Results 61 to 70 of about 13,696 (179)

AISMSNet: Advanced Image Splicing Manipulation Identification Based on Siamese Networks

open access: yesApplied Sciences
The exponential surge in specialized image editing software has intensified visual forgery, with splicing attacks emerging as a popular forgery technique.
Ana Elena Ramirez-Rodriguez   +4 more
doaj   +1 more source

MMFD-Net: A Novel Network for Image Forgery Detection and Localization via Multi-Stream Edge Feature Learning and Multi-Dimensional Information Fusion

open access: yesMathematics
With the rapid advancement of image processing techniques, digital image forgery detection has emerged as a critical research area in information forensics.
Haichang Yin   +3 more
doaj   +1 more source

A Watermark-Based Scheme for Authenticating JPEG Image Integrity

open access: yesIEEE Access, 2018
JPEG is the most common image format in smartphones, computers, or digital cameras. Because numerous JPEG images are easily shared and distributed, there are privacy and security concerns for these images.
Oh-Jin Kwon   +2 more
doaj   +1 more source

Image tampering detection using genetic algorithm [PDF]

open access: yesMATEC Web of Conferences, 2019
As digital images become an indispensable source of information, the authentication of digital images has become crucial. Various techniques of forgery have come into existence, intrusive, and non-intrusive. Image forgery detection hence is becoming more
Agarwal Ritu, Pant Mallika
doaj   +1 more source

Robust Copy-move Forgery Detection through Invariant Moment Features [PDF]

open access: yes, 2016
The proposed scheme uses the invariant features extracted from each block to detect the copy-move forgery detection regions in a digital image. In the proposed scheme, an image is first divided into overlapping blocks.
Chen, Chien-Chang
core  

Distinguishing Computer-generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning

open access: yes, 2018
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong   +4 more
core   +2 more sources

DIGITAL PHOTO IMAGE- FORGERY DETECTION TECHNIQUES [PDF]

open access: yesInternational Journal of Machine Intelligence, 2012
Digital images provide a new way to represent pictures and scenes that only film and a darkroom could supply before. This new way to capture and store images opens a door to malicious individuals wishing to forge or otherwise manipulate original authentic images.
MURALI S, ANAMI BS, CHITTAPUR GB
openaire   +1 more source

Self-Supervised Feature Disentanglement for Deepfake Detection

open access: yesMathematics
Existing deepfake detection methods heavily rely on specific training data distributions and struggle to generalize to unknown forgery techniques. To address the challenge, this paper focuses on two critical research gaps: (1) the lack of systematic ...
Bo Yan, Pan Liu, Yumin Yang, Yanming Guo
doaj   +1 more source

UTSig: A Persian Offline Signature Dataset

open access: yes, 2016
The pivotal role of datasets in signature verification systems motivates researchers to collect signature samples. Distinct characteristics of Persian signature demands for richer and culture-dependent offline signature datasets.
Araabi, Babak N.   +2 more
core   +1 more source

A reliable order-statistics-based approximate nearest neighbor search algorithm

open access: yes, 2016
We propose a new algorithm for fast approximate nearest neighbor search based on the properties of ordered vectors. Data vectors are classified based on the index and sign of their largest components, thereby partitioning the space in a number of cones ...
Cozzolino, Davide   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy