Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    REVIEW

    A Survey of Image Forensics: Exploring Forgery Detection in Image Colorization

    Saurabh Agarwal1, Deepak Sharma2, Nancy Girdhar3, Cheonshik Kim4, Ki-Hyun Jung5,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4195-4221, 2025, DOI:10.32604/cmc.2025.066202 - 30 July 2025

    Abstract In today’s digital era, the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation. Unfortunately, this progress has also given rise to the misuse of manipulated images across various domains. One of the pressing challenges stemming from this advancement is the increasing difficulty in discerning between unaltered and manipulated images. This paper offers a comprehensive survey of existing methodologies for detecting image tampering, shedding light on the diverse approaches employed in the field of contemporary image forensics. The methods used to identify image forgery can be broadly classified into… More >

  • Open Access

    ARTICLE

    DDT-Net: Deep Detail Tracking Network for Image Tampering Detection

    Jim Wong1,2, Zhaoxiang Zang3,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3451-3469, 2025, DOI:10.32604/cmc.2025.061006 - 16 April 2025

    Abstract In the field of image forensics, image tampering detection is a critical and challenging task. Traditional methods based on manually designed feature extraction typically focus on a specific type of tampering operation, which limits their effectiveness in complex scenarios involving multiple forms of tampering. Although deep learning-based methods offer the advantage of automatic feature learning, current approaches still require further improvements in terms of detection accuracy and computational efficiency. To address these challenges, this study applies the U-Net 3+ model to image tampering detection and proposes a hybrid framework, referred to as DDT-Net (Deep Detail… More >

  • Open Access

    ARTICLE

    Detecting Double JPEG Compressed Color Images via an Improved Approach

    Xiaojie Zhao1, Xiankui Meng1, Ruyong Ren2, Shaozhang Niu2,*, Zhenguang Gao3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1765-1781, 2023, DOI:10.32604/cmc.2023.029552 - 06 February 2023

    Abstract Detecting double Joint Photographic Experts Group (JPEG) compression for color images is vital in the field of image forensics. In previous researches, there have been various approaches to detecting double JPEG compression with different quantization matrices. However, the detection of double JPEG color images with the same quantization matrix is still a challenging task. An effective detection approach to extract features is proposed in this paper by combining traditional analysis with Convolutional Neural Networks (CNN). On the one hand, the number of nonzero pixels and the sum of pixel values of color space conversion error… More >

  • Open Access

    REVIEW

    A Thorough Investigation on Image Forgery Detection

    Anjani Kumar Rai*, Subodh Srivastava

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1489-1528, 2023, DOI:10.32604/cmes.2022.020920 - 20 September 2022

    Abstract Image forging is the alteration of a digital image to conceal some of the necessary or helpful information. It cannot be easy to distinguish the modified region from the original image in some circumstances. The demand for authenticity and the integrity of the image drive the detection of a fabricated image. There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files, including re-sampling or copy-moving. This work presents a high-level view of the forensics of digital images and their possible detection approaches. This work presents a thorough analysis of digital image More >

  • Open Access

    REVIEW

    An Overview of Image Tamper Detection

    Xingyu Chen*

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 103-113, 2022, DOI:10.32604/jihpp.2022.039766 - 17 April 2023

    Abstract With the popularization of high-performance electronic imaging equipment and the wide application of digital image editing software, the threshold of digital image editing becomes lower and lower. This makes it easy to trick the human visual system with professionally altered images. These tampered images have brought serious threats to many fields, including personal privacy, news communication, judicial evidence collection, information security and so on. Therefore, the security and reliability of digital information has been increasingly concerned by the international community. In this paper, digital image tamper detection methods are classified according to the clues that More >

  • Open Access

    ARTICLE

    Deep Learning Based Image Forgery Detection Methods

    Liang Xiu-jian1,2,*, Sun He2

    Journal of Cyber Security, Vol.4, No.2, pp. 119-133, 2022, DOI:10.32604/jcs.2022.032915 - 04 July 2022

    Abstract Increasingly advanced image processing technology has made digital image editing easier and easier. With image processing software at one’s fingertips, one can easily alter the content of an image, and the altered image is so realistic that it is illegible to the naked eye. These tampered images have posed a serious threat to personal privacy, social order, and national security. Therefore, detecting and locating tampered areas in images has important practical significance, and has become an important research topic in the field of multimedia information security. In recent years, deep learning technology has been widely… More >

  • Open Access

    ARTICLE

    Resampling Factor Estimation via Dual-Stream Convolutional Neural Network

    Shangjun Luo1, Junwei Luo1, Wei Lu1,*, Yanmei Fang1, Jinhua Zeng2, Shaopei Shi2, Yue Zhang3,4

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 647-657, 2021, DOI:10.32604/cmc.2020.012869 - 30 October 2020

    Abstract The estimation of image resampling factors is an important problem in image forensics. Among all the resampling factor estimation methods, spectrumbased methods are one of the most widely used methods and have attracted a lot of research interest. However, because of inherent ambiguity, spectrum-based methods fail to discriminate upscale and downscale operations without any prior information. In general, the application of resampling leaves detectable traces in both spatial domain and frequency domain of a resampled image. Firstly, the resampling process will introduce correlations between neighboring pixels. In this case, a set of periodic pixels that… More >

  • Open Access

    ARTICLE

    Deep Learning for Distinguishing Computer Generated Images and Natural Images: A Survey

    Bingtao Hu*, Jinwei Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.2, pp. 95-105, 2020, DOI:10.32604/jihpp.2020.010464 - 11 November 2020

    Abstract With the development of computer graphics, realistic computer graphics (CG) have become more and more common in our field of vision. This rendered image is invisible to the naked eye. How to effectively identify CG and natural images (NI) has been become a new issue in the field of digital forensics. In recent years, a series of deep learning network frameworks have shown great advantages in the field of images, which provides a good choice for us to solve this problem. This paper aims to track the latest developments and applications of deep learning in More >

  • Open Access

    ARTICLE

    Multi-Purpose Forensics of Image Manipulations Using Residual- Based Feature

    Anjie Peng1, Kang Deng1, Shenghai Luo1, Hui Zeng1, 2, *

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2217-2231, 2020, DOI:10.32604/cmc.2020.011006 - 16 September 2020

    Abstract The multi-purpose forensics is an important tool for forge image detection. In this paper, we propose a universal feature set for the multi-purpose forensics which is capable of simultaneously identifying several typical image manipulations, including spatial low-pass Gaussian blurring, median filtering, re-sampling, and JPEG compression. To eliminate the influences caused by diverse image contents on the effectiveness and robustness of the feature, a residual group which contains several highpass filtered residuals is introduced. The partial correlation coefficient is exploited from the residual group to purely measure neighborhood correlations in a linear way. Besides that, we… More >

  • Open Access

    ARTICLE

    An Efficient Detection Approach of Content Aware Image Resizing

    Ming Lu1, 2, *, Shaozhang Niu1, Zhenguang Gao3

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 887-907, 2020, DOI:10.32604/cmc.2020.09770 - 10 June 2020

    Abstract Content aware image resizing (CAIR) is an excellent technology used widely for image retarget. It can also be used to tamper with images and bring the trust crisis of image content to the public. Once an image is processed by CAIR, the correlation of local neighborhood pixels will be destructive. Although local binary patterns (LBP) can effectively describe the local texture, it however cannot describe the magnitude information of local neighborhood pixels and is also vulnerable to noise. Therefore, to deal with the detection of CAIR, a novel forensic method based on improved local ternary… More >

Displaying 1-10 on page 1 of 11. Per Page