LEADER 04298nam 22006495 450 001 9910366596103321 005 20200629210804.0 010 $a981-10-7644-8 024 7 $a10.1007/978-981-10-7644-2 035 $a(CKB)4100000008160608 035 $a(DE-He213)978-981-10-7644-2 035 $a(MiAaPQ)EBC5941008 035 $a(PPN)23652237X 035 $a(EXLCZ)994100000008160608 100 $a20190513d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Image Forensics$b[electronic resource] $eTheory and Implementation /$fby Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (XVI, 89 p. 45 illus., 32 illus. in color.) 225 1 $aStudies in Computational Intelligence,$x1860-949X ;$v755 311 $a981-10-7643-X 327 $aChapter 1: Introduction -- Chapter 2: Source Camera Identification Using Statistical Features -- Chapter 3: Copy Move Forgery Detection in Digital Images ? A Survey and Analysis -- Chapter 4: Copy?Move Forgery Detection exploiting Statistical Image Features -- Chapter 5: Blur-invariant Copy-move Forgery Detection utilizing SWT-SVD -- Chapter 6: Copy?Move Forgery Detection with Similar but Genuine Objects using Texture Features -- Chapter 7: Conclusions and Future Work. 330 $aThis book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on ?copy-move forgery? in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on ?Digital Image Processing?, ?Information Security?, ?Machine Learning?, ?Computer Vision? and ?Multimedia Security and Forensics?. 410 0$aStudies in Computational Intelligence,$x1860-949X ;$v755 606 $aSignal processing 606 $aImage processing 606 $aSpeech processing systems 606 $aOptical data processing 606 $aComputer crimes 606 $aSignal, Image and Speech Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/T24051 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 606 $aCybercrime$3https://scigraph.springernature.com/ontologies/product-market-codes/1B7000 615 0$aSignal processing. 615 0$aImage processing. 615 0$aSpeech processing systems. 615 0$aOptical data processing. 615 0$aComputer crimes. 615 14$aSignal, Image and Speech Processing. 615 24$aImage Processing and Computer Vision. 615 24$aCybercrime. 676 $a363.252 700 $aRoy$b Aniket$4aut$4http://id.loc.gov/vocabulary/relators/aut$0995397 702 $aDixit$b Rahul$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aNaskar$b Ruchira$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aChakraborty$b Rajat Subhra$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910366596103321 996 $aDigital Image Forensics$92280489 997 $aUNINA