Results 61 to 70 of about 13,696 (179)
AISMSNet: Advanced Image Splicing Manipulation Identification Based on Siamese Networks
The exponential surge in specialized image editing software has intensified visual forgery, with splicing attacks emerging as a popular forgery technique.
Ana Elena Ramirez-Rodriguez +4 more
doaj +1 more source
With the rapid advancement of image processing techniques, digital image forgery detection has emerged as a critical research area in information forensics.
Haichang Yin +3 more
doaj +1 more source
A Watermark-Based Scheme for Authenticating JPEG Image Integrity
JPEG is the most common image format in smartphones, computers, or digital cameras. Because numerous JPEG images are easily shared and distributed, there are privacy and security concerns for these images.
Oh-Jin Kwon +2 more
doaj +1 more source
Image tampering detection using genetic algorithm [PDF]
As digital images become an indispensable source of information, the authentication of digital images has become crucial. Various techniques of forgery have come into existence, intrusive, and non-intrusive. Image forgery detection hence is becoming more
Agarwal Ritu, Pant Mallika
doaj +1 more source
Robust Copy-move Forgery Detection through Invariant Moment Features [PDF]
The proposed scheme uses the invariant features extracted from each block to detect the copy-move forgery detection regions in a digital image. In the proposed scheme, an image is first divided into overlapping blocks.
Chen, Chien-Chang
core
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong +4 more
core +2 more sources
DIGITAL PHOTO IMAGE- FORGERY DETECTION TECHNIQUES [PDF]
Digital images provide a new way to represent pictures and scenes that only film and a darkroom could supply before. This new way to capture and store images opens a door to malicious individuals wishing to forge or otherwise manipulate original authentic images.
MURALI S, ANAMI BS, CHITTAPUR GB
openaire +1 more source
Self-Supervised Feature Disentanglement for Deepfake Detection
Existing deepfake detection methods heavily rely on specific training data distributions and struggle to generalize to unknown forgery techniques. To address the challenge, this paper focuses on two critical research gaps: (1) the lack of systematic ...
Bo Yan, Pan Liu, Yumin Yang, Yanming Guo
doaj +1 more source
UTSig: A Persian Offline Signature Dataset
The pivotal role of datasets in signature verification systems motivates researchers to collect signature samples. Distinct characteristics of Persian signature demands for richer and culture-dependent offline signature datasets.
Araabi, Babak N. +2 more
core +1 more source
A reliable order-statistics-based approximate nearest neighbor search algorithm
We propose a new algorithm for fast approximate nearest neighbor search based on the properties of ordered vectors. Data vectors are classified based on the index and sign of their largest components, thereby partitioning the space in a number of cones ...
Cozzolino, Davide +2 more
core +1 more source

