bibtype J - Journal Article
ARLID 0398095
utime 20240103203158.6
mtime 20131112235959.9
WOS 000324575200010
SCOPUS 84882993598
DOI 10.1109/TIFS.2013.2276000
title (primary) (eng) Blind Verification of Digital Image Originality: A Statistical Approach
specification
page_count 10 s.
media_type P
serial
ARLID cav_un_epca*0311611
ISSN 1556-6013
title IEEE Transactions on Information Forensics and Security
volume_id 8
volume 9 (2013)
page_num 1531-1540
keyword blind verification
keyword image extraction
keyword camera fingerprints
author (primary)
ARLID cav_un_auth*0206076
name1 Mahdian
name2 Babak
full_dept (cz) Zpracování obrazové informace
full_dept (eng) Department of Image Processing
department (cz) ZOI
department (eng) ZOI
institution UTIA-B
full_dept Department of Image Processing
fullinstit Ústav teorie informace a automatizace AV ČR, v. v. i.
author
ARLID cav_un_auth*0226884
name1 Nedbal
name2 R.
country CZ
author
ARLID cav_un_auth*0101189
name1 Saic
name2 Stanislav
full_dept (cz) Zpracování obrazové informace
full_dept Department of Image Processing
department (cz) ZOI
department ZOI
institution UTIA-B
full_dept Department of Image Processing
fullinstit Ústav teorie informace a automatizace AV ČR, v. v. i.
source
url http://library.utia.cas.cz/separaty/2013/ZOI/mahdian-0398095.pdf
cas_special
project
project_id VG20102013064
agency GA MV
ARLID cav_un_auth*0273814
project
project_id GA13-28462S
agency GA ČR
ARLID cav_un_auth*0292615
abstract (eng) Many methods for verifying the integrity of digital images employ various fingerprints associated with acquisition devices. Data on an acquisition device and fingerprints are extracted from an image and confronted with a reference data set that includes all possible fingerprints of the acquisition device. This allows us to draw a conclusion whether the digital image has been modified or not. Thus it is critical to have a sufficiently large, reliable, and true reference data set, otherwise critical miscalculations can arise. Reference data sets are extracted from image data sets that in turn are collected from unknown and nonguaranteed environments (mostly from the Internet). Since often software modifications leave no obvious traces in the image file (e.g., in metadata), it is not easy to recognize original images, from which fingerprints of acquisition devices can be extracted to form true reference data sets. This is the problem addressed in this paper.
reportyear 2014
RIV JC
mrcbC52 4 A 4a 20231122135859.1
inst_support RVO:67985556
permalink http://hdl.handle.net/11104/0225914
mrcbT16-e COMPUTERSCIENCETHEORYMETHODS|ENGINEERINGELECTRICALELECTRONIC
mrcbT16-f 2.379
mrcbT16-g 0.227
mrcbT16-h 3.VII
mrcbT16-i 0.00766
mrcbT16-j 0.91
mrcbT16-k 1598
mrcbT16-l 176
mrcbT16-s 1.033
mrcbT16-z ScienceCitationIndexExpanded
mrcbT16-4 Q1
mrcbT16-B 76.163
mrcbT16-C 82.770
mrcbT16-D Q1
mrcbT16-E Q1
arlyear 2013
mrcbTft \nSoubory v repozitáři: mahdian-0398095.pdf
mrcbU14 84882993598 SCOPUS
mrcbU34 000324575200010 WOS
mrcbU63 cav_un_epca*0311611 IEEE Transactions on Information Forensics and Security 1556-6013 1556-6021 Roč. 8 č. 9 2013 1531 1540