Results 111 to 120 of about 23,633 (272)

The PS-Battles Dataset - an Image Collection for Image Manipulation Detection

open access: yes, 2018
The boost of available digital media has led to a significant increase in derivative work. With tools for manipulating objects becoming more and more mature, it can be very difficult to determine whether one piece of media was derived from another one or
Heller, Silvan   +2 more
core  

Participatory Policy Development: Reflections on Designing the Strong Roots for Our Futures Program in Victoria

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT In this paper, we trace the journey to create the Strong Roots for our Futures Program, a government program to resource and support Traditional Owners to undertake a range of activities in areas where no state recognition existed. We provide a background to state recognition in Victoria before considering the program design, leading to an ...
Nell Reidy   +2 more
wiley   +1 more source

Navigating Whiteness in Australia's Anti‐Racism Movement: A Duoethnographic Inquiry by Women of Colour Scholars

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This paper applies Critical Race Theory (CRT) to explore how whiteness operates within Australia's anti‐racism movement as a structuring force that shapes discourse, practice and policy. Despite the anti‐racism movement offering crucial spaces for resistance and reform, it remains entangled in Australia's settler‐colonial present and systemic ...
Franka Vaughan, Aish Ravi
wiley   +1 more source

An Attack-Independent Audio Forgery Detection Technique Based on Cochleagram Images of Segments With Dynamic Threshold

open access: yesIEEE Access
Thanks to advanced audio editing software, speech recordings can be tampered with very quickly. If the speech recordings are used as forensic evidence, adding the audio recordings together, cutting them, and changing their content are legally ...
Beste Ustubioglu
doaj   +1 more source

Exposing Face Manipulation Based on Generative Adversarial Network–Transformer and Fake Frequency Noise Traces

open access: yesSensors
In recent years, with the application of GANs and diffusion generative network algorithms, many highly realistic synthetic images are emerging, greatly increasing the potential for misuse, and deepfakes have become a serious social concern.
Qiaoyue Man, Young-Im Cho
doaj   +1 more source

MMFD-Net: A Novel Network for Image Forgery Detection and Localization via Multi-Stream Edge Feature Learning and Multi-Dimensional Information Fusion

open access: yesMathematics
With the rapid advancement of image processing techniques, digital image forgery detection has emerged as a critical research area in information forensics.
Haichang Yin   +3 more
doaj   +1 more source

Detecting Adversarial Data Using Perturbation Forgery

open access: yes2025 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
Accepted as a conference paper at CVPR ...
Wang, Qian   +6 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy