Analysis of Forensic Fingerprints in Facebook Images, the Universal Antiforensic Attack
Abstract
References
Index Terms
- Analysis of Forensic Fingerprints in Facebook Images, the Universal Antiforensic Attack
Recommendations
Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting
Facebook images get distributed within a fraction of a second, which hackers may tamper and redistribute on cyberspace. JPEG fingerprint based tampering detection techniques have major scope in tampering localization within standard JPEG images. The ...
Digital Forensic of JPEG Images
ICSIP '14: Proceedings of the 2014 Fifth International Conference on Signal and Image ProcessingSince JPEG is the de facto image format adopted in most of the digital cameras and image editing software, tampered image will be often a recompressed JPEG image. As JPEG works on 8 by 8 block cosine transform most of the tampering correlation inherited ...
On Antiforensic Concealability With Rate-Distortion Tradeoff
A signal's compression history is of particular forensic significance because it contains important information about the origin and authenticity of a signal. Because of this, antiforensic techniques have been developed that allow a forger to conceal ...
Comments
Information & Contributors
Information
Published In

In-Cooperation
- Shanghai Jiao Tong University: Shanghai Jiao Tong University
- Xidian University
- TU: Tianjin University
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 89Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in