IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

An Overview on Passive Image Forensics Technology for Automatic Computer Forgery

An Overview on Passive Image Forensics Technology for Automatic Computer Forgery
View Sample PDF
Author(s): Jie Zhao (School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China), Qiuzi Wang (School of Electronic Information Engineering, Tianjin University, Tianjin, China), Jichang Guo (School of Electronic Information Engineering, Tianjin University, Tianjin, China), Lin Gao (College of Software, Nankai University, Tianjin, China & School of Computer and Information Engineering, Tianjin ChengJian University, Tianjin, China)and Fusheng Yang (School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China)
Copyright: 2020
Pages: 12
Source title: Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-2466-4.ch031

Purchase

View An Overview on Passive Image Forensics Technology for Automatic Computer Forgery on the publisher's website for pricing and purchasing information.

Abstract

Currently, with the popularity of sophisticated image editing tools like Photoshop, it is becoming very difficult to discriminate between an authentic image and its manipulated version, which poses a serious social problem of debasing the credibility of photographic images as definite records of events. Passive image forgery detection technology, as one main branch of image forensics, has been regarded as the promising research interest due to its versatility and universality. Automatic computer forgery employs computer intelligent algorithms to forge an image in an automatic way, which is rather more complex than copy-move forgery since the source of duplicated region could be non-continuous. In this paper, the authors provide a comprehensive overview of the state-of-the-art passive detection methods for automatic computer forgery.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom