Results 1 to 10 of about 23,633 (272)

Image Inpainting Forgery Detection: A Review. [PDF]

open access: yesJ Imaging, 2023
In recent years, significant advancements in the field of machine learning have influenced the domain of image restoration. While these technological advancements present prospects for improving the quality of images, they also present difficulties, particularly the proliferation of manipulated or counterfeit multimedia information on the internet. The
Barglazan AA, Brad R, Constantinescu C.
europepmc   +4 more sources

MSCSCC-Net: multi-scale contextual spatial-channel correlation network for forgery detection and localization of JPEG-compressed image [PDF]

open access: yesScientific Reports
JPEG artifacts produced during the JPEG compression may obscure forgery artifacts, impairing the efficiency of regular forgery detection and localization approaches.
Wuyang Shan   +3 more
doaj   +2 more sources

Image copy-move forgery detection and localization based on super-BPD segmentation and DCNN [PDF]

open access: yesScientific Reports, 2022
With the increasing importance of image information, image forgery seriously threatens the security of image content. Copy-move forgery detection (CMFD) is a greater challenge because its abnormality is smaller than other forgeries.
Qianwen Li   +3 more
doaj   +2 more sources

Combined spatial and frequency dual stream network for face forgery detection [PDF]

open access: yesPeerJ Computer Science
With the development of generative model, the cost of facial manipulation and forgery is becoming lower and lower. Fraudulent data has brought numerous hidden threats in politics, privacy, and cybersecurity.
Hui Zhao   +3 more
doaj   +3 more sources

Region Duplication Forgery Detection Technique Based on SURF and HAC [PDF]

open access: yesThe Scientific World Journal, 2013
Region duplication forgery detection is a special type of forgery detection approach and widely used research topic under digital image forensics. In copy move forgery, a specific area is copied and then pasted into any other region of the image.
Parul Mishra   +3 more
doaj   +2 more sources

Method for Image Forgery Detection Based on Deformable Self-Correlation Network [PDF]

open access: yesJisuanji gongcheng, 2021
The deep learning-based copy-move forgery detection methods ignore the spatial layout of the features, leading to a reduction in the detection performance for small-region forgery samples.Additionally,the fixed size of the receptive fields in ...
LIANG Peng, WU Yuting, ZHAO Huimin, LI Chunying, HE Wa, LI Shaofa
doaj   +1 more source

Survey on adversarial attacks and defense of face forgery and detection

open access: yes网络与信息安全学报, 2023
Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and ...
Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO
doaj   +3 more sources

Method of Face Forgery Detection Based on Self-Attention Capsule Network [PDF]

open access: yesJisuanji gongcheng, 2022
In recent years, face forgery is abused in fake videos, imposing a potential threat on the national, social and individual level, so face forgery detection is of great significance to individual privacy protection and national security.To improve the ...
LI Ke, LI Shaomei, JI Lixin, LIU Shuo
doaj   +1 more source

Unveiling Copy-Move Forgeries: Enhancing Detection With SuperPoint Keypoint Architecture

open access: yesIEEE Access, 2023
The authentication of digital images poses a significant challenge due to the wide range of image forgery techniques employed, with one notable example being a copy-move forgery.
Anjali Diwan   +4 more
doaj   +1 more source

Document Forgery Detection

open access: yesInternational Journal of Engineering and Advanced Technology, 2023
Document forgery is an increasing problem for both private companies and public administrations. It can be said to represent the loss of time and resources. There are many classical solutions to these problems such as the detection of an integrated security pattern. In such cases, it is important that we resort to forensic techniques for the detection.
Nandini N   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy