Results 41 to 50 of about 19,761 (136)
Information Forensics: An Overview of the First Decade
In recent decades, we have witnessed the evolution of information technologies from the development of VLSI technologies, to communication and networking infrastructure, to the standardization of multimedia compression and coding schemes, to effective ...
Matthew C. Stamm, Min Wu, K. J. Ray Liu
doaj +1 more source
Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)
In this work, we propose a technique that utilizes a fully convolutional network (FCN) to localize image splicing attacks. We first evaluated a single-task FCN (SFCN) trained only on the surface label.
Kuo, C. -C. Jay +2 more
core +1 more source
Camera-based Image Forgery Localization using Convolutional Neural Networks
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example is the photo response non-uniformity (PRNU) noise pattern, a powerful device fingerprint.
Cozzolino, Davide, Verdoliva, Luisa
core +1 more source
With the emergence of new digital technologies, a significant surge has been seen in the volume of multimedia data generated from various smart devices. Several challenges for data analysis have emerged to extract useful information from multimedia data.
Ahmed Abbasi +5 more
doaj +1 more source
DeepFake the menace: mitigating the negative impacts of AI-generated content [PDF]
Purpose – Recent years have witnessed an unexpected and astonishing rise of AI-generated (AIGC), thanks to the rapid advancement of technology and the omnipresence of social media.
Siwei Lyu
doaj +1 more source
Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video.
Abdullah Ayub Khan +6 more
doaj +1 more source
Amplitude SAR Imagery Splicing Localization
Synthetic Aperture Radar (SAR) images are a valuable asset for a wide variety of tasks. In the last few years, many websites have been offering them for free in the form of easy to manage products, favoring their widespread diffusion and research work in
Edoardo Daniele Cannas +4 more
doaj +1 more source
An Evaluation of Popular Copy-Move Forgery Detection Approaches
A copy-move forgery is created by copying and pasting content within the same image, and potentially post-processing it. In recent years, the detection of copy-move forgeries has become one of the most actively researched topics in blind image forensics.
Angelopoulou, Elli +4 more
core +1 more source
Locational wireless and social media-based surveillance [PDF]
The number of smartphones and tablets as well as the volume of traffic generated by these devices has been growing constantly over the past decade and this growth is predicted to continue at an increasing rate over the next five years.
Chernyshev, Maxim
core +1 more source
An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack
We propose a new statistic to improve the pooled version of the triangle test used to combat the fingerprint-copy counter-forensic attack against PRNU-based camera identification [1].
Barni, Mauro +2 more
core +1 more source

