Tina Nikoukhah

Tina Nikoukhah
Ecole normale supérieure de Cachan | ENS Cachan · Department of Mathematics

Master of Science

About

14
Publications
2,817
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
27
Citations
Education
September 2016 - September 2017
September 2014 - September 2017

Publications

Publications (14)
Article
Full-text available
Scientific research requires that results can be accessed, tested, and replicated by other researchers. In general, performing reproducible research is not simple and it can be even impossible (for example, in the case of astrophysics replicating singular events if even out of the control of the researcher). However, in computational sciences there...
Chapter
This chapter reviews the operations undergone by the raw image and describes the artifacts they leave in the final image. The Internet, digital media, new means of communication and social networks have accelerated the emergence of a connected world where perfect mastery over information becomes utopian. Image manipulation can serve the interests o...
Article
Full-text available
This work describes a method for detecting JPEG compression as well as its grid origin. The JPEG algorithm performs a quantization of the DCT coefficients of non-overlapping 8 x 8 blocks of images, setting many of those coefficients to zero. The method described here exploits these facts and identifies the presence of a JPEG grid when a significant...
Chapter
Plus de 80 % des données transmises sur les réseaux et archivées dans nos ordinateurs, tablettes, téléphones portables ou sur les Clouds sont des données multimédia (images, vidéos, son, données 3D) pour des applications allant du jeu vidéo aux données médicales, en passant par la conception assistée par ordinateur, la vidéosurveillance et la biomé...
Preprint
Full-text available
With the aim of evaluating image forensics tools, we propose a methodology to create forgeries traces, leaving intact the semantics of the image. Thus, the only forgery cues left are the specific alterations of one or several aspects of the image formation pipeline. This methodology creates automatically forged images that are challenging to detect...
Conference Paper
Full-text available
Reverse engineering is a useful tool for image falsification detection. We propose a simple and accurate method detecting JPEG compression and its grid origin, and compare it to the state of the art. The method can be used to determine if an image has been cropped, which is often the first indication of forgery.
Conference Paper
Full-text available
This work proposes a novel method for detecting JPEG compression, as well as its grid origin, based on counting the number of zeros in the DCT of 8 × 8 blocks. When applied locally, the same method can be used to detect grid alignment abnormalities. It therefore detects local image forgeries such as copy-move. The algorithm includes a statistical v...
Conference Paper
Full-text available
With the progress of image manipulation tools and the proliferation of fake news and images posted online on social networks, automatic identification of fake content is becoming indispensable. Lossy image compression leaves traces which can be used to recover the history of an image and to help decide about its authenticity. We propose a new JPEG...

Network

Cited By