Жанры
Авторы
Контакты
О сайте
Книжные новинки
Популярные книги
Найти
Главная
Авторы
William Puech
Multimedia Security, Volume 1
Читать книгу Multimedia Security, Volume 1 - William Puech - Страница 1
Оглавление
Предыдущая
Следующая
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
51
Оглавление
Купить и скачать книгу
Вернуться на страницу книги Multimedia Security, Volume 1
Оглавление
Страница 1
Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Страница 7
Страница 8
Страница 9
Страница 10
Страница 11
Страница 12
1
How to Reconstruct the History of a Digital Image, and of Its Alterations
1.1. Introduction 1.1.1.
General context
1.1.2.
Criminal background
1.1.3.
Issues for law enforcement
1.1.4.
Current methods and tools of law enforcement
1.1.5.
Outline of this chapter
1.2. Describing the image processing chain
1.2.1.
Raw image acquisition
1.2.2.
Demosaicing
1.2.3.
Color correction
1.2.4.
JPEG compression
1.3. Traces left on noise by image manipulation 1.3.1.
Non-parametric estimation of noise in images
1.3.2.
Transformation of noise in the processing chain
1.3.2.1.
Raw image acquisition
1.3.2.2.
Demosaicing
1.3.2.3.
Color correction
1.3.2.4.
JPEG compression
1.3.3.
Forgery detection through noise analysis
1.4. Demosaicing and its traces
1.4.1.
Forgery detection through demosaicing analysis
1.4.2.
Detecting the position of the Bayer matrix
1.4.2.1.
Joint estimation of the sampled pixels and the demosaicing algorithm
1.4.2.2.
Double demosaicing detection
1.4.2.3.
Direct detection of the grid by intermediate values
1.4.2.4.
Detecting the variance of the color difference
1.4.2.5.
Detection by neural networks of the relative position of blocks
1.4.3.
Limits of detection demosaicing
1.5. JPEG compression, its traces and the detection of its alterations
1.5.1.
The JPEG compression algorithm
1.5.2.
Grid detection
1.5.2.1.
Compression artifacts
1.5.2.2.
DCT coefficients
1.5.3.
Detecting the quantization matrix
1.5.4.
Beyond indicators, making decisions with a statistical model
1.6. Internal similarities and manipulations
1.7. Direct detection of image manipulation
1.8. Conclusion
1.9. References
{buyButton}
Подняться наверх