Image compression using anti-forensics method
A large number of image forensics methods are available which are capable of identifying image tampering. But these techniques are not capable of addressing the anti-forensics method which is able to hide the trace of image tampering. In this paper anti-forensics method for digital image compression...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Sreelakshmi, M. S Venkataraman, D |
description | A large number of image forensics methods are available which are capable of
identifying image tampering. But these techniques are not capable of addressing
the anti-forensics method which is able to hide the trace of image tampering.
In this paper anti-forensics method for digital image compression has been
proposed. This anti-forensics method is capable of removing the traces of image
compression. Additionally, technique is also able to remove the traces of
blocking artifact that are left by image compression algorithms that divide an
image into segments during compression process. This method is targeted to
remove the compression fingerprints of JPEG compression. |
doi_str_mv | 10.48550/arxiv.1303.2330 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1303_2330</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1303_2330</sourcerecordid><originalsourceid>FETCH-LOGICAL-a650-9bea3b991287a21e0994633454b479dd0c841bdbd5de8e6178f5842092abec973</originalsourceid><addsrcrecordid>eNotzrFuwjAUQFEvDBWwd0L5Aae2n53YI0KFIiF1YY-e4xewRBJkA4K_R9BOd7s6jH1KUWprjPjCdI-3UoKAUgGID8a3PR6oaMf-nCjnOA7FNcfhUOBwibwbEw05trno6XIcw4xNOjxlmv93yvbr7_3qh-9-N9vVcsexMoI7TwjeOalsjUqScE5XANpor2sXgmitlj74YAJZqmRtO2O1Ek6hp9bVMGWLv-2b25xT7DE9mhe7ebHhCfiYPEU</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Image compression using anti-forensics method</title><source>arXiv.org</source><creator>Sreelakshmi, M. S ; Venkataraman, D</creator><creatorcontrib>Sreelakshmi, M. S ; Venkataraman, D</creatorcontrib><description>A large number of image forensics methods are available which are capable of
identifying image tampering. But these techniques are not capable of addressing
the anti-forensics method which is able to hide the trace of image tampering.
In this paper anti-forensics method for digital image compression has been
proposed. This anti-forensics method is capable of removing the traces of image
compression. Additionally, technique is also able to remove the traces of
blocking artifact that are left by image compression algorithms that divide an
image into segments during compression process. This method is targeted to
remove the compression fingerprints of JPEG compression.</description><identifier>DOI: 10.48550/arxiv.1303.2330</identifier><language>eng</language><subject>Computer Science - Computer Vision and Pattern Recognition ; Computer Science - Multimedia</subject><creationdate>2013-03</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,882</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1303.2330$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1303.2330$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Sreelakshmi, M. S</creatorcontrib><creatorcontrib>Venkataraman, D</creatorcontrib><title>Image compression using anti-forensics method</title><description>A large number of image forensics methods are available which are capable of
identifying image tampering. But these techniques are not capable of addressing
the anti-forensics method which is able to hide the trace of image tampering.
In this paper anti-forensics method for digital image compression has been
proposed. This anti-forensics method is capable of removing the traces of image
compression. Additionally, technique is also able to remove the traces of
blocking artifact that are left by image compression algorithms that divide an
image into segments during compression process. This method is targeted to
remove the compression fingerprints of JPEG compression.</description><subject>Computer Science - Computer Vision and Pattern Recognition</subject><subject>Computer Science - Multimedia</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzrFuwjAUQFEvDBWwd0L5Aae2n53YI0KFIiF1YY-e4xewRBJkA4K_R9BOd7s6jH1KUWprjPjCdI-3UoKAUgGID8a3PR6oaMf-nCjnOA7FNcfhUOBwibwbEw05trno6XIcw4xNOjxlmv93yvbr7_3qh-9-N9vVcsexMoI7TwjeOalsjUqScE5XANpor2sXgmitlj74YAJZqmRtO2O1Ek6hp9bVMGWLv-2b25xT7DE9mhe7ebHhCfiYPEU</recordid><startdate>20130310</startdate><enddate>20130310</enddate><creator>Sreelakshmi, M. S</creator><creator>Venkataraman, D</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20130310</creationdate><title>Image compression using anti-forensics method</title><author>Sreelakshmi, M. S ; Venkataraman, D</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a650-9bea3b991287a21e0994633454b479dd0c841bdbd5de8e6178f5842092abec973</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Computer Science - Computer Vision and Pattern Recognition</topic><topic>Computer Science - Multimedia</topic><toplevel>online_resources</toplevel><creatorcontrib>Sreelakshmi, M. S</creatorcontrib><creatorcontrib>Venkataraman, D</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sreelakshmi, M. S</au><au>Venkataraman, D</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Image compression using anti-forensics method</atitle><date>2013-03-10</date><risdate>2013</risdate><abstract>A large number of image forensics methods are available which are capable of
identifying image tampering. But these techniques are not capable of addressing
the anti-forensics method which is able to hide the trace of image tampering.
In this paper anti-forensics method for digital image compression has been
proposed. This anti-forensics method is capable of removing the traces of image
compression. Additionally, technique is also able to remove the traces of
blocking artifact that are left by image compression algorithms that divide an
image into segments during compression process. This method is targeted to
remove the compression fingerprints of JPEG compression.</abstract><doi>10.48550/arxiv.1303.2330</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.1303.2330 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_1303_2330 |
source | arXiv.org |
subjects | Computer Science - Computer Vision and Pattern Recognition Computer Science - Multimedia |
title | Image compression using anti-forensics method |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T17%3A36%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Image%20compression%20using%20anti-forensics%20method&rft.au=Sreelakshmi,%20M.%20S&rft.date=2013-03-10&rft_id=info:doi/10.48550/arxiv.1303.2330&rft_dat=%3Carxiv_GOX%3E1303_2330%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |