{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T19:56:21Z","timestamp":1721937381205},"reference-count":28,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"

Images have always been considered a reliable source of evidence in the past. Today, the wide availability of photo editing software urges the authors to investigate the origin and the integrity of a digital image before trusting it. Although several algorithms have been developed for image integrity verification, a comprehensive tool that allows the analyst to synergically exploit these algorithms, and to reach a final decision based on their output, is still lacking. In this work the authors propose an image forensic tool trying to fill this gap. The proposed tool exploits state of the art algorithms for splicing detection, with forgery localization capabilities, and make them available to the analyst through a graphical interface. In order to help the analyst in reaching a final assessment, a decision fusion engine is employed to intelligently merge the output of different algorithms, boosting detection performance. The tool has a modular architecture, that makes it easily scalable.<\/p>","DOI":"10.4018\/ijdcf.2013100102","type":"journal-article","created":{"date-parts":[[2014,3,21]],"date-time":"2014-03-21T13:53:20Z","timestamp":1395410000000},"page":"15-33","source":"Crossref","is-referenced-by-count":5,"title":["A Forensic Tool for Investigating Image Forgeries"],"prefix":"10.4018","volume":"5","author":[{"given":"Marco","family":"Fontani","sequence":"first","affiliation":[{"name":"Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy"}]},{"given":"Tiziano","family":"Bianchi","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunications, Politecnico di Torino, Torino, Italy"}]},{"given":"Alessia","family":"De Rosa","sequence":"additional","affiliation":[{"name":"National Inter-University Consortium for Telecommunications, University of Florence, Firenze, Italy"}]},{"given":"Alessandro","family":"Piva","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Florence, Firenze, Italy"}]},{"given":"Mauro","family":"Barni","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy"}]}],"member":"2432","reference":[{"key":"ijdcf.2013100102-0","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"ijdcf.2013100102-1","doi-asserted-by":"crossref","unstructured":"Barni, M., Costanzo, A., & Sabatini, L. (2010). Identification of cut & paste tampering by means of double-JPEG detection and image segmentation. In Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS2010) (pp. 1687-1690). IEEE.","DOI":"10.1109\/ISCAS.2010.5537505"},{"key":"ijdcf.2013100102-2","doi-asserted-by":"crossref","unstructured":"Bianchi, T., De Rosa, A., & Piva, A. (2011). Improved DCT coefficient analysis for forgery localization in JPEG images. In Proceedings of the 2011 International Conference on Acoustics, Speech, and Signal Processing (ICASSP2011) (pp. 2444-2447). IEEE.","DOI":"10.1109\/ICASSP.2011.5946978"},{"key":"ijdcf.2013100102-3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2170836"},{"key":"ijdcf.2013100102-4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187516"},{"key":"ijdcf.2013100102-5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"ijdcf.2013100102-6","doi-asserted-by":"publisher","DOI":"10.1364\/OE.14.011551"},{"key":"ijdcf.2013100102-7","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177698950"},{"key":"ijdcf.2013100102-8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926987"},{"key":"ijdcf.2013100102-9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"ijdcf.2013100102-10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"ijdcf.2013100102-11","doi-asserted-by":"crossref","unstructured":"Fontani, M., Bianchi, T., De Rosa, A., Piva, A., & Barni, M. (2011). A Dempster-Shafer framework for decision fusion in image forensics. In Proceedings of 2011 IEEE International Workshop on Information Forensics and Security (WIFS2011) (pp. 1-6). IEEE.","DOI":"10.1109\/WIFS.2011.6123156"},{"key":"ijdcf.2013100102-12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2248727"},{"key":"ijdcf.2013100102-13","unstructured":"Fridrich, J., Soukal, B. D., & Luk\u00e1\u0161, J. (2003). Detection of copy-move forgery in digital images. In Proceedings of Digital Forensic Research Workshop. DFRWS."},{"key":"ijdcf.2013100102-14","doi-asserted-by":"crossref","unstructured":"Gallagher, A., & Chen, T. (2008). Image authentication by detecting traces of demosaicing. In Proceedings of Computer Vision and Pattern Recognition Workshops (CVPRW '08) (pp. 1-8). IEEE.","DOI":"10.1109\/CVPRW.2008.4562984"},{"issue":"3","key":"ijdcf.2013100102-15","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/TIFS.2009.2026458","article-title":"Intrinsic sensor noise features for forensic analysis on scanners and scanned images","volume":"4","author":"H.Gou","year":"2009","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ijdcf.2013100102-16","doi-asserted-by":"crossref","unstructured":"Kee, E., & Farid, H. (2010). Exposing digital forgeries from 3-D lighting environments. In Proceedings of 2010 IEEE International Workshop on Information Forensics and Security (WIFS2010) (pp. 1-6). IEEE.","DOI":"10.1109\/WIFS.2010.5711437"},{"key":"ijdcf.2013100102-17","doi-asserted-by":"crossref","unstructured":"Kirchner, M., & Fridrich, J. J. (2010). On detection of median filtering in digital images. In Memon N. D., Dittmann, J., Alattar, A. M., & Delp, E. J. (Eds.), Media forensics and security II, SPIE Proceedings (Vol. 7541) (754110). SPIE.","DOI":"10.1117\/12.839100"},{"key":"ijdcf.2013100102-18","unstructured":"Li, B., Shi, Y. Q., & Huang, J. (2008). Detecting doubly compressed JPEG images by using mode based first digit features. In Proc. of the 2008 International Workshop on Multimedia Signal Processing (MMSP 2008) (pp. 730-735). IEEE."},{"key":"ijdcf.2013100102-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.03.019"},{"key":"ijdcf.2013100102-20","doi-asserted-by":"crossref","unstructured":"Luo, W., Qu, Z., Huang, J., & Qiu, G. (2007). A novel method for detecting cropped and recompressed image block. In Proceedings of the 2007 International Conference on Acoustics, Speech, and Signal Processing (ICASSP2007) (Vol 2, pp. 217-220). IEEE.","DOI":"10.1109\/ICASSP.2007.366211"},{"key":"ijdcf.2013100102-21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2004.924603"},{"key":"ijdcf.2013100102-22","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701"},{"key":"ijdcf.2013100102-23","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839932"},{"key":"ijdcf.2013100102-24","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855406"},{"key":"ijdcf.2013100102-25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"ijdcf.2013100102-26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916010"},{"issue":"1","key":"ijdcf.2013100102-27","first-page":"1","article-title":"Robust image hashing for tamper detection using non-negative matrix factorization.","volume":"2","author":"Z.Tang","year":"2008","journal-title":"Journal of Ubiquitous Convergence Technology"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=103935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:27:07Z","timestamp":1654136827000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijdcf.2013100102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2013100102","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}