International audienceThis paper concentrates on lighting-based forensics. We first show how to fool the forgery detector based on 2D lighting coefficients using a simple counter-forensic strategy. This intermediary result advocates the use of more involved 3D lighting coefficients for forensics purposes. Such a research line means that we need at least an approximation of the 3D surface of the suspect object. Contrary to previous approaches that concentrated on particular kind of shapes (e.g. human faces), we propose a promising approach based on shape-from-shading. This new 3D lighting-based forensic method is more general as the 3D shape is learned from the picture itself. Furthermore, the results are in par with the less general state-o...
The advent of sophisticated photo editing software has made it increasingly easier to manipulate dig...
A variety of forensic methods have been developed to identify falsified photos, each unified by the ...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...
Nowadays the digital image plays an important role in human life. Due to large growth in the image p...
In this paper, a novel approach for exposing digital image tampering based on the theory of spherica...
Abstract—In recent days, photographs have been used as evidence in courts. Photographers are able to...
Abstract: Nowadays, digital images can be easily mod-ified by using high-performance computers, soph...
A variety of forensic methods have been developed to identify falsified photos, each unified by the ...
Detecting digital face manipulation has attracted extensive attention due to fake media's potential ...
We propose two tampered image detection methods based on consistency of shadow. The first method is ...
AbstractImages are one of the powerful media for communication. Image security is a main issue in th...
Abstract—For decades, photographs have been used to docu-ment space-time events and they have often ...
www.cs.dartmouth.edu/∼{kimo,farid} Abstract. When creating a digital composite of two people, it is ...
The increase in sophistication of image manipulation software such as Adobe Photoshop, coupled with ...
We present new forensic tools that are capable of detecting traces of tampering in digital images wi...
The advent of sophisticated photo editing software has made it increasingly easier to manipulate dig...
A variety of forensic methods have been developed to identify falsified photos, each unified by the ...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...
Nowadays the digital image plays an important role in human life. Due to large growth in the image p...
In this paper, a novel approach for exposing digital image tampering based on the theory of spherica...
Abstract—In recent days, photographs have been used as evidence in courts. Photographers are able to...
Abstract: Nowadays, digital images can be easily mod-ified by using high-performance computers, soph...
A variety of forensic methods have been developed to identify falsified photos, each unified by the ...
Detecting digital face manipulation has attracted extensive attention due to fake media's potential ...
We propose two tampered image detection methods based on consistency of shadow. The first method is ...
AbstractImages are one of the powerful media for communication. Image security is a main issue in th...
Abstract—For decades, photographs have been used to docu-ment space-time events and they have often ...
www.cs.dartmouth.edu/∼{kimo,farid} Abstract. When creating a digital composite of two people, it is ...
The increase in sophistication of image manipulation software such as Adobe Photoshop, coupled with ...
We present new forensic tools that are capable of detecting traces of tampering in digital images wi...
The advent of sophisticated photo editing software has made it increasingly easier to manipulate dig...
A variety of forensic methods have been developed to identify falsified photos, each unified by the ...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...