Passer à la navigation principale Passer à la recherche Passer au contenu principal

How to reconstruct the history of a digital image, and of its alterations

  • Quentin Bammey
  • , Miguel Colom
  • , Thibaud Ehret
  • , Marina Gardella
  • , Rafael Grompone
  • , Jean Michel Morel
  • , Tina Nikoukhah
  • , Denis Perraud

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionChapitreRevue par des pairs

Résumé

This chapter reviews the operations undergone by the raw image and describes the artifacts they leave in the final image. The Internet, digital media, new means of communication and social networks have accelerated the emergence of a connected world where perfect mastery over information becomes utopian. Image manipulation can serve the interests of criminal or terrorist organizations as part of their propaganda. Noise estimation is a necessary preliminary step to most image processing and computer vision algorithms. Noise inconsistency analysis is a rich source for forgery detection due to the fact that forged regions are likely to present different noise models from the rest of the image. Image demosaicing leaves artifacts that can be used to find falsifications. The chapter seeks to determine the compression history of an image. It focuses on the JPEG algorithm, which is nowadays the most common method to store images.

langue originaleAnglais
titreMultimedia Security 1
Sous-titreAuthentication and Data Hiding
EditeurWiley-Blackwell
Pages1-40
Nombre de pages40
ISBN (imprimé)9781119901808
Les DOIs
étatPublié - 4 mars 2022
Modification externeOui

SDG des Nations Unies

Ce résultat contribue à ou aux Objectifs de développement durable suivants

  1. SDG 16 - Paix, justice et institutions solides
    SDG 16 Paix, justice et institutions solides

Empreinte digitale

Examiner les sujets de recherche de « How to reconstruct the history of a digital image, and of its alterations ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation