Results 21 to 30 of about 19,761 (136)

Recent Advances in Passive Digital Image Security Forensics: A Brief Review

open access: yesEngineering, 2018
With the development of sophisticated image editing and manipulation tools, the originality and authenticity of a digital image is usually hard to determine visually.
Xiang Lin   +5 more
doaj   +1 more source

Reference face graph for face recognition [PDF]

open access: yes, 2014
Face recognition has been studied extensively; however, real-world face recognition still remains a challenging task. The demand for unconstrained practical face recognition is rising with the explosion of online multimedia such as social networks, and ...
An, L, Bhanu, B, Kafai, M
core   +3 more sources

Source Microphone Identification Using Swin Transformer

open access: yesApplied Sciences, 2023
Microphone identification is a crucial challenge in the field of digital audio forensics. The ability to accurately identify the type of microphone used to record a piece of audio can provide important information for forensic analysis and crime ...
Mustafa Qamhan   +2 more
doaj   +1 more source

PRNU-based image classification of origin social network with CNN [PDF]

open access: yes, 2018
A huge amount of images are continuously shared on social networks (SNs) daily and, in most of cases, it is very difficult to reliably establish the SN of provenance of an image when it is recovered from a hard disk, a SD card or a smartphone memory ...
goljan   +6 more
core   +1 more source

A study on the false positive rate of Stegdetect [PDF]

open access: yes, 2013
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz   +13 more
core   +1 more source

VISION: a video and image dataset for source identification

open access: yesEURASIP Journal on Information Security, 2017
Forensic research community keeps proposing new techniques to analyze digital images and videos. However, the performance of proposed tools are usually tested on data that are far from reality in terms of resolution, source device, and processing history.
Dasara Shullani   +4 more
doaj   +1 more source

A Survey of Deep Learning-Based Source Image Forensics

open access: yesJournal of Imaging, 2020
Image source forensics is widely considered as one of the most effective ways to verify in a blind way digital image authenticity and integrity. In the last few years, many researchers have applied data-driven approaches to this task, inspired by the ...
Pengpeng Yang   +5 more
doaj   +1 more source

Detection of Audio Tampering Based on Electric Network Frequency Signal

open access: yesSensors, 2023
The detection of audio tampering plays a crucial role in ensuring the authenticity and integrity of multimedia files. This paper presents a novel approach to identifying tampered audio files by leveraging the unique Electric Network Frequency (ENF ...
Hsiang-Ping Hsu   +7 more
doaj   +1 more source

Distinguishing Computer-generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning

open access: yes, 2018
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong   +4 more
core   +2 more sources

A multi-task learning CNN for image steganalysis [PDF]

open access: yes, 2018
Convolutional neural network (CNN) based image steganalysis are increasingly popular because of their superiority in accuracy. The most straightforward way to employ CNN for image steganalysis is to learn a CNN-based classifier to distinguish whether ...
Li, Chang-Tsun   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy