Localization of JPEG double compression through multi-domain convolutional neural networks
When an attacker wants to falsify an image, in most of cases she/he will perform a JPEG
recompression. Different techniques have been developed based on diverse theoretical
assumptions but very effective solutions have not been developed yet. Recently, machine
learning based approaches have been started to appear in the field of image forensics to
solve diverse tasks such as acquisition source identification and forgery detection. In this last
case, the aim ahead would be to get a trained neural network able, given a to-be-checked …
recompression. Different techniques have been developed based on diverse theoretical
assumptions but very effective solutions have not been developed yet. Recently, machine
learning based approaches have been started to appear in the field of image forensics to
solve diverse tasks such as acquisition source identification and forgery detection. In this last
case, the aim ahead would be to get a trained neural network able, given a to-be-checked …
Localization of JPEG double compression through multi-domain convolutional neural networks
T Uricchio, L Ballan… - Proceedings of the …, 2017 - openaccess.thecvf.com
When an attacker wants to falsify an image, in most of cases she/he will perform a JPEG
recompression. Different techniques have been developed based on diverse theoretical
assumptions but very effective solutions have not been developed yet. Recently, machine
learning based approaches have been started to appear in the field of image forensics to
solve diverse tasks such as acquisition source identification and forgery detection. In this last
case, the aim ahead would be to get a trained neural network able, given a to-be-checked …
recompression. Different techniques have been developed based on diverse theoretical
assumptions but very effective solutions have not been developed yet. Recently, machine
learning based approaches have been started to appear in the field of image forensics to
solve diverse tasks such as acquisition source identification and forgery detection. In this last
case, the aim ahead would be to get a trained neural network able, given a to-be-checked …
Showing the best results for this search. See all results