Tamper Detection against Unitary Operators [PDF]
Security of a storage device against a tampering adversary has been a well-studied topic in classical cryptography. Such models give black-box access to an adversary, and the aim is to protect the stored message or abort the protocol if there is any ...
Naresh Goud Boddu, Upendra Kapshikar
doaj +3 more sources
1D-CNN-based audio tampering detection using ENF signals [PDF]
The extensive adoption of digital audio recording has revolutionized its application in digital forensics, particularly in civil litigation and criminal prosecution.
Haifeng Zhao +3 more
doaj +2 more sources
Multi-label classification for image tamper detection based on Swin-T segmentation network in the spatial domain [PDF]
The majority of deep learning methods for detecting image forgery fail to accurately detect and localize the tampering operations. Furthermore, they only support a single image tampering type.
Li Li +3 more
doaj +3 more sources
Integrating 1D-CNN and Bi-GRU for ENF-Based Video Tampering Detection [PDF]
Electric network frequency (ENF) refers to the transmission frequency of a power grid, which fluctuates around 50 Hz or 60 Hz. Videos captured in a power grid environment may exhibit flickering artifact caused by the intensity variation in the light ...
Xiaodan Lin, Xinhuan Zang
doaj +2 more sources
Identification of tampering methods among 12,385 Arabian camels using different diagnostic imaging techniques [PDF]
Background: Tampering is an illegal manipulation of Arabian (dromedary) camels for cosmetic purposes and to increase their market value. Because of the tremendous prizes awarded to the owners of the winning camels, methods of illegal tampering were ...
Mohamed Tharwat, Abdulla Al-Hawas
doaj +2 more sources
Validation and user experience testing of DataCryptChain: An open-source standard combining blockchain technology with asymmetric encryption for private, secure, shareable, and tamper-proof research data. [PDF]
DataCryptChain is an open-source standard combining blockchain with advanced encryption ensuring research data remains private, secure, shareable, and tamper-proof.
Jeffrey Michael Franc
doaj +2 more sources
Multi-Feature Fusion U-structure Deep Network for Image Tempering Forensics [PDF]
With the intelligent development of image tampering tools, the types of image tampering are not limited to a specific type such as splicing and remove, but often includes multiple types of tampering and their combined manipulability, making image ...
LU Dongsheng, ZHANG Yujin, DANG Lianghui
doaj +1 more source
ResTran: Long Distance Relationship on Image Forgery Detection
Image tampering detection is becoming more and more important in image forensics, especially in today’s society where advanced image editing tools are becoming more and more popular.
Jingjing Rao +2 more
doaj +1 more source
Multitask Transformer-based Network for Image Splicing Manipulation Detection [PDF]
Most of existing deep learning-based methods for image splicing forgery detection use convolutional layer for forensics feature extraction.However,convolution kernel conducts the local computation process with the limited reception field.More-over ...
ZHANG Jingyuan, WANG Hongxia, HE Peisong
doaj +1 more source
Video inter-frame tampering detection algorithm fusing multiple features
Traditional passive forensics of video inter-frame tampering often relies on single feature.Each of these features is usually suitable for certain types of videos,while has low detection accuracy for other videos.To combine the advantages of these ...
Hui XIAO +4 more
doaj +3 more sources

