Results 51 to 60 of about 19,761 (136)

Hybrid Domain Perception Combined With Multi-expert Decoding to Improve Image Forgery Localization

open access: yesInternational Journal of Computational Intelligence Systems
With the advancements in multimedia software and hardware technology, image forgery localization has become an important challenge in digital forensics.
Xuchao Gong   +5 more
doaj   +1 more source

Provenance Filtering for Multimedia Phylogeny

open access: yes, 2017
Departing from traditional digital forensics modeling, which seeks to analyze single objects in isolation, multimedia phylogeny analyzes the evolutionary processes that influence digital objects and collections over time.
Bharati, Aparna   +7 more
core   +1 more source

Toward Open-World Multimedia Forensics Through Media Signature Encoding

open access: yesIEEE Access
Countering image and video manipulations is getting more and more relevant in several fields such as investigation, intelligence and forensics. Multimedia forensics researchers keep developing new tools and updating available detectors to discriminate ...
Daniele Baracchi   +7 more
doaj   +1 more source

Median Filtering Forensics Using Multiple Models in Residual Domain

open access: yesIEEE Access, 2019
Median filtering, due to highly non-linear and content-preserving, has widely used in the multimedia security fields, such as anti-forensics, steganography, and steganalysis.
Anjie Peng   +3 more
doaj   +1 more source

Digital forensics and information security in the era of artificial intelligence: Exploring new approaches and ethical implications [PDF]

open access: yesMegatrend Revija
As our digital lives get more complex, the traces we leave behind have turned into a vast landscape of evidence, and potential threats. Digital forensics now faces challenges not just from the overwhelming amount of data but also from the clever tactics ...
Ristić Mirjana   +2 more
doaj   +1 more source

File forensics for RAW camera image formats [PDF]

open access: yes, 2012
Recent research in multimedia forensics has developed a variety of methods to detect image tampering and to identify the origin of image files. Many of these techniques are based on characteristics in the JPEG format, as it is the most used file format ...
Gloe, Thomas   +2 more
core  

Deep Convolutional Neural Network to Detect J-UNIWARD

open access: yes, 2017
This paper presents an empirical study on applying convolutional neural networks (CNNs) to detecting J-UNIWARD, one of the most secure JPEG steganographic method.
Ioffe Sergey   +3 more
core   +1 more source

Living Knowledge [PDF]

open access: yes, 2012
Diversity, especially manifested in language and knowledge, is a function of local goals, needs, competences, beliefs, culture, opinions and personal experience. The Living Knowledge project considers diversity as an asset rather than a problem.
Baldry, Anthony   +3 more
core  

Analysis of adversarial attacks against CNN-based image forgery detectors

open access: yes, 2018
With the ubiquitous diffusion of social networks, images are becoming a dominant and powerful communication channel. Not surprisingly, they are also increasingly subject to manipulations aimed at distorting information and spreading fake news.
Gragnaniello, Diego   +3 more
core   +1 more source

Boosting Image Forgery Detection using Resampling Features and Copy-move analysis

open access: yes, 2018
Realistic image forgeries involve a combination of splicing, resampling, cloning, region removal and other methods. While resampling detection algorithms are effective in detecting splicing and resampling, copy-move detection algorithms excel in ...
Bappy, Jawadul H.   +8 more
core  

Home - About - Disclaimer - Privacy