A survey on passive-blind image forgery by doctor method detection

With the huge increasing use of digital photography, and the advent of high-performance commodity hardware and the presence of low-cost image editing softwares over the past few years, finding a credible method to detect digital imagepsilas authenticity and getting the result that which method the t...

Full description

Saved in:
Bibliographic Details
Published in2008 International Conference on Machine Learning and Cybernetics Vol. 6; pp. 3463 - 3467
Main Authors Zhen Zhang, Yuan Ren, Xi-Jian Ping, Zhi-Yong He, Shan-Zhong Zhang
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2008
Subjects
Online AccessGet full text
ISBN1424420954
9781424420957
ISSN2160-133X
DOI10.1109/ICMLC.2008.4621003

Cover

Abstract With the huge increasing use of digital photography, and the advent of high-performance commodity hardware and the presence of low-cost image editing softwares over the past few years, finding a credible method to detect digital imagepsilas authenticity and getting the result that which method the tampered image was applied to becomes a very valuable topic. In this paper, associating with the common forge methods, we propose the process of passive-blue detection of digital imagepsilas forging method, and then review the latest development of the passive-blind detection of image forging method, mainly include the detection of copy.move forgery, detection of blur forgery and detection of re-sample forgery.
AbstractList With the huge increasing use of digital photography, and the advent of high-performance commodity hardware and the presence of low-cost image editing softwares over the past few years, finding a credible method to detect digital imagepsilas authenticity and getting the result that which method the tampered image was applied to becomes a very valuable topic. In this paper, associating with the common forge methods, we propose the process of passive-blue detection of digital imagepsilas forging method, and then review the latest development of the passive-blind detection of image forging method, mainly include the detection of copy.move forgery, detection of blur forgery and detection of re-sample forgery.
Author Zhen Zhang
Yuan Ren
Shan-Zhong Zhang
Zhi-Yong He
Xi-Jian Ping
Author_xml – sequence: 1
  surname: Zhen Zhang
  fullname: Zhen Zhang
  organization: Coll. of Inf. Eng., Inf. Eng. Univ., Zhengzhou
– sequence: 2
  surname: Yuan Ren
  fullname: Yuan Ren
– sequence: 3
  surname: Xi-Jian Ping
  fullname: Xi-Jian Ping
– sequence: 4
  surname: Zhi-Yong He
  fullname: Zhi-Yong He
– sequence: 5
  surname: Shan-Zhong Zhang
  fullname: Shan-Zhong Zhang
BookMark eNo1kMtKw0AYhUdswabmBXQzL5D4zyVzWdbgpRBxo-CuTGb-1EibKUks5O2tWM_mcBbf4XASMutih4TcMMgZA3u3Ll-qMucAJpeKMwBxQVKrDZNcSg5WyUuS_IdCzsiCMwUZE-JjTpJfzgJIza5IOgxfcJKwhRJ8Qe5XdPjujzjR2NGDG4b2iFm9a7tA273bIm1iv8V-ovVEQ_Rj7Okex88YaMAR_djG7prMG7cbMD37krw_PryVz1n1-rQuV1XWMl2MmfG-CNZz0XChJEpfi-CVcmgCOBOMdt7VikNTu0IKXXDZCK6ZU6CZ8sGKJbn9620RcXPoT_v6aXP-Q_wAa5hRQw
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICMLC.2008.4621003
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9781424420964
1424420962
EndPage 3467
ExternalDocumentID 4621003
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IPLJI
