메뉴 건너뛰기




Volumn 9, Issue 3, 2014, Pages 515-525

Contrast enhancement-based forensics in digital images

Author keywords

composite image; Computer vision; contrast enhancement; digital forensics; image forgery

Indexed keywords

COMPOSITE IMAGES; CONTRAST ADJUSTMENT; CONTRAST ENHANCEMENT; DIGITAL FORENSIC; GLOBAL CONTRASTS; IMAGE FORGERY; JPEG COMPRESSION; REAL APPLICATIONS;

EID: 84896690794     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2300937     Document Type: Article
Times cited : (242)

References (26)
  • 1
    • 85032768213 scopus 로고    scopus 로고
    • Image forgery detection
    • Mar.
    • H. Farid, "Image forgery detection," IEEE Signal Process. Mag., vol. 26, no. 2, pp. 16-25, Mar. 2009.
    • (2009) IEEE Signal Process. Mag. , vol.26 , Issue.2 , pp. 16-25
    • Farid, H.1
  • 2
    • 77953650817 scopus 로고    scopus 로고
    • A bibliography on blind methods for identifying image forgery
    • Jul.
    • B. Mahdian and S. Saic, "A bibliography on blind methods for identifying image forgery," Image Commun., vol. 25, no. 6, pp. 389-399, Jul. 2010.
    • (2010) Image Commun. , vol.25 , Issue.6 , pp. 389-399
    • Mahdian, B.1    Saic, S.2
  • 3
    • 33847671791 scopus 로고    scopus 로고
    • Image manipulation detection
    • S. Bayram, I. Avcubas, B. Sankur, and N. Memon, "Image manipulation detection," J. Electron. Imag., vol. 15, no. 4, pp. 04110201-04110217, 2006.
    • (2006) J. Electron. Imag. , vol.15 , Issue.4 , pp. 04110201-04110217
    • Bayram, S.1    Avcubas, I.2    Sankur, B.3    Memon, N.4
  • 5
    • 84861133533 scopus 로고    scopus 로고
    • Manipulation detection on image patches using FusionBoost
    • Jun.
    • H. Cao and A. C. Kot, "Manipulation detection on image patches using FusionBoost," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 992-1002, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 992-1002
    • Cao, H.1    Kot, A.C.2
  • 6
    • 84874838762 scopus 로고    scopus 로고
    • Estimating EXIF parameters based on noise features for image manipulation detection
    • Apr.
    • J. Fan, H. Cao, and A. C. Kot, "Estimating EXIF parameters based on noise features for image manipulation detection," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 608-618, Apr. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.4 , pp. 608-618
    • Fan, J.1    Cao, H.2    Kot, A.C.3
  • 7
    • 13244251141 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting traces of resampling
    • DOI 10.1109/TSP.2004.839932
    • A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005. (Pubitemid 40181769)
    • (2005) IEEE Transactions on Signal Processing , vol.53 , pp. 758-767
    • Popescu, A.C.1    Farid, H.2
  • 8
    • 84858394859 scopus 로고    scopus 로고
    • Detection of non-aligned double JPEG compression based on integer periodicity maps
    • Apr.
    • T. Bianchi and A. Piva, "Detection of non-aligned double JPEG compression based on integer periodicity maps," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 842-848, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 842-848
    • Bianchi, T.1    Piva, A.2
  • 9
    • 80052396955 scopus 로고    scopus 로고
    • Unsharp masking sharpening detection via overshoot artifacts analysis
    • Oct.
    • G. Cao, Y. Zhao, R. Ni, and A. C. Kot, "Unsharp masking sharpening detection via overshoot artifacts analysis," IEEE Signal Process. Lett., vol. 18, no. 10, pp. 603-606, Oct. 2011.
    • (2011) IEEE Signal Process. Lett. , vol.18 , Issue.10 , pp. 603-606
    • Cao, G.1    Zhao, Y.2    Ni, R.3    Kot, A.C.4
  • 10
    • 77955707653 scopus 로고    scopus 로고
    • Forensic detection of image manipulation using statistical intrinsic fingerprints
    • Sep.
    • M. C. Stamm and K. J. R. Liu, "Forensic detection of image manipulation using statistical intrinsic fingerprints," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492-506, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 492-506
    • Stamm, M.C.1    Liu, K.J.R.2
  • 11
    • 78049407658 scopus 로고    scopus 로고
    • Forensic estimation and reconstruction of a contrast enhancement mapping
    • Dallas, TX, USA, Mar.
    • M. C. Stamm and K. J. R. Liu, "Forensic estimation and reconstruction of a contrast enhancement mapping," in Proc. IEEE Int. Conf. Acoust., Speech Signal, Dallas, TX, USA, Mar. 2010, pp. 1698-1701.
    • (2010) Proc. IEEE Int. Conf. Acoust., Speech Signa , pp. 1698-1701
    • Stamm, M.C.1    Liu, K.J.R.2
  • 12
    • 78651080888 scopus 로고    scopus 로고
    • Forensic estimation of gamma correction in digital images
    • Hong Kong
    • G. Cao, Y. Zhao, and R. Ni, "Forensic estimation of gamma correction in digital images," in Proc. 17th IEEE Int. Conf. Image Process., Hong Kong, 2010, pp. 2097-2100.
    • (2010) Proc. 17th IEEE Int. Conf. Image Process. , pp. 2097-2100
    • Cao, G.1    Zhao, Y.2    Ni, R.3
  • 13
    • 84892537537 scopus 로고    scopus 로고
    • Reverse engineering of double compressed images in the presence of contrast enhancement
