Results 21 to 30 of about 17,426 (184)

A Survey on Photo Forgery Detection Methods

open access: yesITM Web of Conferences, 2018
In recent years, digital image forgery detection has become one of the hardest studying area for researchers investigations in the field of information security and image processing.
Gurunlu Bilgehan, Ozturk Serkan
doaj   +1 more source

Keypoint based comprehensive copy‐move forgery detection

open access: yesIET Image Processing, 2021
Verifying the authenticity of a digital image has been challenging problem. The simplest of the image tampering tricks is the copy‐move forgery. In copy‐move forgery copied portion of the image is pasted on another part of the same image.
Anjali Diwan   +3 more
doaj   +1 more source

Copy-move forgery detection using binary discriminant features

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Digital images have numerous applications in various fields such as cyber forensics, courts, newspapers, magazines, medical field and many more. Therefore, the trustfulness of the contents of an image is very essential. Image manipulation has become very
Priya Mariam Raju, Madhu S. Nair
doaj   +1 more source

Deep Learning-Based Digital Image Forgery Detection System

open access: yesApplied Sciences, 2022
The advancements of technology in every aspect of the current age are leading to the misuse of data. Researchers, therefore, face the challenging task of identifying these manipulated forms of data and distinguishing the real data from the manipulated ...
Emad Ul Haq Qazi   +2 more
doaj   +1 more source

Fusion of block and keypoints based approaches for effective copy-move image forgery detection [PDF]

open access: yes, 2016
Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large
Liu, Yanan   +5 more
core   +1 more source

Watermark Faker: Towards Forgery of Digital Image Watermarking [PDF]

open access: yes2021 IEEE International Conference on Multimedia and Expo (ICME), 2021
Digital watermarking has been widely used to protect the copyright and integrity of multimedia data. Previous studies mainly focus on designing watermarking techniques that are robust to attacks of destroying the embedded watermarks. However, the emerging deep learning based image generation technology raises new open issues that whether it is possible
Wang, Ruowei   +3 more
openaire   +2 more sources

Using a Goal-Driven Approach in the Investigation of a Questioned Contract [PDF]

open access: yes, 2013
Part 3: FORENSIC TECHNIQUESInternational audienceThis paper presents a systematic process for describing digital forensic investigations. It focuses on forensic goals and anti-forensic obstacles and their operationalization in terms of human and software
Aziz, Benjamin, Blackwell, C., Islam, S.
core   +3 more sources

Image Forgery Detection Techniques: Latest Trends and Key Challenges

open access: yesIEEE Access
The improvement and accessibility of high-resolution cameras have significantly increased image capturing by various media. Different editing tools are available that are frequently used to improve image quality, resulting in the alteration of images. So,
Poulomi Deb   +3 more
doaj   +1 more source

Fusion of Handcrafted and Deep Features for Forgery Detection in Digital Images

open access: yesIEEE Access, 2021
Content authentication of digital images has captured the attention of forensic experts and security researchers due to a multi-fold increase in the dissemination of multimedia data through the open and vulnerable Internet.
Savita Walia   +3 more
doaj   +1 more source

Fuzzy Based Image Forensic Tool for Detection and Classification of Image Cloning

open access: yesInternational Journal of Computational Intelligence Systems, 2016
With the easy availability of image processing and image editing tools, the cases of forgery have been raised in the last few years. Now days it is very difficult for a viewer and judicial authorities to verify authenticate a digital image.
Mohammad Farukh Hashmi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy