A Universal Attack Against Histogram Based Image Forensics

ثبت نشده
چکیده

Click here to download a ZIP file containing of 7 handmade splicings reported in the paper. Each folder contains the host and source image, and the produced forgery before and after application of the counter-forensic scheme to the inserted region.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Universal Attack Against Histogram-Based Image Forensics

In this paper the authors propose a universal image counter-forensic scheme that contrasts any detector based on the analysis of the image histogram. Being universal, the scheme does not require knowledge of the detection algorithms available to the forensic analyst, and can be used to conceal traces left in the histogram of the image by any processing tool. Instead of adapting the histogram of...

متن کامل

Robust Contrast Enhancement Forensics Using Convolutional Neural Networks

Contrast enhancement(CE) forensics has always been attracted widely attention on image forensic community. It can provide an effective rule for recovering image history and identifying and locating tampered images. Although, a number of algorithms have been proposed, the robustness of CE forensics technique for common pre/post processings is not satisfactory. To deal with it, in this letter, we...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Counter-forensics of SIFT-based copy-move detection by means of keypoint classification

Copy-move forgeries are very common image manipulations that are often carried out with malicious intents. Among the techniques devised by the Image Forensic community, those relying on SIFT features are the most effective ones. In this paper we approach the copy-move scenario from the perspective of an attacker whose goal is to remove such features. The attacks conceived so far against SIFT-ba...

متن کامل

Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length

A novel image forensic algorithm against contrast modification based on merged weight histogram of run length is proposed. In the proposed algorithm, the run length histogram features were firstly extracted, and then those of different orientation were subsequently merged; after normalization of the prior features, the authors calculated leaps in the histogram numerically; lastly, the generated...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016