Results 31 to 40 of about 34,561 (185)

Image tampering detection using genetic algorithm [PDF]

open access: yesMATEC Web of Conferences, 2019
As digital images become an indispensable source of information, the authentication of digital images has become crucial. Various techniques of forgery have come into existence, intrusive, and non-intrusive. Image forgery detection hence is becoming more
Agarwal Ritu, Pant Mallika
doaj   +1 more source

An Object Detection Using Image Processing In Digital Forensics Science

open access: yesJISR on Computing, 2018
Object detection is one of the most important sectors in digital forensics science. The object detection technique is valuable for a number of purposes for instance: medical diagnosis scanners, traffic monitoring system, airport security examination ...
Kamran Ali Changezi   +1 more
doaj   +1 more source

Distinguishing Computer-generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning

open access: yes, 2018
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong   +4 more
core   +2 more sources

Provenance analysis for instagram photos [PDF]

open access: yes, 2019
As a feasible device fingerprint, sensor pattern noise (SPN) has been proven to be effective in the provenance analysis of digital images. However, with the rise of social media, millions of images are being uploaded to and shared through social media ...
CT Li   +12 more
core   +1 more source

Can we trust digital image forensics? [PDF]

open access: yesProceedings of the 15th ACM international conference on Multimedia, 2007
Compared to the prominent role digital images play in nowadays multimedia society, research in the field of image authenticity is still in its infancy. Only recently, research on digital image forensics has gained attention by addressing tamper detection and image source identification.
Thomas Gloe   +3 more
openaire   +1 more source

Decoding Innocence: Advancing Forensic Facial Discrimination through Comparative Analysis of Conventional CNN and Advanced Architectures

open access: yesJOIV: International Journal on Informatics Visualization
The field of Digital Image Forensics (DIF) faces a critical issue in accurately identifying children in digital images, notably in cases involving the proliferation of child sexual abuse content. Existing techniques face hurdles due to model architecture
Mirza Jamal Ahmed, Nurul Azma Abdullah
doaj   +1 more source

File forensics for RAW camera image formats [PDF]

open access: yes, 2012
Recent research in multimedia forensics has developed a variety of methods to detect image tampering and to identify the origin of image files. Many of these techniques are based on characteristics in the JPEG format, as it is the most used file format ...
Gloe, Thomas   +2 more
core  

Using smartphones as a proxy for forensic evidence contained in cloud storage services [PDF]

open access: yes, 2013
Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities.
Glisson, W., Grispos, G., Storer, T.
core   +2 more sources

A fast source-oriented image clustering method for digital forensics

open access: yesEURASIP Journal on Image and Video Processing, 2017
We present in this paper an algorithm that is capable of clustering images taken by an unknown number of unknown digital cameras into groups, such that each contains only images taken by the same source camera.
Chang-Tsun Li, Xufeng Lin
doaj   +1 more source

A Visualization Approach to Analyze Android Smartphone Data

open access: yesJOIV: International Journal on Informatics Visualization, 2018
This study aims to design and develop an interactive system that can visualize evidence collected from Android smartphone data. This project is developing to support forensic investigator in investigating the security incidents particularly involving ...
Nurul Adhlina Hani Roslee   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy