4,856 research outputs found

    Reviewing the Effectivity Factor in Existing Techniques of Image Forensics

    Get PDF
    Studies towards image forensics are about a decade old and various forms of research techniques have been presented till date towards image forgery detection. Majority of the existing techniques deals with identification of tampered regions using different forms of research methodologies. However, it is still an open-end question about the effectiveness of existing image forgery detection techniques as there is no reported benchmarked outcome till date about it. Therefore, the present manuscript discusses about the most frequently addressed image attacks e.g. image splicing and copy-move attack and elaborates the existing techniques presented by research community to resist it. The paper also contributes to explore the direction of present research trend with respect to tool adoption, database adoption, and technique adoption, and frequently used attack scenario. Finally, significant open research gap are explored after reviewing effectiveness of existing techniques

    The Dangers of Digital Imaging

    Get PDF
    In today\u27s world, photography takes on a whole different meaning that it did 20-30 years ago. Whereas terms such as photograph and graphic used to have separate meanings that classified them from one another, these and many similar terms have been melded together to represent the same thing... a computer image. Due to the jump in technology over the past 10 years alone, digital cameras went from flashy novelties to a strong industry standard in photography, and swift computer alteration of photographs and images began with a very small amount of people to practically everyone who has a computer today. The digital revolution is now upon us, basically leaving analogue film for the die-hard nostalgic artists that once believed that film could never be replaced by digital images, but as it seems today, this swap of digital over analogue has definitely become reality. With this digital takeover at our feet, there is a very real threat of the lines between reality and trickery being blurred, and a considerable amount of information that we all need to be aware of. The dangers of digital imaging are all around us, slowly escalating in potency, and what we see now in the world today is only the beginning. (Abstract created by OPUS staff from thesis

    More Than Meets the Eye: Proximity to Crises through Presidential Photographs

    Get PDF
    We look at three photographs, each made at a time of profound crisis, in order to tease out notions of proximity. Vision gives us proximity at a distance. Photographs may give us a similar proximity. Human vision depends on experience built up from individual events of seeing. Can a photograph made in a fraction of a second by someone else at some other time and some other place provide anything more than data about some surfaces in front of the lens? Can words and other images from the photographers enhance the viewer’s proximity to the original? Can we make use of the photographers’ accounts of their proximities for enhancing the understanding of individual viewers? We examine various aspects of proximity and photography in the context of images of U.S. presidents in times of crises – mechanical and conceptual restraints on photographic representation, external sources of contextualizing information, forms of proximity of the photographers to the presidents, and the strengths and weaknesses of existing metadata

    Spartan Daily, November 15, 1960

    Get PDF
    Volume 48, Issue 34https://scholarworks.sjsu.edu/spartandaily/4088/thumbnail.jp

    Digital Forensic Technique for Multiple Compression based JPEG Forgery

    Get PDF
    In today's digital world digital multimedia like, images, voice-notes and videos etc., are the major source of information/data exchange. The authenticity of these multimedia is greatly vital in the legitimate business, media world and broadcast industry. However, with enormous multiplication of ease, simple-to-utilize data manipulation tools and softwares lead to the faithfulness of digital images is in question. In our work, we propose a technique to identify digital forgery or tampering in JPEG (Joint Photographic Experts Group) images which are based on multiple compression factor. We are dealing with the JPEG images on the grounds because JPEG is the standard storage format used in almost all present day digital devices like digital camera, camcorder, mobile devices and other image acquisition devices. JPEG compresses a image to the best compression in-order to manage the storage requirement. JPEG is a lossy compression standard. At the point when an assailant or criminal modifies some region/part of a JPEG image by any image processing tools and save it, the modified region of the image is doubly-compressed. In our work, we exploit this multiple compression in JPEG images to distinguish digital forgery or falsification

    Dark Archive: The Afterlife of Forensic Photographs

    Full text link
    This chapter explores what happens to old police photographs. When taken, these photographs capture the aftermath of a crime and are intended to have an evidentiary purpose. After the conclusion of proceedings, or the closure of the police file, these images sometimes acquire new value, separate from their role in a criminal investigation. Drawing upon the work of Luc Sante and Peter Doyle, this chapter seeks to understand what is forensic about forensic photographs and what else they might contain. It examines the effects of exhibiting police photographs in the cultural sphere, in their afterlife, exposing the aesthetic and affective attributes of evidentiary photography
    corecore