메뉴 건너뛰기




Volumn 8, Issue 4, 2013, Pages 593-607

A framework for decision fusion in image forensics based on Dempster-Shafer Theory of Evidence

Author keywords

Decision fusion; Dempster Shafer; forgery detection; image forensics; image integrity; image tampering

Indexed keywords

DECISION FUSION; DEMPSTER-SHAFER; FORGERY DETECTIONS; IMAGE FORENSICS; IMAGE INTEGRITY; IMAGE TAMPERING;

EID: 84874819920     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2248727     Document Type: Article
Times cited : (106)

References (19)
  • 1
    • 78651398372 scopus 로고    scopus 로고
    • Digital image forensics: A booklet for beginners
    • Jan
    • J. A. Redi, W. Taktak, and J.-L. Dugelay, "Digital image forensics: A booklet for beginners," Multimedia Tools Appl. vol. 51, pp. 133-162, Jan. 2011 [Online]. Available: http://dx.doi.org/10.1007/s11042-010- 0620-1
    • (2011) Multimedia Tools Appl , vol.51 , pp. 133-162
    • Redi, J.A.1    Taktak, W.2    Dugelay, J.-L.3
  • 3
    • 80051606276 scopus 로고    scopus 로고
    • Improved DCT coefficient analysis for forgery localization in JPEG images
    • T. Bianchi,A. De Rosa, and A. Piva, "Improved DCT coefficient analysis for forgery localization in JPEG images," in Proc. IEEE ICASSP, 2011, pp. 2444-2447.
    • (2011) Proc IEEE ICASSP , pp. 2444-2447
    • Bianchi, T.1    De Rosa, A.2    Piva, A.3
  • 4
    • 84856314905 scopus 로고    scopus 로고
    • Detection of non-aligned double JPEG compression with estimation of primary compression parameters
    • Sep
    • T. Bianchi and A. Piva, "Detection of non-aligned double JPEG compression with estimation of primary compression parameters," in Proc. 2011 18th IEEE Int. Conf. Image Processing (ICIP), Sep. 2011, pp. 1929-1932.
    • (2011) Proc. 2011 18th IEEE Int. Conf. Image Processing (ICIP) , pp. 1929-1932
    • Bianchi, T.1    Piva, A.2
  • 5
    • 34547529764 scopus 로고    scopus 로고
    • A novel method for detecting cropped and recompressed image block
    • Apr
    • W. Luo, Z. Qu, J. Huang, and G. Qiu, "A novel method for detecting cropped and recompressed image block," in Proc. ICASSP 2007, Apr. 2007, vol. 2, pp. II-217-II-220.
    • (2007) Proc. ICASSP 2007 , vol.2 , pp. 11-217
    • Luo, W.1    Qu, Z.2    Huang, J.3    Qiu, G.4
  • 6
    • 67649410199 scopus 로고    scopus 로고
    • Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis
    • Nov
    • Z. C. Lin, J. F. He, X. Tang, and C. K. Tang, "Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis," Pattern Recognit., vol. 42, no. 11, pp. 2492-2501, Nov. 2009.
    • (2009) Pattern Recognit , vol.42 , Issue.11 , pp. 2492-2501
    • Lin, Z.C.1    He, J.F.2    Tang, X.3    Tang, C.K.4
  • 7
    • 60449117421 scopus 로고    scopus 로고
    • Exposing digital forgeries from JPEG ghosts
    • Mar
    • H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, Mar. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 154-160
    • Farid, H.1
  • 10
    • 84856497177 scopus 로고    scopus 로고
    • Nonintrusive image tamper detection based on fuzzy fusion
    • Sep.
    • G. Chetty and M. Singh, "Nonintrusive image tamper detection based on fuzzy fusion," in Proc. IJCSNS, Sep. 2010, vol. 10, no. 9, pp. 86-90.
    • (2010) Proc. IJCSNS , vol.10 , Issue.9 , pp. 86-90
    • Chetty, G.1    Singh, M.2
  • 11
    • 77749248951 scopus 로고    scopus 로고
    • D-S Evidence Theory based digital image trustworthiness evaluationmodel
    • ser. MINES '09
    • D. Hu, L.Wang, Y. Zhou,Y. Zhou,X. Jiang, and L.Ma, "D-S Evidence Theory based digital image trustworthiness evaluationmodel," in Proc. MINES 2009, 2009, vol. 1, ser. MINES '09, pp. 85-89.
    • (2009) Proc. MINES 2009 , vol.1 , pp. 85-89
    • Hu, D.1    Wang, L.2    Zhou, Y.3    Zhou, Y.4    Jiang, X.5    Ma, L.6
  • 12
    • 33847671791 scopus 로고    scopus 로고
    • Image manipulation detection
    • S. Bayram, I.Avcibas, B. Sankur, and N. Memon, "Image manipulation detection," J. Electron. Imag., vol. 15, no. 4, pp. 041102-041102-17, 2006.
    • (2006) J. Electron. Imag , vol.15 , Issue.4 , pp. 041102-041102
    • Bayram, S.1    Avcibas, I.2    Sankur, B.3    Memon, N.4
  • 14
    • 70349662483 scopus 로고    scopus 로고
    • Detecting image tampering using feature fusion
    • P. Zhang and X. Kong, "Detecting image tampering using feature fusion," in Proc. ARES 2009, 2009, pp. 335-340.
    • (2009) Proc. ARES 2009 , pp. 335-340
    • Zhang, P.1    Kong, X.2
  • 15
    • 80052673400 scopus 로고    scopus 로고
    • Fusion image steganalysis based on Dempster-Shafer evidence theory
    • Z.-W. Sun, H. Li, and Z.-C. Ji, "Fusion image steganalysis based on Dempster-Shafer evidence theory," Control and Decision, vol. 26, no. 8, pp. 1192-1196, 2011.
    • (2011) Control and Decision , vol.26 , Issue.8 , pp. 1192-1196
    • Sun, Z.-W.1    Li, H.2    Ji, Z.-C.3
  • 16
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by a multivalued mapping
    • A. P. Dempster, "Upper and lower probabilities induced by a multivalued mapping," Ann. Math. Statist., vol. 38, pp. 325-339, 1967.
    • (1967) Ann. Math. Statist , vol.38 , pp. 325-339
    • Dempster, A.P.1
  • 17
    • 84860216072 scopus 로고    scopus 로고
    • Aggregating non-independent Dempster-Shafer belief structures
    • R. Yager, "Aggregating non-independent Dempster-Shafer belief structures," in Proc. IPMU'08, 2008, pp. 289-297.
    • (2008) Proc. IPMU'08 , pp. 289-297
    • Yager, R.1
  • 19
    • 79955702502 scopus 로고    scopus 로고
    • LIBSVM: A library for support vector machines
    • C.-C. Chang and C.-J. Lin, "LIBSVM: A library for support vector machines," ACM Trans. Intelligent Syst. Technol. vol. 2, pp. 27:1-27:27, 2011 [Online]. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm
    • (2011) ACM Trans. Intelligent Syst. Technol , vol.2 , pp. 271-2727
    • Chang, C.-C.1    Lin, C.-J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.