Results 91 to 100 of about 50,349 (279)
Passive-blind Image Forensics [PDF]
Publisher Summary This chapter discusses passive-blind image forensics (PBIF). PBIF is concerned with two problems: image forgery detection and image source identification. Most of the image forgery detection techniques are associated to the specific image forgery creation techniques.
Tian-Tsong Ng +3 more
openaire +1 more source
ABSTRACT This study examined the effectiveness of a brief educational intervention designed to reduce sex trafficking (ST) myth acceptance. Using a 2 × 2 mixed design, participants (N = 189) viewed either an educational video addressing common ST myths or a control video on human memory.
Dara Mojtahedi +2 more
wiley +1 more source
A Web Service for File-Level Access to Disk Images
Digital forensics tools have many potential applications in the curation of digital materials in libraries, archives and museums (LAMs). Open source digital forensics tools can help LAM professionals to extract digital contents from born-digital media ...
Sunitha Misra +2 more
doaj
An Object Detection Using Image Processing In Digital Forensics Science
Object detection is one of the most important sectors in digital forensics science. The object detection technique is valuable for a number of purposes for instance: medical diagnosis scanners, traffic monitoring system, airport security examination ...
Kamran Ali Changezi +1 more
doaj +1 more source
Public Perceptions of Marital Rape: Does Level of Force Used Have an Impact?
ABSTRACT Research indicates that marital rape is viewed by the public as less harmful to a victim than stranger/acquaintance rape. The aim of the study is to extend the research conducted by Robinson in 2017, investigating how levels of force influence perceptions of marital rape.
Leanne Hanney, Amy Shelford, Andy Guppy
wiley +1 more source
Daxing Smartphone Identification Dataset
Over the past few years, the imaging device has changed from digital cameras to smartphone cameras. With the popularity of mobile Internet applications, there explode massive digital images and videos captured by such smartphones, which are nearly held ...
Huawei Tian +5 more
doaj +1 more source
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan +2 more
wiley +1 more source
ABSTRACT This study examined how male rape myths, racial/ethnicity biases, and sexuality stereotypes influence verdicts in male‐on‐male rape trials—an area that is currently under‐researched. A sample of 463 participants read a mock rape trial, where both the defendant and complainant were male, with defendant ethnicity (White, Black, Asian) and ...
Lee J. Curley +3 more
wiley +1 more source
An Analysis of Forensic Imaging in the Absence of Write-Blockers
Best practices in digital forensics demand use of write-blockers when creating forensic copies of digital media and this has been a core of computer forensics training for decades. The practice is so in-grained that images created without a write-blocker
Gary C Kessler, Greg H Carlton
doaj
ABSTRACT As correctional jurisdictions and risk instrument developers look to optimize scoring for specific population needs, an open question remains ‐ which method is optimal. Popular scoring methods range from manual simple scoring approaches (e.g., Burgess) to more complex machine learning algorithms (e.g., random forests).
Danielle J. Rieger +2 more
wiley +1 more source

