Image Inpainting Forgery Detection: A Review. [PDF]
In recent years, significant advancements in the field of machine learning have influenced the domain of image restoration. While these technological advancements present prospects for improving the quality of images, they also present difficulties, particularly the proliferation of manipulated or counterfeit multimedia information on the internet. The
Barglazan AA, Brad R, Constantinescu C.
europepmc +4 more sources
MSCSCC-Net: multi-scale contextual spatial-channel correlation network for forgery detection and localization of JPEG-compressed image [PDF]
JPEG artifacts produced during the JPEG compression may obscure forgery artifacts, impairing the efficiency of regular forgery detection and localization approaches.
Wuyang Shan +3 more
doaj +2 more sources
Image copy-move forgery detection and localization based on super-BPD segmentation and DCNN [PDF]
With the increasing importance of image information, image forgery seriously threatens the security of image content. Copy-move forgery detection (CMFD) is a greater challenge because its abnormality is smaller than other forgeries.
Qianwen Li +3 more
doaj +2 more sources
Combined spatial and frequency dual stream network for face forgery detection [PDF]
With the development of generative model, the cost of facial manipulation and forgery is becoming lower and lower. Fraudulent data has brought numerous hidden threats in politics, privacy, and cybersecurity.
Hui Zhao +3 more
doaj +3 more sources
Region Duplication Forgery Detection Technique Based on SURF and HAC [PDF]
Region duplication forgery detection is a special type of forgery detection approach and widely used research topic under digital image forensics. In copy move forgery, a specific area is copied and then pasted into any other region of the image.
Parul Mishra +3 more
doaj +2 more sources
Method for Image Forgery Detection Based on Deformable Self-Correlation Network [PDF]
The deep learning-based copy-move forgery detection methods ignore the spatial layout of the features, leading to a reduction in the detection performance for small-region forgery samples.Additionally,the fixed size of the receptive fields in ...
LIANG Peng, WU Yuting, ZHAO Huimin, LI Chunying, HE Wa, LI Shaofa
doaj +1 more source
Survey on adversarial attacks and defense of face forgery and detection
Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and ...
Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO
doaj +3 more sources
Method of Face Forgery Detection Based on Self-Attention Capsule Network [PDF]
In recent years, face forgery is abused in fake videos, imposing a potential threat on the national, social and individual level, so face forgery detection is of great significance to individual privacy protection and national security.To improve the ...
LI Ke, LI Shaomei, JI Lixin, LIU Shuo
doaj +1 more source
Unveiling Copy-Move Forgeries: Enhancing Detection With SuperPoint Keypoint Architecture
The authentication of digital images poses a significant challenge due to the wide range of image forgery techniques employed, with one notable example being a copy-move forgery.
Anjali Diwan +4 more
doaj +1 more source
Document forgery is an increasing problem for both private companies and public administrations. It can be said to represent the loss of time and resources. There are many classical solutions to these problems such as the detection of an integrated security pattern. In such cases, it is important that we resort to forensic techniques for the detection.
Nandini N +4 more
openaire +1 more source

