Imperial College London > Talks@ee.imperial > COMMSP & CP list > Forensic and anti-forensic methods for JPEG-based image authentication Traditional methods for image authentication including, e.g., watermarking and hashing, rely on extrinsic information embedded into the image at the moment of acquisition, or received
Log inImperial users Other users No account?Information onFinding a talk Adding a talk Syndicating talks Who we are Everything else |
Forensic and anti-forensic methods for JPEG-based image authentication Traditional methods for image authentication including, e.g., watermarking and hashing, rely on extrinsic information embedded into the image at the moment of acquisition, or receivedAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Danilo Mandic. Traditional methods for image authentication including, e.g., watermarking and hashing, rely on extrinsic information embedded into the image at the moment of acquisition, or received by a secure server upon demand. Conversely, in recent years, image forensics has tackled the same problem from a different standpoint, as the questioned image is typically the only source of information available to the forensic analyst. Forensic techniques analyze the image content in order to find traces left by specific acquisition, coding or editing operations, which could be tell-tale of malicious tampering. The traces left by JPEG compression play an important role in detecting possible forgeries, and they were shown to be effectively used for image authentication and tampering localization. However, these traces could be concealed by a knowledgeable adversary by applying anti-forensic methods. In this case, an interesting trade-off arises between the image quality, which is affected by the anti-forensic manipulation, and the probability of detecting traces of JPEG compression. This talk is part of the COMMSP & CP list series. This talk is included in these lists:Note that ex-directory lists are not shown. |
Other listsCOMMSP & CP list Type the title of a new list here Type the title of a new list hereOther talksARC '12 practice Practical Physical Layer Security Paradigms |