Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Applied Sciences  /  Vol: 11 Par: 23 (2021)  /  Artículo
ARTÍCULO
TITULO

Analyzing Benford?s Law?s Powerful Applications in Image Forensics

Diana Cri?an    
Alexandru Irimia    
Dan Gota    
Liviu Miclea    
Adela Puscasiu    
Ovidiu Stan and Honoriu Valean    

Resumen

The Newcomb?Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as image forensics. In this article, we study JPEG compression from the point of view of Benford?s law. The article focuses on ways to detect fraudulent images and JPEG quality factors. Moreover, using the image?s luminance channel and JPEG coefficients, we describe a technique for determining the quality factor with which a JPEG image is compressed. The algorithm?s results are described in considerably more depth in the article?s final sections. Furthermore, the proposed idea is applicable to any procedure that involves the analysis of digital images and in which it is strongly suggested that the image authenticity be verified prior to beginning the analyzing process.

 Artículos similares

       
 
Bo Yang, He Yu, Chaofan Liu, Xiang Wei, Zichen Fan and Jun Miao    
Aero-optical effects are the key factors that restrict the accuracy of the optical sensors of hypersonic vehicles, and the numerical simulation of aero-optical effects is a powerful tool with which to analyze aero-optical distortion. Most existing resear... ver más
Revista: Aerospace

 
Yongbo Jiang, Gongxue Sun and Tao Feng    
With the increasing value of various kinds of data in the era of big data, the demand of different subjects for data transactions has become more and more urgent. In this paper, a blockchain-based data transaction protection scheme is proposed to realize... ver más
Revista: Information

 
Souad Ajjaj, Souad El Houssaini, Mustapha Hain and Mohammed-Alamine El Houssaini    
The performance assessment of routing protocols in vehicular ad hoc networks (VANETs) plays a critical role in testing the efficiency of the routing algorithms before deployment in real conditions. This research introduces the statistical design of exper... ver más

 
Haifa Alanzi and Mohammad Alkhatib    
An identity management system (IDMS) manages and organizes identities and credentials information exchanged between users, identity providers (IDPs), and service providers (SPs) to ensure confidentiality and enhance privacy of users? personal data. Tradi... ver más
Revista: Applied Sciences

 
Lan Luan, Guixiang Shen, Yingzhi Zhang and Guiming Guo    
Identifying the key components of CNC lathe and analyzing the fault propagation behavior is a powerful guarantee for the fault diagnosis and health maintenance of CNC lathe. The traditional key component identification studies are mostly based on the fea... ver más
Revista: Applied Sciences