Results 51 to 60 of about 79,494 (188)

DETEKSI PEMALSUAN CITRA DENGAN TEKNIK COPY-MOVE MENGGUNAKAN METODE ORDINAL MEASURE KOEFISIEN DISCRETE COSINE TRANSFORM [PDF]

open access: yes, 2016
Kemajuan teknologi pengolahan citra digital saat ini telah memberi dampak positif dan negatif bagi suatu citra. Salah satu dampak negatif adalah munculnya citra-citra digital palsu yang dihasilkan oleh teknik pengolahan citra.
Zulfan
core  

Overcoming Natural Similarity: A DenseNet-Based Approach for Reliable Transform Copy-Move Forgery Identification

open access: yesIEEE Access
Digital image forensics aims to verify the authenticity of an image by determining its origin and any processing it has undergone. Among passive approaches in copy move forgery detection, which analyze images without requiring prior embedded information,
Tanzeela Qazi   +6 more
doaj   +1 more source

Dual branch convolutional neural network for copy move forgery detection

open access: yesIET Image Processing, 2021
The advent of digital era has seen a rise in the cases of illegal copying, distribution and forging of images. Even the most secure data channels sometimes suffer to validate the integrity of images.
Nidhi Goel, Samarjeet Kaur, Ruchika Bala
doaj   +1 more source

Robust and Optimized Algorithm for Detection of Copy-Rotate-Move Tempering

open access: yesIEEE Access, 2023
Since the entire world is covered with computerized digital data, information through digital media is not difficult to move, access, and recycle. Currently, advanced image processing tools are used to create tempered pictures.
Abhishek Kashyap   +2 more
doaj   +1 more source

Copy Move Forgery Detection Using Forensic Images

open access: yesIraqi Journal of Science, 2021
     Digital images are open to several manipulations and dropped cost of compact  cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court.
Ayat Fadhel Homady Sewan   +1 more
openaire   +2 more sources

CNN-Keypoint Based Two-Stage Hybrid Approach for Copy-Move Forgery Detection

open access: yesIEEE Access
Authenticating digital images poses a significant challenge due to the widespread use of image forgery techniques, including copy-move forgery. Copy-move forgery involves copying and pasting portions of an image within the same image while applying ...
Anjali Diwan, Anil K. Roy
doaj   +1 more source

An Attack-Independent Audio Forgery Detection Technique Based on Cochleagram Images of Segments With Dynamic Threshold

open access: yesIEEE Access
Thanks to advanced audio editing software, speech recordings can be tampered with very quickly. If the speech recordings are used as forensic evidence, adding the audio recordings together, cutting them, and changing their content are legally ...
Beste Ustubioglu
doaj   +1 more source

Analysis of Copy-move Manipulation in Digital Images using Scale Invariant Feature Transform (SIFT) and SVD-matching Methods

open access: yesJournal of Applied Informatics and Computing
In recent years, more and more data has been created in digital form, allowing for easier control over storage and manipulation thanks to technological advancements.
Muhamad Masjun Efendi, Nukman Nukman
doaj   +1 more source

A reliable order-statistics-based approximate nearest neighbor search algorithm

open access: yes, 2016
We propose a new algorithm for fast approximate nearest neighbor search based on the properties of ordered vectors. Data vectors are classified based on the index and sign of their largest components, thereby partitioning the space in a number of cones ...
Cozzolino, Davide   +2 more
core   +1 more source

Boosting Image Forgery Detection using Resampling Features and Copy-move analysis

open access: yes, 2018
Realistic image forgeries involve a combination of splicing, resampling, cloning, region removal and other methods. While resampling detection algorithms are effective in detecting splicing and resampling, copy-move detection algorithms excel in ...
Bappy, Jawadul H.   +8 more
core  

Home - About - Disclaimer - Privacy