Results 21 to 30 of about 23,633 (272)
Image forgery detection review
With the wide spread of digital document use in administrations, fabrication and use of forged documents have become a serious problem. This paper presents a study and classification of the most important works on image and document forgery detection.
Benhamza, Hiba +2 more
openaire +2 more sources
Blind Detection of Copy-Move Forgery in Digital Audio Forensics
Although copy-move forgery is one of the most common fabrication techniques, blind detection of such tampering in digital audio is mostly unexplored. Unlike active techniques, blind forgery detection is challenging, because it does not embed a watermark ...
Muhammad Imran +3 more
doaj +1 more source
An Enhanced Dynamic Signature Verification using the X and Y Histogram Features
Dynamic signature verification by using histogram features is a well-known signature forgery detection technique due to its high performance. However, this technique is often limited to angular histograms derived from vectors containing two adjacent ...
Aris Tjahyanto +2 more
doaj +1 more source
Fusion of block and keypoints based approaches for effective copy-move image forgery detection [PDF]
Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large
Liu, Yanan +5 more
core +1 more source
Scene Segmentation for Interframe Forgery Identification
A common type of video forgery is inter-frame forgery, which occurs in the temporal domain, such as frame duplication, frame insertion, and frame deletion. Some existing methods are not effective to detect forgeries in static scenes.
Andriani +2 more
doaj +1 more source
The problem of forged images has become a global phenomenon that is spreading mainly through social media. New technologies have provided both the means and the support for this phenomenon, but they are also enabling a targeted response to overcome it ...
Younis Abdalla +2 more
doaj +1 more source
Offline signature verification using classifier combination of HOG and LBP features [PDF]
We present an offline signature verification system based on a signature’s local histogram features. The signature is divided into zones using both the Cartesian and polar coordinate systems and two different histogram features are calculated for each ...
Kholmatov, Alisher Anatolyevich +6 more
core +2 more sources
Surveillance systems are becoming pervasive throughout our daily lives, and surveillance recordings are being used as the essential evidence in criminal investigations. The authenticity of surveillance videos is tough to confirm.
Jatin Patel, Ravi Sheth
doaj +1 more source
A new video forgery detection approach based on forgery line
In recent years, we have continually encountered multimedia files in daily life, as evidence in courts, medical records in hospitals, etc. Many multimedia-editing software tools have been developed in parallel to the widespread usage of multimedia files.
Bozkurt, Isilay +2 more
openaire +2 more sources
Autoencoder with recurrent neural networks for video forgery detection
Video forgery detection is becoming an important issue in recent years, because modern editing software provide powerful and easy-to-use tools to manipulate videos.
Cozzolino, Davide +3 more
core +1 more source

