A survey on passive-blind image forgery by doctor method detection
With the huge increasing use of digital photography, and the advent of high-performance commodity hardware and the presence of low-cost image editing softwares over the past few years, finding a credible method to detect digital imagepsilas authenticity and getting the result that which method the t...
Saved in:
Published in | 2008 International Conference on Machine Learning and Cybernetics Vol. 6; pp. 3463 - 3467 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.07.2008
|
Subjects | |
Online Access | Get full text |
ISBN | 1424420954 9781424420957 |
ISSN | 2160-133X |
DOI | 10.1109/ICMLC.2008.4621003 |
Cover
Abstract | With the huge increasing use of digital photography, and the advent of high-performance commodity hardware and the presence of low-cost image editing softwares over the past few years, finding a credible method to detect digital imagepsilas authenticity and getting the result that which method the tampered image was applied to becomes a very valuable topic. In this paper, associating with the common forge methods, we propose the process of passive-blue detection of digital imagepsilas forging method, and then review the latest development of the passive-blind detection of image forging method, mainly include the detection of copy.move forgery, detection of blur forgery and detection of re-sample forgery. |
---|---|
AbstractList | With the huge increasing use of digital photography, and the advent of high-performance commodity hardware and the presence of low-cost image editing softwares over the past few years, finding a credible method to detect digital imagepsilas authenticity and getting the result that which method the tampered image was applied to becomes a very valuable topic. In this paper, associating with the common forge methods, we propose the process of passive-blue detection of digital imagepsilas forging method, and then review the latest development of the passive-blind detection of image forging method, mainly include the detection of copy.move forgery, detection of blur forgery and detection of re-sample forgery. |
Author | Zhen Zhang Yuan Ren Shan-Zhong Zhang Zhi-Yong He Xi-Jian Ping |
Author_xml | – sequence: 1 surname: Zhen Zhang fullname: Zhen Zhang organization: Coll. of Inf. Eng., Inf. Eng. Univ., Zhengzhou – sequence: 2 surname: Yuan Ren fullname: Yuan Ren – sequence: 3 surname: Xi-Jian Ping fullname: Xi-Jian Ping – sequence: 4 surname: Zhi-Yong He fullname: Zhi-Yong He – sequence: 5 surname: Shan-Zhong Zhang fullname: Shan-Zhong Zhang |
BookMark | eNo1kMtKw0AYhUdswabmBXQzL5D4zyVzWdbgpRBxo-CuTGb-1EibKUks5O2tWM_mcBbf4XASMutih4TcMMgZA3u3Ll-qMucAJpeKMwBxQVKrDZNcSg5WyUuS_IdCzsiCMwUZE-JjTpJfzgJIza5IOgxfcJKwhRJ8Qe5XdPjujzjR2NGDG4b2iFm9a7tA273bIm1iv8V-ovVEQ_Rj7Okex88YaMAR_djG7prMG7cbMD37krw_PryVz1n1-rQuV1XWMl2MmfG-CNZz0XChJEpfi-CVcmgCOBOMdt7VikNTu0IKXXDZCK6ZU6CZ8sGKJbn9620RcXPoT_v6aXP-Q_wAa5hRQw |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICMLC.2008.4621003 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9781424420964 1424420962 |
EndPage | 3467 |
ExternalDocumentID | 4621003 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IPLJI M43 OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-8cc5d9c23f2364e4cb3dc66ae8d0a8d87acab620fba5437524f3271a60716cd93 |
