Results 1 to 10 of about 29,804 (155)

Tamper Detection against Unitary Operators [PDF]

open access: yesQuantum, 2023
Security of a storage device against a tampering adversary has been a well-studied topic in classical cryptography. Such models give black-box access to an adversary, and the aim is to protect the stored message or abort the protocol if there is any ...
Naresh Goud Boddu, Upendra Kapshikar
doaj   +3 more sources

1D-CNN-based audio tampering detection using ENF signals [PDF]

open access: yesScientific Reports
The extensive adoption of digital audio recording has revolutionized its application in digital forensics, particularly in civil litigation and criminal prosecution.
Haifeng Zhao   +3 more
doaj   +2 more sources

Multi-label classification for image tamper detection based on Swin-T segmentation network in the spatial domain [PDF]

open access: yesPeerJ Computer Science
The majority of deep learning methods for detecting image forgery fail to accurately detect and localize the tampering operations. Furthermore, they only support a single image tampering type.
Li Li   +3 more
doaj   +3 more sources

Integrating 1D-CNN and Bi-GRU for ENF-Based Video Tampering Detection [PDF]

open access: yesSensors
Electric network frequency (ENF) refers to the transmission frequency of a power grid, which fluctuates around 50 Hz or 60 Hz. Videos captured in a power grid environment may exhibit flickering artifact caused by the intensity variation in the light ...
Xiaodan Lin, Xinhuan Zang
doaj   +2 more sources

Identification of tampering methods among 12,385 Arabian camels using different diagnostic imaging techniques [PDF]

open access: yesOpen Veterinary Journal
Background: Tampering is an illegal manipulation of Arabian (dromedary) camels for cosmetic purposes and to increase their market value. Because of the tremendous prizes awarded to the owners of the winning camels, methods of illegal tampering were ...
Mohamed Tharwat, Abdulla Al-Hawas
doaj   +2 more sources

Validation and user experience testing of DataCryptChain: An open-source standard combining blockchain technology with asymmetric encryption for private, secure, shareable, and tamper-proof research data. [PDF]

open access: yesPLOS Digital Health
DataCryptChain is an open-source standard combining blockchain with advanced encryption ensuring research data remains private, secure, shareable, and tamper-proof.
Jeffrey Michael Franc
doaj   +2 more sources

Multi-Feature Fusion U-structure Deep Network for Image Tempering Forensics [PDF]

open access: yesJisuanji gongcheng, 2022
With the intelligent development of image tampering tools, the types of image tampering are not limited to a specific type such as splicing and remove, but often includes multiple types of tampering and their combined manipulability, making image ...
LU Dongsheng, ZHANG Yujin, DANG Lianghui
doaj   +1 more source

ResTran: Long Distance Relationship on Image Forgery Detection

open access: yesIEEE Access, 2023
Image tampering detection is becoming more and more important in image forensics, especially in today’s society where advanced image editing tools are becoming more and more popular.
Jingjing Rao   +2 more
doaj   +1 more source

Multitask Transformer-based Network for Image Splicing Manipulation Detection [PDF]

open access: yesJisuanji kexue, 2023
Most of existing deep learning-based methods for image splicing forgery detection use convolutional layer for forensics feature extraction.However,convolution kernel conducts the local computation process with the limited reception field.More-over ...
ZHANG Jingyuan, WANG Hongxia, HE Peisong
doaj   +1 more source

Video inter-frame tampering detection algorithm fusing multiple features

open access: yes网络与信息安全学报, 2020
Traditional passive forensics of video inter-frame tampering often relies on single feature.Each of these features is usually suitable for certain types of videos,while has low detection accuracy for other videos.To combine the advantages of these ...
Hui XIAO   +4 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy