000 04067nam a22005895i 4500
001 978-981-10-7644-2
003 DE-He213
005 20220801213729.0
007 cr nn 008mamaa
008 190513s2020 si | s |||| 0|eng d
020 _a9789811076442
_9978-981-10-7644-2
024 7 _a10.1007/978-981-10-7644-2
_2doi
050 4 _aTK5102.9
072 7 _aTJF
_2bicssc
072 7 _aUYS
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aUYS
_2thema
082 0 4 _a621.382
_223
100 1 _aRoy, Aniket.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_933968
245 1 0 _aDigital Image Forensics
_h[electronic resource] :
_bTheory and Implementation /
_cby Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty.
250 _a1st ed. 2020.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2020.
300 _aXVI, 89 p. 45 illus., 32 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aStudies in Computational Intelligence,
_x1860-9503 ;
_v755
505 0 _aChapter 1: Introduction -- Chapter 2: Source Camera Identification Using Statistical Features -- Chapter 3: Copy Move Forgery Detection in Digital Images – A Survey and Analysis -- Chapter 4: Copy–Move Forgery Detection exploiting Statistical Image Features -- Chapter 5: Blur-invariant Copy-move Forgery Detection utilizing SWT-SVD -- Chapter 6: Copy–Move Forgery Detection with Similar but Genuine Objects using Texture Features -- Chapter 7: Conclusions and Future Work.
520 _aThis book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on “copy-move forgery” in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on “Digital Image Processing”, “Information Security”, “Machine Learning”, “Computer Vision” and “Multimedia Security and Forensics”.
650 0 _aSignal processing.
_94052
650 0 _aComputer vision.
_933969
650 0 _aComputer crimes.
_910774
650 1 4 _aSignal, Speech and Image Processing .
_931566
650 2 4 _aComputer Vision.
_933970
650 2 4 _aCybercrime.
_933477
700 1 _aDixit, Rahul.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_933971
700 1 _aNaskar, Ruchira.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_933972
700 1 _aChakraborty, Rajat Subhra.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_933973
710 2 _aSpringerLink (Online service)
_933974
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811076435
776 0 8 _iPrinted edition:
_z9789811076459
830 0 _aStudies in Computational Intelligence,
_x1860-9503 ;
_v755
_933975
856 4 0 _uhttps://doi.org/10.1007/978-981-10-7644-2
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c75530
_d75530