Results 51 to 60 of about 19,761 (136)
Hybrid Domain Perception Combined With Multi-expert Decoding to Improve Image Forgery Localization
With the advancements in multimedia software and hardware technology, image forgery localization has become an important challenge in digital forensics.
Xuchao Gong +5 more
doaj +1 more source
Provenance Filtering for Multimedia Phylogeny
Departing from traditional digital forensics modeling, which seeks to analyze single objects in isolation, multimedia phylogeny analyzes the evolutionary processes that influence digital objects and collections over time.
Bharati, Aparna +7 more
core +1 more source
Toward Open-World Multimedia Forensics Through Media Signature Encoding
Countering image and video manipulations is getting more and more relevant in several fields such as investigation, intelligence and forensics. Multimedia forensics researchers keep developing new tools and updating available detectors to discriminate ...
Daniele Baracchi +7 more
doaj +1 more source
Median Filtering Forensics Using Multiple Models in Residual Domain
Median filtering, due to highly non-linear and content-preserving, has widely used in the multimedia security fields, such as anti-forensics, steganography, and steganalysis.
Anjie Peng +3 more
doaj +1 more source
Digital forensics and information security in the era of artificial intelligence: Exploring new approaches and ethical implications [PDF]
As our digital lives get more complex, the traces we leave behind have turned into a vast landscape of evidence, and potential threats. Digital forensics now faces challenges not just from the overwhelming amount of data but also from the clever tactics ...
Ristić Mirjana +2 more
doaj +1 more source
File forensics for RAW camera image formats [PDF]
Recent research in multimedia forensics has developed a variety of methods to detect image tampering and to identify the origin of image files. Many of these techniques are based on characteristics in the JPEG format, as it is the most used file format ...
Gloe, Thomas +2 more
core
Deep Convolutional Neural Network to Detect J-UNIWARD
This paper presents an empirical study on applying convolutional neural networks (CNNs) to detecting J-UNIWARD, one of the most secure JPEG steganographic method.
Ioffe Sergey +3 more
core +1 more source
Diversity, especially manifested in language and knowledge, is a function of local goals, needs, competences, beliefs, culture, opinions and personal experience. The Living Knowledge project considers diversity as an asset rather than a problem.
Baldry, Anthony +3 more
core
Analysis of adversarial attacks against CNN-based image forgery detectors
With the ubiquitous diffusion of social networks, images are becoming a dominant and powerful communication channel. Not surprisingly, they are also increasingly subject to manipulations aimed at distorting information and spreading fake news.
Gragnaniello, Diego +3 more
core +1 more source
Boosting Image Forgery Detection using Resampling Features and Copy-move analysis
Realistic image forgeries involve a combination of splicing, resampling, cloning, region removal and other methods. While resampling detection algorithms are effective in detecting splicing and resampling, copy-move detection algorithms excel in ...
Bappy, Jawadul H. +8 more
core

