Tampering Detection

Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery

Self-embedding watermarking can be used for image tampering recovery. In this work, the authors proposed a new image self-embedding scheme based on optimal iterative block truncation coding and non-uniform watermark sharing. Experimental results …

CASIA Image Tampering Detection Evaluation Database

Image forensics has now raised the anxiety of justice as increasing cases of abusing tampered images in newspapers and court for evidence are reported recently. With the goal of verifying image content authenticity, passive-blind image tampering …

Image tampering detection based on stationary distribution of Markov chain

In this paper, we propose a passive image tampering detection method based on modeling edge information. We model the edge image of image chroma component as a finite-state Markov chain and extract low dimensional feature vector from its stationary …