Results 11 to 20 of about 50,349 (279)

A Survey of Deep Learning-Based Source Image Forensics [PDF]

open access: yesJournal of Imaging, 2020
Image source forensics is widely considered as one of the most effective ways to verify in a blind way digital image authenticity and integrity. In the last few years, many researchers have applied data-driven approaches to this task, inspired by the ...
Pengpeng Yang   +5 more
doaj   +4 more sources

A Comprehensive Review of Deep-Learning-Based Methods for Image Forensics [PDF]

open access: yesJournal of Imaging, 2021
Seeing is not believing anymore. Different techniques have brought to our fingertips the ability to modify an image. As the difficulty of using such techniques decreases, lowering the necessity of specialized knowledge has been the focus for companies ...
Ivan Castillo Camacho, Kai Wang
doaj   +4 more sources

Image and Video Forensics

open access: yesJournal of Imaging, 2021
Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security more and ...
Irene Amerini   +2 more
doaj   +3 more sources

Image Forensics in the Encrypted Domain [PDF]

open access: yesEntropy
Encryption techniques used by forgers have thrown out a big possible challenge to forensics. Most traditional forensic tools will fail to detect the forged multimedia, which has been encrypted.
Yongqiang Yu   +4 more
doaj   +2 more sources

Error level analysis (ELA) [PDF]

open access: yesTehnika, 2023
ELA (Error Level Analysis) is a digital image analysis technique that has gained popularity in recent years in the field of modern forensics. It is a powerful method that can help experts determine if an image has been altered or manipulated in any way ...
Raković Dejan N.
doaj   +1 more source

End-to-End Anti-Forensics Network of Single and Double JPEG Detection

open access: yesIEEE Access, 2021
JPEG compression is one of the major image compression methods and is widely used on the Internet. In addition, identifying traces of JPEG compression and double JPEG compression (DJPEG) is crucial in the image forensics field.
Dohyun Kim, Wonhyuk Ahn, Heung-Kyu Lee
doaj   +1 more source

Review of Image Forensic Techniques Based on Deep Learning

open access: yesMathematics, 2023
Digital images have become an important carrier for people to access information in the information age. However, with the development of this technology, digital images have become vulnerable to illegal access and tampering, to the extent that they pose
Chunyin Shi   +4 more
doaj   +1 more source

Research progress of digital image forensic techniques based on deep learning

open access: yes网络与信息安全学报, 2021
In the new era of rapid development of internet, where massive forgery images with updated tampering techniques flood into, traditional algorithms are no longer able to deal with the latest multimedia tampering techniques, especially those caused by ...
Tong QIAO   +4 more
doaj   +3 more sources

Research on outsourcing of digital image forensics based on privacy preserving

open access: yes网络与信息安全学报, 2016
The rapid growth of digital image forensics calls for outsourcing digital forensics services to the cloud.It meets the requirement of image content authentication from both the public and organizations.However,it also brings the privacy concerns over the
Bing-wen FENG,Jian WENG, Wei LU
doaj   +3 more sources

Anti‐forensics for double JPEG compression based on deep reinforcement learning

open access: yesElectronics Letters, 2022
DJPEG (double JPEG compression) detection has received attention in image forensics. In order to study the limitations of forensics detectors under attacks, it is essential to develop DJPEG anti‐forensics techniques.
Weixuan Tang, Dequ Huang, Bin Li
doaj   +1 more source

Home - About - Disclaimer - Privacy