bibtype C - Conference Paper (international conference)
ARLID 0482763
utime 20240111140952.8
mtime 20171207235959.9
SCOPUS 85050670586
WOS 000428743900063
DOI 10.1109/IPTA.2017.8310139
title (primary) (eng) JPEG Compression Model in Copy-move Forgery Detection
specification
page_count 6 s.
media_type C
serial
ARLID cav_un_epca*0482762
ISBN 978-1-5386-1843-1
title Proceedings of the Seventh International Conference on Image Processing Theory, Tools and Applications
publisher
place Montreal
name IEEE
year 2017
keyword Image forensics
keyword Copy-move forgery detection
keyword Image tampering
keyword JPEG
keyword Quantization constraint set
author (primary)
ARLID cav_un_auth*0283562
share 50
name1 Novozámský
name2 Adam
institution UTIA-B
full_dept (cz) Zpracování obrazové informace
full_dept (eng) Department of Image Processing
department (cz) ZOI
department (eng) ZOI
full_dept Department of Image Processing
fullinstit Ústav teorie informace a automatizace AV ČR, v. v. i.
author
ARLID cav_un_auth*0108377
share 50
name1 Šorel
name2 Michal
institution UTIA-B
full_dept (cz) Zpracování obrazové informace
full_dept Department of Image Processing
department (cz) ZOI
department ZOI
full_dept Department of Image Processing
fullinstit Ústav teorie informace a automatizace AV ČR, v. v. i.
source
source_type pdf
url http://library.utia.cas.cz/separaty/2017/ZOI/novozamsky-0482763.pdf
cas_special
project
ARLID cav_un_auth*0338628
project_id GA16-13830S
agency GA ČR
country CZ
project
ARLID cav_un_auth*0314467
project_id GA15-16928S
agency GA ČR
country CZ
abstract (eng) The integrity of visual data is important for the credibility of news media and especially when used as an evidence in court or during criminal investigation. The common way to manipulate image content is copying an object and pasting in another location of the same image. In this paper, we describe a new idea for the detection of this type of forgery in JPEG images, where the compression significantly degrades detection by popular algorithms. We derive a JPEG-based constraint that any pair of patches must satisfy to be considered a valid candidate for tampered area. We propose also efficient algorithm to verify the constraint that can be integrated into most existing methods. Experiments show significant improvement of detection, especially for difficult cases, such as small objects, objects covered by textureless areas and repeated patterns.
action
ARLID cav_un_auth*0354801
name International Conference on Image Processing Theory, Tools and Applications (IPTA 2017) /7./
dates 20171128
mrcbC20-s 20171201
place Montreal
country CA
RIV JD
FORD0 20000
FORD1 20200
FORD2 20205
reportyear 2018
num_of_auth 2
presentation_type PR
inst_support RVO:67985556
permalink http://hdl.handle.net/11104/0278140
mrcbC61 1
confidential S
article_num 65
mrcbC83 RIV/67985556:_____/17:00482763!RIV18-AV0-67985556 191975728 Doplnění UT WOS a Scopus
mrcbC83 RIV/67985556:_____/17:00482763!RIV18-GA0-67985556 191965056 Doplnění UT WOS a Scopus
mrcbC86 3+4 Proceedings Paper Computer Science Artificial Intelligence|Engineering Electrical Electronic|Imaging Science Photographic Technology
mrcbC86 3+4 Proceedings Paper Computer Science Artificial Intelligence|Engineering Electrical Electronic|Imaging Science Photographic Technology
mrcbC86 3+4 Proceedings Paper Computer Science Artificial Intelligence|Engineering Electrical Electronic|Imaging Science Photographic Technology
arlyear 2017
mrcbU14 85050670586 SCOPUS
mrcbU24 PUBMED
mrcbU34 000428743900063 WOS
mrcbU56 pdf
mrcbU63 cav_un_epca*0482762 Proceedings of the Seventh International Conference on Image Processing Theory, Tools and Applications 978-1-5386-1843-1 Montreal IEEE 2017