Survey: Neural Network Authentication and Tampering Detection

dc.contributor.authorKumar, R.
dc.contributor.authorP, A.
dc.contributor.authorNaveen, B.
dc.contributor.authorChandavarkar, B.R.
dc.date.accessioned2026-02-06T06:34:57Z
dc.date.issued2023
dc.description.abstractNeural networks have become quite the buzzword in a decade, resulting in extensive research and extensive integration of neural networks in application development. From self-driving vehicles to IoT devices, each such area has seen some form of integration of a neural network(s). Image and video content have found application in medical, forensic, etc. Due to the excessive use of digital content, there has also been a rise in various advanced image editing applications such as Photoshop, making it easier for people to tamper with images. Therefore, coming up with techniques to validate or authenticate images has gained much interest in recent times. Current neural network-based methods can see all kinds of tampering because neural network capability extracts complex features from the images, making them more effective. Thus, in this study, we review some image forgery techniques and look over how neural networks find their application to detect forgery and authenticate images. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
dc.identifier.citationSpringer Proceedings in Mathematics and Statistics, 2023, Vol.403, , p. 405-424
dc.identifier.issn21941009
dc.identifier.urihttps://doi.org/10.1007/978-3-031-16178-0_28
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/29563
dc.publisherSpringer
dc.subjectDCT
dc.subjectDigital watermarking
dc.subjectImage authentication
dc.subjectImage tampering
dc.subjectNeural networks
dc.titleSurvey: Neural Network Authentication and Tampering Detection

Files