Since the advent of digital cameras, many image editing tools have spread and allowed everyday users to modify picture content. Image filtering and retouching are broadly used to enhance color, contrast, and brightness to improve pictures’ aesthetics. Going deeper into image editing, Copy Move is considered one of the most popular alterations in the pixel domain. It consists of copying and pasting a portion of pixels onto another area in the same digital image. Having counterfeited pictures travel all over the Internet is pretty usual nowadays. However, spotting Copy Move is not straightforward to human eyes, as editing tools have achieved such high accuracy and detail. That is often used for two reasons: fun or criminal purposes. The former represents a way to hide or add multiple copies of an object, a face, or whatever lets users have fun. In that case, the latter undermines the trustworthiness of digital images as proof of something taken from a visual scene. This chapter surveys this field’s SOTA (state-of-the-art) methods by accounting for image features, approaches, and datasets used for experimental campaigns. In particular, low-level image processing, machine learning, and deep learning methods have been analyzed and compared against some publicly available datasets, including different tampering transformations, such as translation, rotation, and scaling. Finally, some considerations are discussed on the pros and cons of SOTA methods.
Do digital images tell the truth?, 2024.
Do digital images tell the truth?
A Bruno
;
2024-01-01
Abstract
Since the advent of digital cameras, many image editing tools have spread and allowed everyday users to modify picture content. Image filtering and retouching are broadly used to enhance color, contrast, and brightness to improve pictures’ aesthetics. Going deeper into image editing, Copy Move is considered one of the most popular alterations in the pixel domain. It consists of copying and pasting a portion of pixels onto another area in the same digital image. Having counterfeited pictures travel all over the Internet is pretty usual nowadays. However, spotting Copy Move is not straightforward to human eyes, as editing tools have achieved such high accuracy and detail. That is often used for two reasons: fun or criminal purposes. The former represents a way to hide or add multiple copies of an object, a face, or whatever lets users have fun. In that case, the latter undermines the trustworthiness of digital images as proof of something taken from a visual scene. This chapter surveys this field’s SOTA (state-of-the-art) methods by accounting for image features, approaches, and datasets used for experimental campaigns. In particular, low-level image processing, machine learning, and deep learning methods have been analyzed and compared against some publicly available datasets, including different tampering transformations, such as translation, rotation, and scaling. Finally, some considerations are discussed on the pros and cons of SOTA methods.File | Dimensione | Formato | |
---|---|---|---|
9781032408590_C012 (2).pdf
Accessibile solo dalla rete interna IULM
Tipologia:
Documento in Pre-print
Dimensione
1.88 MB
Formato
Adobe PDF
|
1.88 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.