{"title":"JPEG图像处理的图像取证分析(闪电讲座)","authors":"Seung-Ju Cha, Uijeong Kang, Eun-Jung Choi","doi":"10.1109/ICSSA45270.2018.00029","DOIUrl":null,"url":null,"abstract":"We use pictures as evidence. It is increasingly important to detect the manipulated areas of digital images. But we also face fabricated photographs to distort it. As the days go by, the fabricated image becomes more sophisticated and invisible. Many people have tried to improve image forensics technology to distinguish this fabricated images. In this paper, We investigate how to detect manipulated areas of a digital image like JPEG image format that used lossy compression. We use the features of the lossy compression to detect the manipulated image by the error level analysis(ELA) that is the analysis digital data such as JPEG format. And we're going to show that the Error Level Analysis(ELA) can work as image forensics. Through this analysis, we will be able to better judge manipulated images.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The Image Forensics Analysis of JPEG Image Manipulation (Lightning Talk)\",\"authors\":\"Seung-Ju Cha, Uijeong Kang, Eun-Jung Choi\",\"doi\":\"10.1109/ICSSA45270.2018.00029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We use pictures as evidence. It is increasingly important to detect the manipulated areas of digital images. But we also face fabricated photographs to distort it. As the days go by, the fabricated image becomes more sophisticated and invisible. Many people have tried to improve image forensics technology to distinguish this fabricated images. In this paper, We investigate how to detect manipulated areas of a digital image like JPEG image format that used lossy compression. We use the features of the lossy compression to detect the manipulated image by the error level analysis(ELA) that is the analysis digital data such as JPEG format. And we're going to show that the Error Level Analysis(ELA) can work as image forensics. Through this analysis, we will be able to better judge manipulated images.\",\"PeriodicalId\":223442,\"journal\":{\"name\":\"2018 International Conference on Software Security and Assurance (ICSSA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Software Security and Assurance (ICSSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSSA45270.2018.00029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Software Security and Assurance (ICSSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSA45270.2018.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Image Forensics Analysis of JPEG Image Manipulation (Lightning Talk)
We use pictures as evidence. It is increasingly important to detect the manipulated areas of digital images. But we also face fabricated photographs to distort it. As the days go by, the fabricated image becomes more sophisticated and invisible. Many people have tried to improve image forensics technology to distinguish this fabricated images. In this paper, We investigate how to detect manipulated areas of a digital image like JPEG image format that used lossy compression. We use the features of the lossy compression to detect the manipulated image by the error level analysis(ELA) that is the analysis digital data such as JPEG format. And we're going to show that the Error Level Analysis(ELA) can work as image forensics. Through this analysis, we will be able to better judge manipulated images.