Image and Video Forensics

Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways...

Full description

Bibliographic Details
Main Author: Amerini, Irene
Other Authors: Baldini, Gianmarco, Leotta, Francesco
Format: eBook
Language:English
Published: Basel MDPI - Multidisciplinary Digital Publishing Institute 2022
Subjects:
N/a
Vgg
Svd
Online Access:
Collection: Directory of Open Access Books - Collection details see MPG.ReNa
LEADER 05707nma a2201345 u 4500
001 EB002050040
003 EBX01000000000000001193706
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220822 ||| eng
020 |a 9783036528069 
020 |a 9783036528076 
020 |a books978-3-0365-2807-6 
100 1 |a Amerini, Irene 
245 0 0 |a Image and Video Forensics  |h Elektronische Ressource 
260 |a Basel  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2022 
300 |a 1 electronic resource (424 p.) 
653 |a facial Presentation Attack Detection (PAD) 
653 |a deepfakes 
653 |a forensic evidence evaluation 
653 |a image forensics 
653 |a forged image detection 
653 |a multimedia content manipulation 
653 |a photo response non-uniformity 
653 |a deep learning 
653 |a smartphone identification 
653 |a video forensic 
653 |a compression 
653 |a audio forensics 
653 |a facial manipulations 
653 |a deep one-class 
653 |a hand-crafted features 
653 |a short-time Fourier transform (STFT) 
653 |a face landmarks 
653 |a user profile linking 
653 |a forensics detection 
653 |a social networks 
653 |a camera fingerprint 
653 |a fake image 
653 |a Information technology industries / bicssc 
653 |a facial recognition 
653 |a RGB camera-based anti-spoofing methods 
653 |a social media platform identification 
653 |a digital forensics 
653 |a Deepfake 
653 |a convolutional neural networks 
653 |a GAN-generated image detection 
653 |a fake image detection 
653 |a computer vision 
653 |a Harris 
653 |a camera model identification 
653 |a anomaly detection 
653 |a face morphing 
653 |a deepfake detection 
653 |a media forensics 
653 |a cybersecurity 
653 |a PRNU 
653 |a videos 
653 |a survey 
653 |a support vector machines 
653 |a n/a 
653 |a performance 
653 |a discrete fourier transform 
653 |a multimedia forensics 
653 |a likelihood ratio 
653 |a source identification 
653 |a plausibility of decisions 
653 |a facial anti-spoofing 
653 |a simple linear iterative clustering (SLIC) 
653 |a social network 
653 |a video source attribution 
653 |a VGG 
653 |a inter-frame forgery 
653 |a estimation by rotational invariant techniques (ESPRIT) 
653 |a noise level function 
653 |a blind estimation 
653 |a GLCM 
653 |a video forensics 
653 |a transfer learning 
653 |a multiple signal classification (MUSIC) 
653 |a heatmap 
653 |a correlation 
653 |a JPEG 
653 |a copy-move forgery detection 
653 |a snapchat 
653 |a UAV videos 
653 |a digital investigations 
653 |a Tensor 
653 |a forensic process model 
653 |a deepfake 
653 |a source camera identification 
653 |a resolution 
653 |a biometrics 
653 |a digital image forensics 
653 |a classification 
653 |a SVD 
653 |a Generative Adversarial Networks 
653 |a DeepFake detection 
653 |a automatic border control 
653 |a pattern recognition 
653 |a neural network 
700 1 |a Baldini, Gianmarco 
700 1 |a Leotta, Francesco 
700 1 |a Amerini, Irene 
041 0 7 |a eng  |2 ISO 639-2 
989 |b DOAB  |a Directory of Open Access Books 
500 |a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/ 
028 5 0 |a 10.3390/books978-3-0365-2807-6 
856 4 2 |u https://directory.doabooks.org/handle/20.500.12854/78721  |z DOAB: description of the publication 
856 4 0 |u https://www.mdpi.com/books/pdfview/book/4812  |7 0  |x Verlag  |3 Volltext 
082 0 |a 000 
082 0 |a 780 
082 0 |a 700 
082 0 |a 600 
520 |a Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways through the use of consumer electronics and high-quality digital imaging devices, such as smartphones, digital cameras, tablets, and wearable and IoT devices. The ever-increasing convenience of image acquisition has facilitated instant distribution and sharing of digital images on digital social platforms, determining a great amount of exchange data. Moreover, the pervasiveness of powerful image editing tools has allowed the manipulation of digital images for malicious or criminal ends, up to the creation of synthesized images and videos with the use of deep learning techniques. In response to these threats, the multimedia forensics community has produced major research efforts regarding the identification of the source and the detection of manipulation. In all cases (e.g., forensic investigations, fake news debunking, information warfare, and cyberattacks) where images and videos serve as critical evidence, forensic technologies that help to determine the origin, authenticity, and integrity of multimedia content can become essential tools. This book aims to collect a diverse and complementary set of articles that demonstrate new developments and applications in image and video forensics to tackle new and serious challenges to ensure media authenticity.