IEDL.DBID | RIE |
ISBN | 1424420954 9781424420957 |
ISSN | 2160-133X |
IngestDate | Wed Aug 27 01:39:27 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCN | 2008900471 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-8cc5d9c23f2364e4cb3dc66ae8d0a8d87acab620fba5437524f3271a60716cd93 |
PageCount | 5 |
ParticipantIDs | ieee_primary_4621003 |
PublicationCentury | 2000 |
PublicationDate | 2008-July |
PublicationDateYYYYMMDD | 2008-07-01 |
PublicationDate_xml | – month: 07 year: 2008 text: 2008-July |
PublicationDecade | 2000 |
PublicationTitle | 2008 International Conference on Machine Learning and Cybernetics |
PublicationTitleAbbrev | ICMLC |
PublicationYear | 2008 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000395632 ssj0000744891 |
Score | 1.532017 |
Snippet | With the huge increasing use of digital photography, and the advent of high-performance commodity hardware and the presence of low-cost image editing softwares... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 3463 |
SubjectTerms | Digital forensics digital image forgery Digital images Eigenvalues and eigenfunctions Forgery Image color analysis Image edge detection Machine learning passive-blind image forgery tempering detection Transform coding |
Title | A survey on passive-blind image forgery by doctor method detection |
URI | https://ieeexplore.ieee.org/document/4621003 |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwFLQKE1OBFvEtD4y4TRzHcUaoqAqiiIFK3Sp_RaoQSVUSpPLreXaSIhADW5whL7Ec-559dw-hq1jLhFIpCUu0dVs3IXGHYcQEgoU2NTLjTuA8feKTGXuYx_MOut5qYay1nnxmB-7Sn-WbQlduq2zIOCQoztpzB4ZZrdXa7qcEESD9RiPp2wkkHr5gHg15QCAVm7e6LgqwgrV2T007aQU1QTq8H00fRzXNson4o_SKX3nGXTRt37kmnLwOqlIN9OcvO8f_ftQ-6n9r_PDzdvU6QB2bH6JuW-QBN_98D93e4Pdq_WE3uMjxCqA2TI9EATg1ePkGkxHOCi-sxmqDIRqk8LiuSo2NLT3PK--j2fjuZTQhTeEFsgQ0URKhdWxSTaPM2ctbplVkNOfSChNIYUQitVScBpmSMYuSmLIsokkonVcd1yaNjtBuXuT2GOFIhkqoOItFmDHFhEzhaTwG2MGphBAnqOe6ZLGqvTUWTW-c_n37DO3VfA1Hlz1Hu-W6shcACkp16UfDF09brko |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELaqMsBUoEW88cBI2sSxnWSEiqqFtmJopW6VX5EqRFKVBKn8es55FIEY2OIMucRyfN-dv-8OoVumRECIEA4NlLGpG8-xh2GOdkPqmUiLmFuB82TKh3P6tGCLBrrbaWGMMQX5zHTtZXGWr1OV21RZj3IIUGxpzz3w-5SVaq1dRsX1AetXKsliHEDoUbTMIx53HQjGFrWyiwCwoHXBp2oc1JIaN-qN-pNxvyRaVjZ_NF8pfM-ghSb1W5eUk9dunsmu-vxV0PG_n3WIOt8qP_yy819HqGGSY9Sq2zzg6q9vo4d7_J5vPswWpwleA9iGDdKRAE81Xr3BdoTjtJBWY7nFYA2CeFz2pcbaZAXTK-mg-eBx1h86VesFZwV4InNCpZiOFPFjW2DeUCV9rTgXJtSuCHUYCCUkJ24sBaN-wAiNfRJ4wlar40pH_glqJmliThH2hSdDyWIWejGVNBQRPI0zAB6cCDBxhtp2SpbrsrrGspqN879v36D94WwyXo5H0-cLdFCyNyx59hI1s01urgAiZPK6WBlfqCmxlw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2008+International+Conference+on+Machine+Learning+and+Cybernetics&rft.atitle=A+survey+on+passive-blind+image+forgery+by+doctor+method+detection&rft.au=Zhen+Zhang&rft.au=Yuan+Ren&rft.au=Xi-Jian+Ping&rft.au=Zhi-Yong+He&rft.date=2008-07-01&rft.pub=IEEE&rft.isbn=9781424420957&rft.issn=2160-133X&rft.volume=6&rft.spage=3463&rft.epage=3467&rft_id=info:doi/10.1109%2FICMLC.2008.4621003&rft.externalDocID=4621003 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2160-133X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2160-133X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2160-133X&client=summon |