M43
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-8cc5d9c23f2364e4cb3dc66ae8d0a8d87acab620fba5437524f3271a60716cd93
IEDL.DBID RIE
ISBN 1424420954
9781424420957
ISSN 2160-133X
IngestDate Wed Aug 27 01:39:27 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2008900471
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-8cc5d9c23f2364e4cb3dc66ae8d0a8d87acab620fba5437524f3271a60716cd93
PageCount 5
ParticipantIDs ieee_primary_4621003
PublicationCentury 2000
PublicationDate 2008-July
PublicationDateYYYYMMDD 2008-07-01
PublicationDate_xml – month: 07
  year: 2008
  text: 2008-July
PublicationDecade 2000
PublicationTitle 2008 International Conference on Machine Learning and Cybernetics
PublicationTitleAbbrev ICMLC
PublicationYear 2008
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000395632
ssj0000744891
Score 1.532017
Snippet With the huge increasing use of digital photography, and the advent of high-performance commodity hardware and the presence of low-cost image editing softwares...
SourceID ieee
SourceType Publisher
StartPage 3463
SubjectTerms Digital forensics
digital image forgery
Digital images
Eigenvalues and eigenfunctions
Forgery
Image color analysis
Image edge detection
Machine learning
passive-blind image forgery
tempering detection
Transform coding
Title A survey on passive-blind image forgery by doctor method detection
URI https://ieeexplore.ieee.org/document/4621003
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwFLQKE1OBFvEtD4y4TRzHcUaoqAqiiIFK3Sp_RaoQSVUSpPLreXaSIhADW5whL7Ec-559dw-hq1jLhFIpCUu0dVs3IXGHYcQEgoU2NTLjTuA8feKTGXuYx_MOut5qYay1nnxmB-7Sn-WbQlduq2zIOCQoztpzB4ZZrdXa7qcEESD9RiPp2wkkHr5gHg15QCAVm7e6LgqwgrV2T007aQU1QTq8H00fRzXNson4o_SKX3nGXTRt37kmnLwOqlIN9OcvO8f_ftQ-6n9r_PDzdvU6QB2bH6JuW-QBN_98D93e4Pdq_WE3uMjxCqA2TI9EATg1ePkGkxHOCi-sxmqDIRqk8LiuSo2NLT3PK--j2fjuZTQhTeEFsgQ0URKhdWxSTaPM2ctbplVkNOfSChNIYUQitVScBpmSMYuSmLIsokkonVcd1yaNjtBuXuT2GOFIhkqoOItFmDHFhEzhaTwG2MGphBAnqOe6ZLGqvTUWTW-c_n37DO3VfA1Hlz1Hu-W6shcACkp16UfDF09brko
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELaqMsBUoEW88cBI2sSxnWSEiqqFtmJopW6VX5EqRFKVBKn8es55FIEY2OIMucRyfN-dv-8OoVumRECIEA4NlLGpG8-xh2GOdkPqmUiLmFuB82TKh3P6tGCLBrrbaWGMMQX5zHTtZXGWr1OV21RZj3IIUGxpzz3w-5SVaq1dRsX1AetXKsliHEDoUbTMIx53HQjGFrWyiwCwoHXBp2oc1JIaN-qN-pNxvyRaVjZ_NF8pfM-ghSb1W5eUk9dunsmu-vxV0PG_n3WIOt8qP_yy819HqGGSY9Sq2zzg6q9vo4d7_J5vPswWpwleA9iGDdKRAE81Xr3BdoTjtJBWY7nFYA2CeFz2pcbaZAXTK-mg-eBx1h86VesFZwV4InNCpZiOFPFjW2DeUCV9rTgXJtSuCHUYCCUkJ24sBaN-wAiNfRJ4wlar40pH_glqJmliThH2hSdDyWIWejGVNBQRPI0zAB6cCDBxhtp2SpbrsrrGspqN879v36D94WwyXo5H0-cLdFCyNyx59hI1s01urgAiZPK6WBlfqCmxlw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2008+International+Conference+on+Machine+Learning+and+Cybernetics&rft.atitle=A+survey+on+passive-blind+image+forgery+by+doctor+method+detection&rft.au=Zhen+Zhang&rft.au=Yuan+Ren&rft.au=Xi-Jian+Ping&rft.au=Zhi-Yong+He&rft.date=2008-07-01&rft.pub=IEEE&rft.isbn=9781424420957&rft.issn=2160-133X&rft.volume=6&rft.spage=3463&rft.epage=3467&rft_id=info:doi/10.1109%2FICMLC.2008.4621003&rft.externalDocID=4621003
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2160-133X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2160-133X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2160-133X&client=summon