Results 51 to 60 of about 34,561 (185)

Digital image forensics via intrinsic fingerprints [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2008
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity and the availability of low-cost image editing software, the integrity of digital image content can no longer be taken for granted. This paper introduces a new methodology for
Ashwin Swaminathan, Min Wu, K.J. Ray Liu
openaire   +1 more source

Conceptual evidence collection and analysis methodology for Android devices

open access: yes, 2015
Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android
Al Mutawa   +23 more
core   +1 more source

Digital Image Forensics using Deep Learning

open access: yes, 2022
This paper was written in 2018 as a part of our submission to the 2018 IEEE Signal Processing Cup: Forensic Camera Model Identification ...
Nagaraj, Akash   +4 more
openaire   +2 more sources

Implementation of Image Enhancement Algorithm for Image Forensics using Mathlab

open access: yesJOIN: Jurnal Online Informatika, 2020
The purpose of this journal is to explain the implementation of the image enhancement algorithm for image forensics. Image Forensic deals with the types of digital evidence in the form of digital image files. One of the most commonly used digital devices
Fauzan Novaldi Suteja   +2 more
doaj   +1 more source

An Analysis of Forensic Imaging in the Absence of Write-Blockers

open access: yesJournal of Digital Forensics, Security and Law, 2014
Best practices in digital forensics demand use of write-blockers when creating forensic copies of digital media and this has been a core of computer forensics training for decades. The practice is so in-grained that images created without a write-blocker
Gary C Kessler, Greg H Carlton
doaj  

Digital Image Forensics: Discovering The History Of Digital Images

open access: yes, 2018
Digital multimedia contents such as image, video, and audio can be tampered easily due to the availability of powerful editing softwares. Multimedia forensics is devoted to analyze these contents by using various digital forensic techniques in order to validate their authenticity.
Singh, Gurinder, Singh, Kulbir
openaire   +1 more source

A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection

open access: yesIEEE Access, 2020
Due to limited computational and memory resources, current deep learning models accept only rather small images in input, calling for preliminary image resizing.
Francesco Marra   +3 more
doaj   +1 more source

An Evaluation of Popular Copy-Move Forgery Detection Approaches

open access: yes, 2012
A copy-move forgery is created by copying and pasting content within the same image, and potentially post-processing it. In recent years, the detection of copy-move forgeries has become one of the most actively researched topics in blind image forensics.
Angelopoulou, Elli   +4 more
core   +1 more source

Hybrid Domain Perception Combined With Multi-expert Decoding to Improve Image Forgery Localization

open access: yesInternational Journal of Computational Intelligence Systems
With the advancements in multimedia software and hardware technology, image forgery localization has become an important challenge in digital forensics.
Xuchao Gong   +5 more
doaj   +1 more source

Artificial intelligence techniques for enhancing accuracy and efficiency in digital forensic analysis

open access: yesDiscover Artificial Intelligence
In the digital age, the proliferation and complexity of data present significant challenges for digital forensic analysis. Traditional tools often struggle to keep pace with the volume and sophistication of data, leading to delays in detecting illicit ...
William Villegas-Ch   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy