Muutke küpsiste eelistusi

E-raamat: Digital Image Forensics: Theory and Implementation

  • Formaat - EPUB+DRM
  • Hind: 135,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on “copy-move forgery” in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on “Digital Image Processing”, “Information Security”, “Machine Learning”, “Computer Vision” and “Multimedia Security and Forensics”.

1 Introduction 1(10)
1.1 Threats to the Integrity of Digital Media Content
1(1)
1.2 Digital Content Protection
2(1)
1.3 Digital Forensics
3(6)
1.3.1 Image Source Identification
3(1)
1.3.2 Image Forgery Detection
4(5)
References
9(2)
2 Camera Source Identification 11(16)
2.1 Introduction
11(1)
2.2 Digital Camera Components
11(2)
2.3 Literature Review
13(2)
2.4 Source Camera Identification Framework
15(5)
2.4.1 Motivation for Choice of Features
15(1)
2.4.2 DCTR Feature Extraction
15(2)
2.4.3 Feature Transformation by PCA
17(1)
2.4.4 Classification
18(1)
2.4.5 Ensemble Classifier
19(1)
2.5 Experimental Results
20(5)
2.5.1 Experimental Setup
20(2)
2.5.2 Classification Accuracy Improvement (Dataset-1)
22(1)
2.5.3 Comparison of Accuracy with State-of-the-Art Techniques (Dataset-2)
22(2)
2.5.4 Evaluation of Overfitting Trends
24(1)
2.6 Conclusion
25(1)
References
25(2)
3 Copy-Move Forgery Detection in Digital Images-Survey and Accuracy Estimation Metrics 27(30)
3.1 Introduction
27(1)
3.2 Overview of Existing Techniques
28(1)
3.3 Classification of Block-Based Copy-Move Forgery Detection Techniques
29(16)
3.3.1 General Processing Pipeline for Copy-Move Forgery Detection Techniques
30(1)
3.3.2 Dimensionality Reduction-Based Copy-Move Forgery Detection
30(5)
3.3.3 Discrete Cosine Transform-Based Copy-Move Forgery Detection
35(5)
3.3.4 Wavelet Transform-Based Copy-Move Forgery Detection
40(5)
3.4 Three-Way Parameterization Platform
45(2)
3.5 Experimental Results
47(8)
3.5.1 Experimental Setup
47(1)
3.5.2 Comparison of Detection Accuracy
47(3)
3.5.3 Comparison of False Positive Rate
50(1)
3.5.4 Comparison of False Negative Rate
50(1)
3.5.5 Trade-Off Between Detection Accuracy and Computational Complexity
50(5)
3.5.6 Trade-Off Between Detection Accuracy and False Positive and Negative Rates
55(1)
3.6 Conclusion
55(1)
References
55(2)
4 Copy-Move Forgery Detection Exploiting Statistical Image Features 57(8)
4.1 Introduction
57(1)
4.2 Related Work
58(1)
4.3 Region Duplication Detection Technique Using Statistical Image Features
59(3)
4.3.1 Reducing False Matches
60(2)
4.4 Experimental Results
62(1)
4.4.1 Experimental Setup
62(1)
4.4.2 Comparison and Discussion
62(1)
4.5 Conclusion
63(1)
References
63(2)
5 Copy-Move Forgery Detection with Similar But Genuine Objects 65(14)
5.1 Introduction
65(2)
5.2 Proposed Method
67(5)
5.2.1 Keypoint Detection
67(1)
5.2.2 RLBP Feature Extraction
68(2)
5.2.3 Feature Matching
70(1)
5.2.4 Clustering and Forgery Detection
71(1)
5.3 Experimental Results
72(4)
5.3.1 Experimental Setup
72(1)
5.3.2 Comparison with State of the Art
72(3)
5.3.3 Experiments on Post-processed Tampered Images
75(1)
5.4 Conclusion
76(1)
References
76(3)
6 Copy-Move Forgery Detection in Transform Domain 79(8)
6.1 Introduction
79(1)
6.2 DyWT-Based Image Region Duplication Detection
79(4)
6.2.1 Minimization of False Matches
82(1)
6.3 Experimental Results
83(2)
6.4 Conclusion
85(1)
References
85(2)
7 Conclusion and Future Research Directions 87
References
88
Aniket Roy is an M.S. (research) student at the Department of Computer Science and Engineering at the Indian Institute of Technology Kharagpur. He received his B.Tech. degree in Electronics and Communication Engineering from West Bengal University of Technology (now Maulana Abul Kalam Azad University of Technology), India in 2014. His primary research interest lies in multimedia security, reversible watermarking and digital forensics. He received the Best Paper Award at the 15th International Workshop on Digital-forensics and Watermarking. He is an IEEE student member.

Rahul Dixit is a Ph.D. scholar at the Department of Computer Science and Engineering at the National Institute of Technology, Rourkela, India. He received his M.Tech. and B.Tech. degrees in Computer Science and Engineering from the Indian School of Mines, Dhanbad and Uttar Pradesh Technical University (now Dr. A.P.J. Abdul Kalam Technical University), respectively. His major research interests include digital image and video forensics, multimedia security and image processing.

Ruchira Naskar has been an assistant professor at the National Institute of Technology Department of Computer Science and Engineering, Rourkela, India since 2014. She received her Ph.D. from the Indian Institute of Technology Kharagpur, India in 2014. Her primary research interests are multimedia security and digital rights management, and she has over 30 publications in reputed journals and conferences. Her recent research interest is Digital Forensics. Dr. Naskar is a Member of the IEEE.





Rajat Subhra Chakraborty is an associate professor at the Indian Institute of Technology Kharagpur Department of Computer Science and Engineering, India. He has worked at National Semiconductor and Advanced Micro Devices (AMD). His research interests are in the areas of hardware security, very-large-scale integration (VLSI) design, digital watermarking and digital image forensics. He haspublished over 80 papers in respected international journals and conferences, and holds two U.S. patents. He has a Ph.D. in Computer Engineering from Case Western Reserve University (U.S.A.). Dr. Chakraborty is a senior member of the IEEE and the ACM.