Results 61 to 70 of about 23,633 (272)
Detection of Region Duplication in Digital Images:A Digital Forensic Approach [PDF]
Digital images are easy to manipulate and forge due to availability of powerful image processing and editing software. Region duplication is becoming more and more popular in image manipulation where part of an image is pasted to another location to ...
Ahemad, Talib, Wadhwa, Jatin
core
Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)
In this work, we propose a technique that utilizes a fully convolutional network (FCN) to localize image splicing attacks. We first evaluated a single-task FCN (SFCN) trained only on the surface label.
Kuo, C. -C. Jay +2 more
core +1 more source
Ordered three‐dimensional anodic aluminum oxide (3D‐AAO) nanoarchitectures with longitudinal and transverse pores enable architecture‐driven metamaterials. The review maps fabrication advances, including hybrid pulse anodization, and shows how 3D‐AAO templates tailor properties across magnetism, energy, catalysis, and sensing.
Marisol Martín‐González
wiley +1 more source
Wavelet-Based Texture Mining and Enhancement for Face Forgery Detection
Due to the abuse of deep forgery technology, the research on forgery detection methods has become increasingly urgent. The corresponding relationship between the frequency spectrum information and the spatial clues, which is often neglected by current ...
Xin Li +3 more
doaj +1 more source
Self-Information Forgery Mining for Face Forgery Detection
Abstract In the face of rapid advances in face forgery technology, effective detection methods have become crucial to maintain the authenticity of digital media. Deep learning technology has provided new strategies for recognizing and preventing face forgery in recent years.
Xiaozhuo Wang, Jianyu Wei
openaire +1 more source
Review on passive approaches for detecting image tampering [PDF]
This paper defines the presently used methods and approaches in the domain of digital image forgery detection. A survey of a recent study is explored including an examination of the current techniques and passive approaches in detecting image tampering ...
Hashem, Fatma Salman, Sulong, Ghazali
core
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Due to the increasing sophistication of face forgery techniques, the images generated are becoming more and more realistic and difficult for human eyes to distinguish.
Hanxian Duan +7 more
doaj +1 more source
A green, freeform manufacturing approach that utilizes robust aqueous two‐phase systems to create intricate and scalable photonic structures and non‐planar mechanochromic hydrogel actuators from plant‐based hydroxypropyl cellulose. This approach broadens the structural possibilities of sustainable photonic devices and mechanochromic systems, offering ...
Xiao Song +14 more
wiley +1 more source

