Results 131 to 140 of about 17,426 (184)
A gated temporal attention based intra prediction framework for robust deepfake video detection. [PDF]
Clapten JE, Balaji V.
europepmc +1 more source
TSFF-Net: A deep fake video detection model based on two-stream feature domain fusion. [PDF]
Zhang H, Hu C, Min S, Sui H, Zhou G.
europepmc +1 more source
Digital watermarking for virtual physically unclonable function data concealment and authentication. [PDF]
Khan R +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Digital image forgery detection using Image hashing
2013 International Conference on Advances in Technology and Engineering (ICATE), 2013Image hashing is one of the techniques used to generate hash value for each image in the database. These hash values generated for images can be used for content based image retrieval, image database indexing, and image authentication, avoiding and mitigating the tampering of digital images.
H. B. Kekre +4 more
openaire +1 more source
Detection of digital photo image forgery
2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2012Digital Photo images are everywhere: on the covers of magazines, in newspapers, in courtrooms, and all over the Internet. We are exposed to them throughout the day and most of the time, we trust what we see. But given the ease with which images can be manipulated, we need to be aware that seeing does not always believe.
S. Murali +2 more
openaire +1 more source
Digital Image Forgery Detection
International Journal of Innovative Science and Research TechnologyThis project proposes an image forgery detection method using CNN, capable of delivering high accuracy and a clear explanation for each forged instance. In the past few years, image forgery has increased drastically, owing to the easy availability of image editing tools and techniques, including morphing. To mitigate this increasing menace and mitigate
Parkavi C +4 more
openaire +2 more sources
Digital image forgery — A threaten to digital forensics
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), 2016Photography is an art. A digital image is a part of the real world formed after cycles of image generation process. From the initial days of photographic images itself, security and authenticity were major issues. With the era of digital images, the process of altering an image became so popular.
V Parameswaran Nampoothiri, N. Sugitha
openaire +1 more source
Digital image forgery detection on artificially blurred images
2013 International Conference on Emerging Trends in Communication, Control, Signal Processing and Computing Applications (C2SPCA), 2013In this digital era, lot of information are expressed through images. Various social networking websites, such as Facebook, Twitter, MySpace etc. provides a platform for the users to post up almost any type of picture or photo. However, with the advancement in image editing technologies, many users have become victims of digital forgery as their ...
null Hrudya P +5 more
openaire +1 more source
Image forgery Detection against Forensic Image Digital Tampering
2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS), 2018The modern age era of revolutionary digital advances which has enabled us in advance digital information. Development of numerous digital forensic methodologies for authentication has been rivaled by equal number of anti-forensic operations. However, many of them subsequently leave behind numerous forensically detectable traces.
Jitendra Ravan, null Thanuja
openaire +1 more source
Exposing Digital Image Forgeries from Near Duplicate Images
2014 Fourth International Conference on Communication Systems and Network Technologies, 2014Nowadays image modification is easy due to availability of powerful digital image editing software. Images are powerful tool for communication, after images are posted on internet, other users can copy resize and re-encode them and then repost their version by generating similar but not identical copies.
Snehal M. Khamankar, M.S. Madankar
openaire +1 more source

