Results 31 to 40 of about 34,561 (185)
Image tampering detection using genetic algorithm [PDF]
As digital images become an indispensable source of information, the authentication of digital images has become crucial. Various techniques of forgery have come into existence, intrusive, and non-intrusive. Image forgery detection hence is becoming more
Agarwal Ritu, Pant Mallika
doaj +1 more source
An Object Detection Using Image Processing In Digital Forensics Science
Object detection is one of the most important sectors in digital forensics science. The object detection technique is valuable for a number of purposes for instance: medical diagnosis scanners, traffic monitoring system, airport security examination ...
Kamran Ali Changezi +1 more
doaj +1 more source
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong +4 more
core +2 more sources
Provenance analysis for instagram photos [PDF]
As a feasible device fingerprint, sensor pattern noise (SPN) has been proven to be effective in the provenance analysis of digital images. However, with the rise of social media, millions of images are being uploaded to and shared through social media ...
CT Li +12 more
core +1 more source
Can we trust digital image forensics? [PDF]
Compared to the prominent role digital images play in nowadays multimedia society, research in the field of image authenticity is still in its infancy. Only recently, research on digital image forensics has gained attention by addressing tamper detection and image source identification.
Thomas Gloe +3 more
openaire +1 more source
The field of Digital Image Forensics (DIF) faces a critical issue in accurately identifying children in digital images, notably in cases involving the proliferation of child sexual abuse content. Existing techniques face hurdles due to model architecture
Mirza Jamal Ahmed, Nurul Azma Abdullah
doaj +1 more source
File forensics for RAW camera image formats [PDF]
Recent research in multimedia forensics has developed a variety of methods to detect image tampering and to identify the origin of image files. Many of these techniques are based on characteristics in the JPEG format, as it is the most used file format ...
Gloe, Thomas +2 more
core
Using smartphones as a proxy for forensic evidence contained in cloud storage services [PDF]
Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities.
Glisson, W., Grispos, G., Storer, T.
core +2 more sources
A fast source-oriented image clustering method for digital forensics
We present in this paper an algorithm that is capable of clustering images taken by an unknown number of unknown digital cameras into groups, such that each contains only images taken by the same source camera.
Chang-Tsun Li, Xufeng Lin
doaj +1 more source
A Visualization Approach to Analyze Android Smartphone Data
This study aims to design and develop an interactive system that can visualize evidence collected from Android smartphone data. This project is developing to support forensic investigator in investigating the security incidents particularly involving ...
Nurul Adhlina Hani Roslee +1 more
doaj +1 more source

