Results 41 to 50 of about 17,426 (184)

Camera-based Image Forgery Localization using Convolutional Neural Networks

open access: yes, 2018
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example is the photo response non-uniformity (PRNU) noise pattern, a powerful device fingerprint.
Cozzolino, Davide, Verdoliva, Luisa
core   +1 more source

Digital Image Forgery Detection using Correlation Coeficients

open access: yesInternational Journal of Computer Applications, 2015
In digital era, it has become easy to modify any image. Due to this the trust and validation of it is going to lose. Now it has become major problem of digital world to regain the lost trust. The background behind the modification and any changes in an image is easy availability of software tools on internet.
Raj Kumar   +3 more
openaire   +1 more source

Digital Forensic Technique for Multiple Compression based JPEG Forgery [PDF]

open access: yes, 2015
In today's digital world digital multimedia like, images, voice-notes and videos etc., are the major source of information/data exchange. The authenticity of these multimedia is greatly vital in the legitimate business, media world and broadcast industry.
Malviya, Pankaj
core  

Autoencoder with recurrent neural networks for video forgery detection

open access: yes, 2017
Video forgery detection is becoming an important issue in recent years, because modern editing software provide powerful and easy-to-use tools to manipulate videos.
Cozzolino, Davide   +3 more
core   +1 more source

Digital Image Forgery Detection

open access: yesInternational Journal of Recent Technology and Engineering, 2019
With the growing challenges in authenticity and integrity of images, image manipulation has crumbled assurance over digital image. The major motivation of the forgery in image is manipulating the image in such a way that it cannot be distinguished to the naked eye.
openaire   +1 more source

Review on passive approaches for detecting image tampering [PDF]

open access: yes, 2014
This paper defines the presently used methods and approaches in the domain of digital image forgery detection. A survey of a recent study is explored including an examination of the current techniques and passive approaches in detecting image tampering ...
Hashem, Fatma Salman, Sulong, Ghazali
core  

UTSig: A Persian Offline Signature Dataset

open access: yes, 2016
The pivotal role of datasets in signature verification systems motivates researchers to collect signature samples. Distinct characteristics of Persian signature demands for richer and culture-dependent offline signature datasets.
Araabi, Babak N.   +2 more
core   +1 more source

Copy Move Forgery Detection on Digital Images

open access: yesInternational Journal of Computer Applications, 2014
scenario forging of the Digital images has become a common phenomena. The availability of low cost manipulation software also boost to this practice. The foremost practice of manipulating the digital images employed by the most forgerer is the copy move forgery.
Nishi Goel, Ashish Oberoi, Ruchita Singh
openaire   +1 more source

Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection

open access: yes, 2017
Local descriptors based on the image noise residual have proven extremely effective for a number of forensic applications, like forgery detection and localization.
Cozzolino, Davide   +2 more
core   +1 more source

Digital Image Forgery

open access: yesPublikationer från Örebro universitet, 2019
Image control has disintegrated our trust of computerized pictures, with progressively unobtrusive fraud techniques representing a regularly expanding test to the integrity of images and their legitimacy. With the progress of advanced image controlling software and modifying tools, an electronic picture can be successively controlled.
Thapaliya, Ananga   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy