times: In an iranian image, a missile too many. https://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile-too-many/
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Roy, A., Dixit, R., Naskar, R., Chakraborty, R.S. (2020). Introduction. In: Digital Image Forensics. Studies in Computational Intelligence, vol 755. Springer, Singapore. https://doi.org/10.1007/978-981-10-7644-2_1
Download citation
DOI: https://doi.org/10.1007/978-981-10-7644-2_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7643-5
Online ISBN: 978-981-10-7644-2
eBook Packages: EngineeringEngineering (R0)