{"title":"数字图像伪造检测研究进展","authors":"Shantanu Pradhan, U. Chauhan, S. Chauhan","doi":"10.1109/iciptm54933.2022.9754125","DOIUrl":null,"url":null,"abstract":"The image forgery methods are utilized to give the specific picture as automated pictures without any mistakes in catching of advanced picture data which shows the first picture. While contrasted with ordinary pictures the altered pictures are hard to discover the manufactured pictures. The picture ought to keep up with the credibility and respectability to get the image from unapproved clients. In this paper, we have analyzed the computerized picture imitation and JPEG is the most widely recognized configuration utilized by the visual pictures and the advanced camera gadgets. These activities are acted in an adobe photograph shop utilizing with the substance of picture security to reestablish some computerized picture with a legitimacy and uprightness to recognize the advanced picture imitation utilizing dynamic and detached methods.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"107 1","pages":"697-702"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review on Digital Image Forgery Detection\",\"authors\":\"Shantanu Pradhan, U. Chauhan, S. Chauhan\",\"doi\":\"10.1109/iciptm54933.2022.9754125\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The image forgery methods are utilized to give the specific picture as automated pictures without any mistakes in catching of advanced picture data which shows the first picture. While contrasted with ordinary pictures the altered pictures are hard to discover the manufactured pictures. The picture ought to keep up with the credibility and respectability to get the image from unapproved clients. In this paper, we have analyzed the computerized picture imitation and JPEG is the most widely recognized configuration utilized by the visual pictures and the advanced camera gadgets. These activities are acted in an adobe photograph shop utilizing with the substance of picture security to reestablish some computerized picture with a legitimacy and uprightness to recognize the advanced picture imitation utilizing dynamic and detached methods.\",\"PeriodicalId\":6810,\"journal\":{\"name\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"107 1\",\"pages\":\"697-702\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iciptm54933.2022.9754125\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9754125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The image forgery methods are utilized to give the specific picture as automated pictures without any mistakes in catching of advanced picture data which shows the first picture. While contrasted with ordinary pictures the altered pictures are hard to discover the manufactured pictures. The picture ought to keep up with the credibility and respectability to get the image from unapproved clients. In this paper, we have analyzed the computerized picture imitation and JPEG is the most widely recognized configuration utilized by the visual pictures and the advanced camera gadgets. These activities are acted in an adobe photograph shop utilizing with the substance of picture security to reestablish some computerized picture with a legitimacy and uprightness to recognize the advanced picture imitation utilizing dynamic and detached methods.