Sign Up to like & get
recommendations!
0
Published in 2021 at "Forensic science international"
DOI: 10.1016/j.forsciint.2021.111040
Abstract: A forensic analyst needs to exploit various kinds of artefacts for developing a powerful forensic technique. Among those, the JPEG compression artefacts such as blocking artefacts & DCT histogram artefacts are the most widely used.…
read more here.
Keywords:
anti forensics;
based jpeg;
jpeg anti;
jpeg ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Optik"
DOI: 10.1016/j.ijleo.2020.164196
Abstract: Abstract JPEG standard has been widely applied in many image acquisition devices and image editing tools. Identifying the authenticity of JPEG images is receiving significant attention in image forensics. In many JPEG image splicing forgeries,…
read more here.
Keywords:
double jpeg;
traces nonaligned;
nonaligned double;
jpeg ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3051678
Abstract: JPEG compression is one of the major image compression methods and is widely used on the Internet. In addition, identifying traces of JPEG compression and double JPEG compression (DJPEG) is crucial in the image forensics…
read more here.
Keywords:
jpeg detection;
compression;
djpeg;
anti forensics ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3188299
Abstract: Various manipulations on JPEG images introduce single and multiple compression artifacts for forged and unmodified areas respectively. Based on the statistical analysis of JPEG compression cycle and on the finite mixture paradigm, we propose in…
read more here.
Keywords:
jpeg images;
localization;
jpeg;
framework ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Signal Processing Letters"
DOI: 10.1109/lsp.2021.3101424
Abstract: Reversible data hiding (RDH) for JPEG images has attracted extensive attentions in recent years. However, since DCT is a de-correlation operation, it is difficult for JPEG images to employ the image redundancy for RDH design…
read more here.
Keywords:
data hiding;
reversible data;
based multiple;
images based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Signal Processing Letters"
DOI: 10.1109/lsp.2021.3129419
Abstract: Due to a large number of user-uploaded images, social networks have become secure channels for covert communication. However, the JPEG recompression of social networks changes the DCT coefficients of stego images, resulting in the failure…
read more here.
Keywords:
jpeg;
steganography;
robustness;
performance ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Signal Processing Letters"
DOI: 10.1109/lsp.2022.3217727
Abstract: Most robust steganographic methods pursue insignificantly zero-bit error rate of hidden messages for ensuring the reliability of communication. Cover JPEG images are required to recompress many times for enhancing the robustness, that reduces the security.…
read more here.
Keywords:
lossy channels;
speech;
jpeg;
content aware ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE MultiMedia"
DOI: 10.1109/mmul.2017.38
Abstract: JPEG is celebrating the 25th anniversary of its approval as a standard this year. Where did JPEG come from, and what are the fundamental components that have given it longevity?
read more here.
Keywords:
jpeg still;
still going;
going strong;
jpeg ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE MultiMedia"
DOI: 10.1109/mmul.2023.3245919
Abstract: The Joint Photographic Experts Group (JPEG) AI learning-based image coding system is an ongoing joint standardization effort between International Organization for Standardization (ISO), International Electrotechnical Commission (IEC), and International Telecommunication Union - Telecommunication Sector (ITU-T)…
read more here.
Keywords:
visual data;
consumption;
machine;
image coding ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Circuits and Systems for Video Technology"
DOI: 10.1109/tcsvt.2020.3010554
Abstract: Recently, Li et al. proposed an effective non-additive distortion model for JPEG steganography by preserving Block Boundary Continuity (BBC) in the spatial domain. However, the method based on BBC only explored how the modifications of…
read more here.
Keywords:
non additive;
steganography;
bbc;
additive distortion ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Circuits and Systems for Video Technology"
DOI: 10.1109/tcsvt.2021.3097351
Abstract: Detecting double JPEG compression with the same quantization matrix is a challenging task in image forensics. To address this problem, in this paper, a novel method is proposed by leveraging the component convergence during repeated…
read more here.
Keywords:
double jpeg;
jpeg;
quantization;
jpeg compression ... See more keywords