Results 51 to 60 of about 17,426 (184)

Ciratefi based copy move forgery detection on digital images

open access: yesMultimedia Tools and Applications, 2022
There is an increase in the requirement of digital image authentication in law, journalism, and medicine, even in the industry. Copy move forgery is the most common method of forgery methods which are applied to digital images. The importance of verifying digital images that are used in important areas with real-time systems is increasing.
Tahaoglu, Gul   +4 more
openaire   +2 more sources

Optical Font Recognition in Smartphone-Captured Images, and its Applicability for ID Forgery Detection

open access: yes, 2018
In this paper, we consider the problem of detecting counterfeit identity documents in images captured with smartphones. As the number of documents contain special fonts, we study the applicability of convolutional neural networks (CNNs) for detection of ...
Berenguel   +4 more
core   +1 more source

Digital Image Forgery Detection using Deep Learning

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
In recent years, the rise in accessibility and simplicity of image editing tools has led to a surge in the production and dissemination of fake or manipulated images across media and the internet. Numerous techniques have been introduced to verify the originality of images, for certain cases, to pinpoint the specific regions that have been altered or ...
B Pavan Kumar   +5 more
  +4 more sources

Forgery Detection in Digital Images by Multi-Scale Noise Estimation

open access: yesJournal of Imaging, 2021
A complex processing chain is applied from the moment a raw image is acquired until the final image is obtained. This process transforms the originally Poisson-distributed noise into a complex noise model. Noise inconsistency analysis is a rich source for forgery detection, as forged regions have likely undergone a different processing pipeline or out ...
Gardella, Marina   +3 more
openaire   +6 more sources

Analysis of Copy-move Manipulation in Digital Images using Scale Invariant Feature Transform (SIFT) and SVD-matching Methods

open access: yesJournal of Applied Informatics and Computing
In recent years, more and more data has been created in digital form, allowing for easier control over storage and manipulation thanks to technological advancements.
Muhamad Masjun Efendi, Nukman Nukman
doaj   +1 more source

Review of Image Forensic Techniques Based on Deep Learning

open access: yesMathematics, 2023
Digital images have become an important carrier for people to access information in the information age. However, with the development of this technology, digital images have become vulnerable to illegal access and tampering, to the extent that they pose
Chunyin Shi   +4 more
doaj   +1 more source

An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack

open access: yes, 2018
We propose a new statistic to improve the pooled version of the triangle test used to combat the fingerprint-copy counter-forensic attack against PRNU-based camera identification [1].
Barni, Mauro   +2 more
core   +1 more source

ECMNet: A deep framework for copy move forgery localization detection and classification

open access: yesResults in Engineering
Copy-move forgery is one of the most prevalent forms of digital image forgery. It violates the authenticity of digital images in the context of documentation, judicial reports, social media, military operations, journalism, intelligence, and so on ...
Anjani Kumar Rai, Subodh Srivastava
doaj   +1 more source

Distinguishing Computer-generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning

open access: yes, 2018
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong   +4 more
core   +2 more sources

Craquelure as a Graph: Application of Image Processing and Graph Neural Networks to the Description of Fracture Patterns

open access: yes, 2019
Cracks on a painting is not a defect but an inimitable signature of an artwork which can be used for origin examination, aging monitoring, damage identification, and even forgery detection.
Hardeberg, Jon Yngve, Sidorov, Oleksii
core   +1 more source

Home - About - Disclaimer - Privacy