Results 61 to 70 of about 19,761 (136)
Image Forgery Detection and Localization via a Reliability Fusion Map
Moving away from hand-crafted feature extraction, the use of data-driven convolution neural network (CNN)-based algorithms facilitates the realization of end-to-end automated forgery detection in multimedia forensics.
Hongwei Yao +4 more
doaj +1 more source
Secure and efficient DRM watermark algorithm of forensics in mobile internet
With the development of mobile Internet technology, the characteristic of easy editing, transmitting, and forging the digital media bring great challenges in authenticity of multimedia.
Ma Zhaofeng, Jiang Ming
doaj +1 more source
Just Dance: detection of human body reenactment fake videos
In the last few years, research on the detection of AI-generated videos has focused exclusively on detecting facial manipulations known as deepfakes. Much less attention has been paid to the detection of artificial non-facial fake videos.
Omran Alamayreh +5 more
doaj +1 more source
Image Manipulation Detection and Localization Based on the Dual-Domain Convolutional Neural Networks
In multimedia forensics, many efforts have been made to detect whether an image is pristine or manipulated with high enough accuracies based on specially designed features and classifiers in the past decade. However, the important task for localizing the
Zenan Shi +3 more
doaj +1 more source
Synthbuster: Towards Detection of Diffusion Model Generated Images
Synthetically-generated images are getting increasingly popular. Diffusion models have advanced to the stage where even non-experts can generate photo-realistic images from a simple text prompt.
Quentin Bammey
doaj +1 more source
Diffusion-based generative models have significantly advanced the field of image synthesis, presenting additional challenges regarding the integrity and authenticity of digital images.
Van-Nhan Tran +4 more
doaj +1 more source
Spatial Video Forgery Detection and Localization using Texture Analysis of Consecutive Frames
Now-a-days, videos can be easily recorded and forged with user-friendly editing tools. These videos can be shared on social networks to make false propaganda.
SADDIQUE, M. +4 more
doaj +1 more source
Feasibility Study of Location Authentication for IoT Data Using Power Grid Signatures
Ambient signatures related to the power grid offer an under-utilized opportunity to verify the time and location of sensing data collected by the Internet-of-Things (IoT).
Mudi Zhang +3 more
doaj +1 more source
An efficient deepfake video detection using robust deep learning
The creation and manipulation of synthetic images have evolved rapidly, causing serious concerns about their effects on society. Although there have been various attempts to identify deep fake videos, these approaches are not universal. Identifying these
Abdul Qadir +5 more
doaj +1 more source
Reliable signature authentication is essential across fields where identity verification is critical. Despite advances in machine learning, validating handwritten signatures remains challenging due to inherent variability in individual writing styles ...
Giovanni Piccinini +2 more
doaj +1 more source

