{"title":"现有数字图像伪造检测技术综述","authors":"Rajneesh Rani, Akshay Kumar, Amrita Rai","doi":"10.1109/ICIIP53038.2021.9702688","DOIUrl":null,"url":null,"abstract":"Law enforcement in the 21st century works on the evidence present in digital images or videos. Digital image processing is, thus, being heavily applied in the field of law enforcement, especially when it comes to detecting whether digital evidence related to legal matters has been tampered with or not. Due to the easy availability of various software, it is effortless for any law offender to have evidence such as digital images or videos transformed for their cause. Hence, two types of tampering detection techniques are used to maintain the integrity of digital evidence, namely Active and Passive. The active methods require that some kind of pre-embedded data be present in the image, using which detection can be performed while the passive techniques are applicable without any such condition. The differences, working, and classifications of these techniques are elaborately discussed here.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Brief Review on Existing Techniques for Detecting Digital Image Forgery\",\"authors\":\"Rajneesh Rani, Akshay Kumar, Amrita Rai\",\"doi\":\"10.1109/ICIIP53038.2021.9702688\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Law enforcement in the 21st century works on the evidence present in digital images or videos. Digital image processing is, thus, being heavily applied in the field of law enforcement, especially when it comes to detecting whether digital evidence related to legal matters has been tampered with or not. Due to the easy availability of various software, it is effortless for any law offender to have evidence such as digital images or videos transformed for their cause. Hence, two types of tampering detection techniques are used to maintain the integrity of digital evidence, namely Active and Passive. The active methods require that some kind of pre-embedded data be present in the image, using which detection can be performed while the passive techniques are applicable without any such condition. The differences, working, and classifications of these techniques are elaborately discussed here.\",\"PeriodicalId\":431272,\"journal\":{\"name\":\"2021 Sixth International Conference on Image Information Processing (ICIIP)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Sixth International Conference on Image Information Processing (ICIIP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIIP53038.2021.9702688\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Sixth International Conference on Image Information Processing (ICIIP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIIP53038.2021.9702688","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Brief Review on Existing Techniques for Detecting Digital Image Forgery
Law enforcement in the 21st century works on the evidence present in digital images or videos. Digital image processing is, thus, being heavily applied in the field of law enforcement, especially when it comes to detecting whether digital evidence related to legal matters has been tampered with or not. Due to the easy availability of various software, it is effortless for any law offender to have evidence such as digital images or videos transformed for their cause. Hence, two types of tampering detection techniques are used to maintain the integrity of digital evidence, namely Active and Passive. The active methods require that some kind of pre-embedded data be present in the image, using which detection can be performed while the passive techniques are applicable without any such condition. The differences, working, and classifications of these techniques are elaborately discussed here.