    • Pula, Croatia, Sep./Oct.
    • P. Ferrara, T. Bianchiy, A. De Rosaz, and A. Piva, "Reverse engineering of double compressed images in the presence of contrast enhancement," in Proc. IEEE Workshop Multimedia Signal Process., Pula, Croatia, Sep./Oct. 2013, pp. 141-146.
    • (2013) Proc. IEEE Workshop Multimedia Signal Process. , pp. 141-146
    • Ferrara, P.1    Bianchiy, T.2    De Rosaz, A.3    Piva, A.4
  • 15
    • 84885095860 scopus 로고    scopus 로고
    • Blind detection of median filtering in digital images: A difference domain based approach
    • Dec.
    • C. Chen, J. Ni, and J. Huang, "Blind detection of median filtering in digital images: A difference domain based approach," IEEE Trans. Image Process., vol. 22, no. 12, pp. 4699-4710, Dec. 2013.
    • (2013) IEEE Trans. Image Process. , vol.22 , Issue.12 , pp. 4699-4710
    • Chen, C.1    Ni, J.2    Huang, J.3
  • 16
    • 37549050220 scopus 로고    scopus 로고
    • A theory of frequency domain invariants: Spherical harmonic identities for BRDF/lighting transfer and image consistency
    • Feb.
    • D. Mahajan, R. Ramamoorthi, and B. Curless, "A theory of frequency domain invariants: Spherical harmonic identities for BRDF/lighting transfer and image consistency," IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 2, pp. 197-213, Feb. 2008.
    • (2008) IEEE Trans. Pattern Anal. Mach. Intell. , vol.30 , Issue.2 , pp. 197-213
    • Mahajan, D.1    Ramamoorthi, R.2    Curless, B.3
  • 17
    • 79952185658 scopus 로고    scopus 로고
    • Digital image forgery detection based on lens and sensor aberration
    • I. Yerushalmy and H. Hel-Or, "Digital image forgery detection based on lens and sensor aberration," Int. J. Comput. Vis., vol. 92, no. 1, pp. 71-91, 2011.
    • (2011) Int. J. Comput. Vis. , vol.92 , Issue.1 , pp. 71-91
    • Yerushalmy, I.1    Hel-Or, H.2
  • 18
    • 84858113264 scopus 로고    scopus 로고
    • Exposing photo manipulation with inconsistent reflections
    • J. O'Brien and H. Farid, "Exposing photo manipulation with inconsistent reflections," ACM Trans. Graph., vol. 31, no. 1, pp. 1-11, 2012.
    • (2012) ACM Trans. Graph. , vol.31 , Issue.1 , pp. 1-11
    • O'Brien, J.1    Farid, H.2
  • 19
    • 78149263012 scopus 로고    scopus 로고
    • Anti-forensics of contrast enhancement in digital images
    • Rome, Italy
    • G. Cao, Y. Zhao, R. Ni, and H. Tian, "Anti-forensics of contrast enhancement in digital images," in Proc. ACM Multimedia Security Workshop, Rome, Italy, 2010, pp. 25-34.
    • (2010) Proc. ACM Multimedia Security Workshop , pp. 25-34
    • Cao, G.1    Zhao, Y.2    Ni, R.3    Tian, H.4
  • 20
    • 84867466942 scopus 로고    scopus 로고
    • A universal technique to hide traces of histogram-based image manipulations
    • Coventry, England
    • M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations," in Proc. ACM Multimedia Security Workshop, Coventry, England, 2012, pp. 97-104.
    • (2012) Proc. ACM Multimedia Security Workshop , pp. 97-104
    • Barni, M.1    Fontani, M.2    Tondi, B.3
  • 21
    • 84873305449 scopus 로고    scopus 로고
    • Efficient contrast enhancement using adaptive gamma correction with weighting distribution
    • Mar.
    • S.-C. Huang, F.-C. Cheng, and Y.-S. Chiu, "Efficient contrast enhancement using adaptive gamma correction with weighting distribution," IEEE Trans. Image Process., vol. 22, no. 3, pp. 1032-1041, Mar. 2013.
    • (2013) IEEE Trans. Image Process. , vol.22 , Issue.3 , pp. 1032-1041
    • Huang, S.-C.1    Cheng, F.-C.2    Chiu, Y.-S.3
  • 22
    • 69349099614 scopus 로고    scopus 로고
    • A histogram modification framework and its application for image contrast enhancement
    • Sep.
    • T. Arici, S. Dikbas, and Y. Altunbasak, "A histogram modification framework and its application for image contrast enhancement," IEEE Trans. Image Process., vol. 18, no. 9, pp. 1921-1935, Sep. 2009.
    • (2009) IEEE Trans. Image Process. , vol.18 , Issue.9 , pp. 1921-1935
    • Arici, T.1    Dikbas, S.2    Altunbasak, Y.3
  • 23
    • 10444273340 scopus 로고    scopus 로고
    • Automatic image enhancement by content dependent exposure correction
    • Jan.
    • S. Battiato, A. Bosco, A. Castorina, and G. Messina, "Automatic image enhancement by content dependent exposure correction," EURASIP J. Appl. Signal Process., vol. 12, pp. 1849-1860, Jan. 2004.
    • (2004) EURASIP J. Appl. Signal Process. , vol.12 , pp. 1849-1860
    • Battiato, S.1    Bosco, A.2    Castorina, A.3    Messina, G.4
  • 26
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system-The ins and outs of organizing BOSS
    • Czech Republic
    • P. Bas, T. Filler, and T. Pevny, "Break our steganographic system-The ins and outs of organizing BOSS," in Proc. Inf. Hiding, Prague, Czech Republic, 2011, pp. 59-70.
    • (2011) Proc. Inf. Hiding, Prague , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevny, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.