This HTML5 document contains 33 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n10doi:10.3390/
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
n18https://kar.kent.ac.uk/id/eprint/69341#
n21http://purl.org/ontology/bibo/status/
dchttp://purl.org/dc/elements/1.1/
n13https://kar.kent.ac.uk/69341/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n8https://kar.kent.ac.uk/id/subject/
n20https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n17http://eprints.org/ontology/
bibohttp://purl.org/ontology/bibo/
n7https://kar.kent.ac.uk/id/publication/
n11https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n15https://kar.kent.ac.uk/id/document/
n19https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n6https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n16https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:69341
rdf:type
bibo:AcademicArticle bibo:Article n17:EPrint n17:ArticleEPrint
rdfs:seeAlso
n13:
owl:sameAs
n10:s18092804
n17:hasDocument
n15:3148728 n15:3148729 n15:3148730 n15:3132010 n15:3132011 n15:3148731
n17:hasPublished
n15:3132010
dc:hasVersion
n15:3132010
dcterms:title
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts
wdrs:describedby
n6:export_kar_RDFN3.n3 n20:export_kar_RDFN3.n3
dcterms:date
2018-08-25
dcterms:creator
n16:ext-asandoval@fdi.ucm.es n16:ext-javiergv@fdi.ucm.es n16:ext-j.c.hernandez-castro@kent.ac.uk n16:ext-edggonza@ucm.es
bibo:status
n21:peerReviewed n21:published
dcterms:publisher
n11:ext-0e8d92de9fd14082663dc2f585fd1d29
bibo:abstract
Existence of mobile devices with high performance cameras and powerful image processing applications eases the alteration of digital images for malicious purposes. This work presents a new approach to detect digital image tamper detection technique based on CFA artifacts arising from the differences in the distribution of acquired and interpolated pixels. The experimental evidence supports the capabilities of the proposed method for detecting a broad range of manipulations, e.g., copy-move, resizing, rotation, filtering and colorization. This technique exhibits tampered areas by computing the probability of each pixel of being interpolated and then applying the DCT on small blocks of the probability map. The value of the coefficient for the highest frequency on each block is used to decide whether the analyzed region has been tampered or not. The results shown here were obtained from tests made on a publicly available dataset of tampered images for forensic analysis. Affected zones are clearly highlighted if the method detects CFA inconsistencies. The analysis can be considered successful if the modified zone, or an important part of it, is accurately detected. By analizing a publicly available dataset with images modified with different methods we reach an 86% of accuracy, which provides a good result for a method that does not require previous training.
dcterms:isPartOf
n7:ext-14248220 n19:repository
dcterms:subject
n8:QA76 n8:Q1
bibo:authorList
n18:authors
bibo:issue
9
bibo:volume
18