Results 21 to 30 of about 32,604 (141)

Keypoint based comprehensive copy‐move forgery detection

open access: yesIET Image Processing, 2021
Verifying the authenticity of a digital image has been challenging problem. The simplest of the image tampering tricks is the copy‐move forgery. In copy‐move forgery copied portion of the image is pasted on another part of the same image.
Anjali Diwan   +3 more
doaj   +1 more source

A Survey on Photo Forgery Detection Methods

open access: yesITM Web of Conferences, 2018
In recent years, digital image forgery detection has become one of the hardest studying area for researchers investigations in the field of information security and image processing.
Gurunlu Bilgehan, Ozturk Serkan
doaj   +1 more source

ACCURACY Detection of Digital Image Forgery by Using Ant Colony Optimization Technique

open access: yesMATEC Web of Conferences, 2016
Image forgery is one of the well known fields in which researches continuously exploring new areas. In digital image forgery one can change image in many ways using several software’s, researchers exploring new algorithms to detect image forgery areas ...
Singh Sarvjit   +2 more
doaj   +1 more source

Camera-based Image Forgery Localization using Convolutional Neural Networks

open access: yes, 2018
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example is the photo response non-uniformity (PRNU) noise pattern, a powerful device fingerprint.
Cozzolino, Davide, Verdoliva, Luisa
core   +1 more source

Detection of Geometric Transformations in Copy-Move Forgery of Digital Images [PDF]

open access: yes, 2015
Digital Forensics is a branch of forensic science which is related to cyber crime. It basically involves the detection, recovery and investigation of material found in digital devices.
Shandilya, Meenal
core   +1 more source

Copy-Move Forgery Detection and Localization Using a Generative Adversarial Network and Convolutional Neural-Network

open access: yesInformation, 2019
The problem of forged images has become a global phenomenon that is spreading mainly through social media. New technologies have provided both the means and the support for this phenomenon, but they are also enabling a targeted response to overcome it ...
Younis Abdalla   +2 more
doaj   +1 more source

CoMoFoD #x2014; New database for copy-move forgery detection [PDF]

open access: yes, 2013
Due to the availability of many sophisticated image processing tools, a digital image forgery is nowadays very often used. One of the common forgery method is a copy-move forgery, where part of an image is copied to another location in the same image ...
Grgic, M   +3 more
core  

Detection of tamper forgery image in security digital mage

open access: yesMeasurement: Sensors, 2023
Every industry that uses digital photos is concerned about image security. Forensics and public safety have long relied on suspect photos, crime scene photos, biometric photos, and other images.
Mohammed Fakhrulddin Abdulqader   +2 more
doaj   +1 more source

Using a Goal-Driven Approach in the Investigation of a Questioned Contract [PDF]

open access: yes, 2013
Part 3: FORENSIC TECHNIQUESInternational audienceThis paper presents a systematic process for describing digital forensic investigations. It focuses on forensic goals and anti-forensic obstacles and their operationalization in terms of human and software
Aziz, Benjamin, Blackwell, C., Islam, S.
core   +3 more sources

Handwritten Signature Verification using Deep Learning [PDF]

open access: yes, 2020
Every person has his/her own unique signature that is used mainly for the purposes of personal identification and verification of important documents or legal transactions.
Abu-Naser, Samy S.   +6 more
core  

Home - About - Disclaimer - Privacy