Results 21 to 30 of about 34,561 (185)
Secure and efficient DRM watermark algorithm of forensics in mobile internet
With the development of mobile Internet technology, the characteristic of easy editing, transmitting, and forging the digital media bring great challenges in authenticity of multimedia.
Ma Zhaofeng, Jiang Ming
doaj +1 more source
Image Noise and Digital Image Forensics [PDF]
Noise is an intrinsic specificity of all forms of imaging, and can be found in various forms in all domains of digital imagery. This paper offers an overall review of digital image noise, from its causes and models to the degradations it suffers along the image acquisition pipeline.
Julliand, Thibaut +2 more
openaire +2 more sources
A Document Image Generation Scheme Based on Face Swapping and Distortion Generation
Nowadays, digital images are widely used in various services. The emergence of more and more image editing algorithms has made image forensic approaches to be severely challenged.
Gang Zhu, Yuting Ding, Lin Zhao
doaj +1 more source
A study on the false positive rate of Stegdetect [PDF]
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz +13 more
core +1 more source
Court expertise dealing with the reconstruction of road traffic accidents often have to take into account the possibility that an accident could have been a set-up.
Dejan Paliska +3 more
doaj +1 more source
Using digital forensics in higher education to detect academic misconduct
Academic misconduct in all its various forms is a challenge for degree-granting institutions. Whilst text-based plagiarism can be detected using tools such as Turnitin™, Plagscan™ and Urkund™ (amongst others), contract cheating and collusion can be more ...
Clare Johnson, Ross Davies, Mike Reddy
doaj +1 more source
EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution
Education and training in digital forensics requires a variety of suitable challenge corpora containing realistic features including regular wear-and-tear, background noise, and the actual digital traces to be discovered during investigation.
Du, Xiaoyu, Lillis, David, Scanlon, Mark
core +1 more source
Image steganalysis for digital forensics [PDF]
Στην σημερινή εποχή, η στεγανογραφία είναι ο κύριος τρόπος για την επίτευξη παράνομης μυστικής επικοινωνίας. Ως εκ τούτου, η ανάγκη ανίχνευσης στεγανογραφικού περιεχομένου και ιδίως στεγανογραφημένων εικόνων γίνεται επιτακτική. Ωστόσο, η στεγανάλυση είναι ένα πολύ δύσκολο έργο και η επιτυχία της εξαρτάται από πολλούς παράγοντες, όπως η παρουσία του ...
openaire +1 more source
PRNU-based image classification of origin social network with CNN [PDF]
A huge amount of images are continuously shared on social networks (SNs) daily and, in most of cases, it is very difficult to reliably establish the SN of provenance of an image when it is recovered from a hard disk, a SD card or a smartphone memory ...
goljan +6 more
core +1 more source

