Explore
Image and Video Forensics
0 Ungluers have
Faved this Work
Login to Fave
Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways through the use of consumer electronics and high-quality digital imaging devices, such as smartphones, digital cameras, tablets, and wearable and IoT devices. The ever-increasing convenience of image acquisition has facilitated instant distribution and sharing of digital images on digital social platforms, determining a great amount of exchange data. Moreover, the pervasiveness of powerful image editing tools has allowed the manipulation of digital images for malicious or criminal ends, up to the creation of synthesized images and videos with the use of deep learning techniques. In response to these threats, the multimedia forensics community has produced major research efforts regarding the identification of the source and the detection of manipulation. In all cases (e.g., forensic investigations, fake news debunking, information warfare, and cyberattacks) where images and videos serve as critical evidence, forensic technologies that help to determine the origin, authenticity, and integrity of multimedia content can become essential tools. This book aims to collect a diverse and complementary set of articles that demonstrate new developments and applications in image and video forensics to tackle new and serious challenges to ensure media authenticity.
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
This work has been downloaded 73 times via unglue.it ebook links.
- 73 - pdf (CC BY) at Unglue.it.
Keywords
- anomaly detection
- audio forensics
- automatic border control
- biometrics
- blind estimation
- camera fingerprint
- camera model identification
- Classification
- compression
- Computer vision
- convolutional neural networks
- copy-move forgery detection
- correlation
- cybersecurity
- deep learning
- deep one-class
- Deepfake
- DeepFake detection
- DeepFakes
- digital forensics
- digital image forensics
- digital investigations
- discrete Fourier Transform
- Economics, finance, business & management
- estimation by rotational invariant techniques (ESPRIT)
- face landmarks
- face morphing
- facial anti-spoofing
- facial manipulations
- facial Presentation Attack Detection (PAD)
- facial recognition
- fake image
- fake image detection
- forensic evidence evaluation
- forensic process model
- forensics detection
- forged image detection
- GAN-generated image detection
- generative adversarial networks
- GLCM
- hand-crafted features
- Harris
- heatmap
- image forensics
- Industry & industrial studies
- Information technology industries
- inter-frame forgery
- JPEG
- likelihood ratio
- media forensics
- Media, information & communication industries
- multimedia content manipulation
- multimedia forensics
- multiple signal classification (MUSIC)
- n/a
- Neural Network
- noise level function
- pattern recognition
- Performance
- photo response non-uniformity
- plausibility of decisions
- PRNU
- resolution
- RGB camera-based anti-spoofing methods
- short-time Fourier transform (STFT)
- simple linear iterative clustering (SLIC)
- smartphone identification
- Snapchat
- social media platform identification
- social network
- Social networks
- source camera identification
- source identification
- support vector machines
- survey
- SVD
- tensor
- transfer learning
- UAV videos
- user profile linking
- VGG
- video forensic
- video forensics
- video source attribution
- videos