메뉴 건너뛰기




Volumn 49, Issue , 2017, Pages 153-163

Aligned and non-aligned double JPEG detection using convolutional neural networks

Author keywords

Convolutional neural networks; Double JPEG detection; Double JPEG localization; Image forensics

Indexed keywords

CONVOLUTION; IMAGE CODING; NEURAL NETWORKS;

EID: 85029472624     PISSN: 10473203     EISSN: 10959076     Source Type: Journal    
DOI: 10.1016/j.jvcir.2017.09.003     Document Type: Article
Times cited : (223)

References (37)
  • 1
    • 80155180685 scopus 로고    scopus 로고
    • Vision of the unseen: current trends and challenges in digital image and video forensics
    • Rocha, A., Scheirer, W., Boult, T., Goldenstein, S., Vision of the unseen: current trends and challenges in digital image and video forensics. ACM Comput. Surv. 43 (2011), 1–42.
    • (2011) ACM Comput. Surv. , vol.43 , pp. 1-42
    • Rocha, A.1    Scheirer, W.2    Boult, T.3    Goldenstein, S.4
  • 2
    • 84890463165 scopus 로고    scopus 로고
    • An overview on image forensics
    • Piva, A., An overview on image forensics. ISRN Signal Process., 2013, 2013, 22.
    • (2013) ISRN Signal Process. , vol.2013 , pp. 22
    • Piva, A.1
  • 5
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression in JPEG images for applications in steganography
    • Pevny, T., Fridrich, J., Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forens. Secur. (TIFS) 3 (2008), 247–258.
    • (2008) IEEE Trans. Inf. Forens. Secur. (TIFS) , vol.3 , pp. 247-258
    • Pevny, T.1    Fridrich, J.2
  • 7
    • 84962773771 scopus 로고    scopus 로고
    • Multi-scale fusion for improved localization of malicious tampering in digital images
    • Korus, P., Huang, J., Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans. Image Process. 25 (2016), 1312–1326.
    • (2016) IEEE Trans. Image Process. , vol.25 , pp. 1312-1326
    • Korus, P.1    Huang, J.2
  • 11
    • 67649410199 scopus 로고    scopus 로고
    • Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
    • Lin, Z., He, J., Tang, X., Tang, C.-K., Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn. (PR) 42 (2009), 2492–2501.
    • (2009) Pattern Recogn. (PR) , vol.42 , pp. 2492-2501
    • Lin, Z.1    He, J.2    Tang, X.3    Tang, C.-K.4
  • 12
    • 80051606276 scopus 로고    scopus 로고
    • T coefficient analysis for forgery localization in JPEG images, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
    • T. Bianchi, A. De Rosa, A. Piva, Improved DCT coefficient analysis for forgery localization in JPEG images, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011.
    • (2011)
    • Bianchi, T.1    De Rosa, A.2    Piva, A.3    Improved, D.C.4
  • 13
    • 85172629240 scopus 로고    scopus 로고
    • Mastio, Splicing forgeries localization through the use of first digit features, in: IEEE International Workshop on Information Forensics and Security (WIFS)
    • I. Amerini, R. Becarelli, R. Caldelli, A. Del Mastio, Splicing forgeries localization through the use of first digit features, in: IEEE International Workshop on Information Forensics and Security (WIFS), 2014.
    • (2014)
    • Amerini, I.1    Becarelli, R.2    Caldelli, R.3    Del, A.4
  • 14
    • 84990966225 scopus 로고    scopus 로고
    • Double JPEG compression forensics based on a convolutional neural network
    • Wang, Q., Zhang, R., Double JPEG compression forensics based on a convolutional neural network. EURASIP J. Inf. Secur., 2016, 2016, 23.
    • (2016) EURASIP J. Inf. Secur. , vol.2016 , pp. 23
    • Wang, Q.1    Zhang, R.2
  • 16
    • 79957470147 scopus 로고    scopus 로고
    • Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection
    • Chen, Y.-L., Hsu, C.-T., Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans. Inf. Forens. Secur. (TIFS) 6 (2011), 396–406.
    • (2011) IEEE Trans. Inf. Forens. Secur. (TIFS) , vol.6 , pp. 396-406
    • Chen, Y.-L.1    Hsu, C.-T.2
  • 18
    • 84858394859 scopus 로고    scopus 로고
    • Detection of nonaligned double JPEG compression based on integer periodicity maps
    • Bianchi, T., Piva, A., Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf. Forens. Secur. (TIFS) 7 (2012), 842–848.
    • (2012) IEEE Trans. Inf. Forens. Secur. (TIFS) , vol.7 , pp. 842-848
    • Bianchi, T.1    Piva, A.2
  • 19
    • 84866278567 scopus 로고    scopus 로고
    • Image forgery localization via block-grained analysis of jpeg artifacts
    • Bianchi, T., Piva, A., Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans. Inf. Forens. Secur. (TIFS) 7 (2012), 1003–1017.
    • (2012) IEEE Trans. Inf. Forens. Secur. (TIFS) , vol.7 , pp. 1003-1017
    • Bianchi, T.1    Piva, A.2
  • 20
    • 69349090197 scopus 로고    scopus 로고
    • Learning deep architectures for AI
    • Bengio, Y., Learning deep architectures for AI. Found. Trends Mach. Learn. 2 (2009), 1–127.
    • (2009) Found. Trends Mach. Learn. , vol.2 , pp. 1-127
    • Bengio, Y.1
  • 22
    • 84932146885 scopus 로고    scopus 로고
    • Deep learning for steganalysis via convolutional neural networks
    • International Society for Optics and Photonics
    • Qian, Y., Dong, J., Wang, W., Tan, T., Deep learning for steganalysis via convolutional neural networks. SPIE/IS&T Electronic Imaging, 2015, International Society for Optics and Photonics.
    • (2015) SPIE/IS&T Electronic Imaging
    • Qian, Y.1    Dong, J.2    Wang, W.3    Tan, T.4
  • 24
    • 84964992861 scopus 로고    scopus 로고
    • Structural design of convolutional neural networks for steganalysis
    • Xu, G., Wu, H.Z., Shi, Y.Q., Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. (SPL) 23 (2016), 708–712.
    • (2016) IEEE Signal Process. Lett. (SPL) , vol.23 , pp. 708-712
    • Xu, G.1    Wu, H.Z.2    Shi, Y.Q.3
  • 32
    • 0032203257 scopus 로고    scopus 로고
    • Gradient-based learning applied to document recognition
    • LeCun, Y., Bottou, L., Bengio, Y., Haffner, P., Gradient-based learning applied to document recognition. Proc. IEEE 86 (1998), 2278–2324.
    • (1998) Proc. IEEE , vol.86 , pp. 2278-2324
    • LeCun, Y.1    Bottou, L.2    Bengio, Y.3    Haffner, P.4
  • 36
    • 84908040919 scopus 로고    scopus 로고
    • An effective method for detecting double JPEG compression with the same quantization matrix
    • Yang, J., Xie, J., Zhu, G., Kwong, S., Shi, Y.-Q., An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Forens. Secur. 9 (2014), 1933–1942.
    • (2014) IEEE Trans. Inf. Forens. Secur. , vol.9 , pp. 1933-1942
    • Yang, J.1    Xie, J.2    Zhu, G.3    Kwong, S.4    Shi, Y.-Q.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.