Results 51 to 60 of about 17,426 (184)
Ciratefi based copy move forgery detection on digital images
There is an increase in the requirement of digital image authentication in law, journalism, and medicine, even in the industry. Copy move forgery is the most common method of forgery methods which are applied to digital images. The importance of verifying digital images that are used in important areas with real-time systems is increasing.
Tahaoglu, Gul +4 more
openaire +2 more sources
In this paper, we consider the problem of detecting counterfeit identity documents in images captured with smartphones. As the number of documents contain special fonts, we study the applicability of convolutional neural networks (CNNs) for detection of ...
Berenguel +4 more
core +1 more source
Digital Image Forgery Detection using Deep Learning
In recent years, the rise in accessibility and simplicity of image editing tools has led to a surge in the production and dissemination of fake or manipulated images across media and the internet. Numerous techniques have been introduced to verify the originality of images, for certain cases, to pinpoint the specific regions that have been altered or ...
B Pavan Kumar +5 more
+4 more sources
Forgery Detection in Digital Images by Multi-Scale Noise Estimation
A complex processing chain is applied from the moment a raw image is acquired until the final image is obtained. This process transforms the originally Poisson-distributed noise into a complex noise model. Noise inconsistency analysis is a rich source for forgery detection, as forged regions have likely undergone a different processing pipeline or out ...
Gardella, Marina +3 more
openaire +6 more sources
In recent years, more and more data has been created in digital form, allowing for easier control over storage and manipulation thanks to technological advancements.
Muhamad Masjun Efendi, Nukman Nukman
doaj +1 more source
Review of Image Forensic Techniques Based on Deep Learning
Digital images have become an important carrier for people to access information in the information age. However, with the development of this technology, digital images have become vulnerable to illegal access and tampering, to the extent that they pose
Chunyin Shi +4 more
doaj +1 more source
An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack
We propose a new statistic to improve the pooled version of the triangle test used to combat the fingerprint-copy counter-forensic attack against PRNU-based camera identification [1].
Barni, Mauro +2 more
core +1 more source
ECMNet: A deep framework for copy move forgery localization detection and classification
Copy-move forgery is one of the most prevalent forms of digital image forgery. It violates the authenticity of digital images in the context of documentation, judicial reports, social media, military operations, journalism, intelligence, and so on ...
Anjani Kumar Rai, Subodh Srivastava
doaj +1 more source
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong +4 more
core +2 more sources
Cracks on a painting is not a defect but an inimitable signature of an artwork which can be used for origin examination, aging monitoring, damage identification, and even forgery detection.
Hardeberg, Jon Yngve, Sidorov, Oleksii
core +1 more source

