Normal view MARC view ISBD view

Digital Image Forensics [electronic resource] : Theory and Implementation / by Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty.

By: Roy, Aniket [author.].
Contributor(s): Dixit, Rahul [author.] | Naskar, Ruchira [author.] | Chakraborty, Rajat Subhra [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Studies in Computational Intelligence: 755Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2020Edition: 1st ed. 2020.Description: XVI, 89 p. 45 illus., 32 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9789811076442.Subject(s): Signal processing | Computer vision | Computer crimes | Signal, Speech and Image Processing | Computer Vision | CybercrimeAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 621.382 Online resources: Click here to access online
Contents:
Chapter 1: Introduction -- Chapter 2: Source Camera Identification Using Statistical Features -- Chapter 3: Copy Move Forgery Detection in Digital Images – A Survey and Analysis -- Chapter 4: Copy–Move Forgery Detection exploiting Statistical Image Features -- Chapter 5: Blur-invariant Copy-move Forgery Detection utilizing SWT-SVD -- Chapter 6: Copy–Move Forgery Detection with Similar but Genuine Objects using Texture Features -- Chapter 7: Conclusions and Future Work.
In: Springer Nature eBookSummary: This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on “copy-move forgery” in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on “Digital Image Processing”, “Information Security”, “Machine Learning”, “Computer Vision” and “Multimedia Security and Forensics”.
    average rating: 0.0 (0 votes)
No physical items for this record

Chapter 1: Introduction -- Chapter 2: Source Camera Identification Using Statistical Features -- Chapter 3: Copy Move Forgery Detection in Digital Images – A Survey and Analysis -- Chapter 4: Copy–Move Forgery Detection exploiting Statistical Image Features -- Chapter 5: Blur-invariant Copy-move Forgery Detection utilizing SWT-SVD -- Chapter 6: Copy–Move Forgery Detection with Similar but Genuine Objects using Texture Features -- Chapter 7: Conclusions and Future Work.

This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on “copy-move forgery” in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on “Digital Image Processing”, “Information Security”, “Machine Learning”, “Computer Vision” and “Multimedia Security and Forensics”.

There are no comments for this item.

Log in to your account to post a comment.