Results 71 to 80 of about 79,494 (188)

Image Forgery Localization Based on Multi-Scale Convolutional Neural Networks

open access: yes, 2018
In this paper, we propose to utilize Convolutional Neural Networks (CNNs) and the segmentation-based multi-scale analysis to locate tampered areas in digital images.
Cao, Yun   +3 more
core   +1 more source

Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics

open access: yesIEEE Access, 2018
Video copy-move forgery detection is one of the hot topics in multimedia forensics to protect digital videos from malicious use. Several approaches have been presented through analyzing the side effect caused by copy-move operation.
Shan Jia   +4 more
doaj   +1 more source

Forensik Citra untuk Deteksi Rekayasa File Menggunakan Error Level Analysis [PDF]

open access: yes, 2016
Pada era citra digital, software editing yang bagus memungkinkan pengguna untuk memproses citra digital dengan cara yang mudah. Jadi hal tersebut tidak bisa dihindari sehingga pemalsuan Citra semakin meluas.
Sari, T. -. (Titi)
core  

Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection

open access: yes, 2017
Local descriptors based on the image noise residual have proven extremely effective for a number of forensic applications, like forgery detection and localization.
Cozzolino, Davide   +2 more
core   +1 more source

Detecting image manipulation with ELA-CNN integration: a powerful framework for authenticity verification [PDF]

open access: yesPeerJ Computer Science
The exponential progress of image editing software has contributed to a rapid rise in the production of fake images. Consequently, various techniques and approaches have been developed to detect manipulated images.
Ahmad M. Nagm   +6 more
doaj   +2 more sources

Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries

open access: yes, 2019
With advanced image journaling tools, one can easily alter the semantic meaning of an image by exploiting certain manipulation techniques such as copy-clone, object splicing, and removal, which mislead the viewers.
Bappy, Jawadul H.   +4 more
core   +1 more source

Sistem Pendeteksi Gambar Termanipulasi Menggunakan Metode SIFT

open access: yesTechne, 2017
Pada penelitian di publikasi ini, penulis membangun sistem pendeteksi gambar termanipulasi dengan metode pemalsuan penyerangan copy-move. Metode SIFT oleh David Lowe digunakan untuk menentukan SIFT fitur vektor yang berisi deskriptor titik kunci dengan ...
Regina Lionnie, Mudrik Alaydrus
doaj   +1 more source

Home - About - Disclaimer - Privacy