Results 131 to 140 of about 29,824 (175)
Some of the next articles are maybe not open access.
Image watermarking for tamper detection
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), 2002We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing/adding features from nonmalicious changes resulting from common image processing operations.
openaire +1 more source
Image tamper detection based on demosaicing artifacts
2009 16th IEEE International Conference on Image Processing (ICIP), 2009In this paper, we introduce tamper detection techniques based on artifacts created by Color Filter Array (CFA) processing in most digital cameras. The techniques are based on computing a single feature and a simple threshold based classifier. The efficacy of the approach was tested over thousands of authentic, tampered, and computer generated images ...
Nasir, Memon, DİRİK, AHMET EMİR
openaire +2 more sources
Brightness distribution based image tampering detection
2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015Reports confirming malicious manipulation of digital images are increasing nowadays. Law enforcement agencies are looking for solutions capable of authenticating digital images. In this paper, we have proposed a method that detects tampering involving facial regions by comparing the dissimilarity between the brightness distributions. We have considered
Divya S. Vidyadharan, Sabu M. Thampi
openaire +1 more source
Tamper detection marking for object files
IEEE Military Communications Conference, 2003. MILCOM 2003., 2004Much of present day computer software is highly mobile, with a great amount of software being delivered to a client host via a network shortly before execution begins. The integrity of mobile code is one important aspect for the secure execution of the code on the client host.
M. Jochen, L.L. Pollock, L.M. Marvel
openaire +1 more source
Local tampering detection in video sequences
2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), 2013Video sequences are often believed to provide stronger forensic evidence than still images, e.g., when used in lawsuits. However, a wide set of powerful and easy-to-use video authoring tools is today available to anyone. Therefore, it is possible for an attacker to maliciously forge a video sequence, e.g., by removing or inserting an object in a scene.
BESTAGINI, PAOLO +3 more
openaire +3 more sources
Tampering Detection in Low-Power Smart Cameras
2015A desirable feature in smart cameras is the ability to autonomously detect any tampering event/attack that would prevent a clear view over the monitored scene. No matter whether tampering is due to atmospheric phenomena (e.g., few rain drops over the camera lens) or to malicious attacks (e.g., occlusions or device displacements), these have to be ...
Gaibotti, Adriano +3 more
openaire +2 more sources
Temperature sensitive active tamper detection circuit
2017 IEEE 23rd International Symposium for Design and Technology in Electronic Packaging (SIITME), 2017Electronic modules designed for processing sensitive data, such as cryptographic modules, firmware solutions protected by intellectual property rights and secure communication devices, use special circuits designed for protecting these solutions from unauthorized physical access.
D. C. Vasile, P. M. Svasta
openaire +1 more source
Tamper detection for active surveillance systems
2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2013If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time address this important problem for an active camera.
Theodore Tsesmelis +3 more
openaire +1 more source
Robust Image Alignment for Tampering Detection
IEEE Transactions on Information Forensics and Security, 2012The widespread use of classic and newest technologies available on Internet (e.g., emails, social networks, digital repositories) has induced a growing interest on systems able to protect the visual content against malicious manipulations that could be performed during their transmission.
BATTIATO, SEBASTIANO +3 more
openaire +2 more sources
Tampered Image Detection Using Image Matching
2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation, 2008With the development of image processing software, such as Photoshop, scientific analysis for detecting tampered images becomes a critical research issue. A hybrid image matching algorithm for image analysis is proposed and evaluated. Features are extracted using blob detectors and interest point detectors.
Zhenghao Li +3 more
openaire +1 more source

