Results 11 to 20 of about 71,532 (148)

MSRD-CNN: Multi-Scale Residual Deep CNN for General-Purpose Image Manipulation Detection

open access: yesIEEE Access, 2022
The authenticity of digital images is a major concern in multimedia forensics due to the availability of advanced photo editing tools/devices. In the literature, several image forensic methods are available to detect specific image processing or editing ...
Kapil Rana, Gurinder Singh, Puneet Goyal
doaj   +1 more source

Detection of tamper forgery image in security digital mage

open access: yesMeasurement: Sensors, 2023
Every industry that uses digital photos is concerned about image security. Forensics and public safety have long relied on suspect photos, crime scene photos, biometric photos, and other images.
Mohammed Fakhrulddin Abdulqader   +2 more
doaj   +1 more source

An Improved JPEG Image Blocking Artifact Detector

open access: yesBrazilian Archives of Biology and Technology, 2023
Sharing digital images on social media has become very common these days. People must check for authenticity to share images on social media websites.
Ashish Soni   +3 more
doaj   +1 more source

Video-Based Evidence Analysis and Extraction in Digital Forensic Investigation

open access: yesIEEE Access, 2019
As a result of the popularity of smart mobile devices and the low cost of surveillance systems, visual data are increasingly being used in digital forensic investigation.
Jianyu Xiao, Shancang Li, Qingliang Xu
doaj   +1 more source

A Survey of Deep Learning-Based Source Image Forensics

open access: yesJournal of Imaging, 2020
Image source forensics is widely considered as one of the most effective ways to verify in a blind way digital image authenticity and integrity. In the last few years, many researchers have applied data-driven approaches to this task, inspired by the ...
Pengpeng Yang   +5 more
doaj   +1 more source

A study on the false positive rate of Stegdetect [PDF]

open access: yes, 2013
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz   +13 more
core   +1 more source

3D Multislice and Cone-beam Computed Tomography Systems for Dental Identification

open access: yesPrague Medical Report, 2017
3D Multislice and Cone-beam computed tomography (CBCT) in forensic odontology has been shown to be useful not only in terms of one or a few of dead bodies but also in multiple fatality incidents.
Hana Eliášová, Taťjana Dostálová
doaj   +1 more source

The Forensicability of Operation Detection in Image Operation Chain

open access: yesIEEE Access, 2022
A large number of forensics research focus on operation detection to reveal the evidence of forgery action in the digital image. In the early works, analyst firstly model the probability distribution of single operation, and design the forensic tools ...
Zhipeng Chen, Jie Zhu, Jun Zhang
doaj   +1 more source

Forensic Technique for Detection of Image Forgery [PDF]

open access: yes, 2017
Todays digital image plays an important role in all areas such as baking, communication, business etc. Due to the availability of manipulation software it is very easy to manipulate the original image.
Chourey, A. P. (Asst)   +1 more
core   +1 more source

FloreView: An Image and Video Dataset for Forensic Analysis

open access: yesIEEE Access, 2023
Linking a digital image or video to its originating device, or checking the content integrity still represent challenging forensic tasks. Even though several technologies based on metadata, file format, and sensor noise have been developed to address ...
Daniele Baracchi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy