Results 131 to 140 of about 29,824 (175)
Some of the next articles are maybe not open access.

Image watermarking for tamper detection

Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), 2002
We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing/adding features from nonmalicious changes resulting from common image processing operations.
openaire   +1 more source

Image tamper detection based on demosaicing artifacts

2009 16th IEEE International Conference on Image Processing (ICIP), 2009
In this paper, we introduce tamper detection techniques based on artifacts created by Color Filter Array (CFA) processing in most digital cameras. The techniques are based on computing a single feature and a simple threshold based classifier. The efficacy of the approach was tested over thousands of authentic, tampered, and computer generated images ...
Nasir, Memon, DİRİK, AHMET EMİR
openaire   +2 more sources

Brightness distribution based image tampering detection

2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015
Reports confirming malicious manipulation of digital images are increasing nowadays. Law enforcement agencies are looking for solutions capable of authenticating digital images. In this paper, we have proposed a method that detects tampering involving facial regions by comparing the dissimilarity between the brightness distributions. We have considered
Divya S. Vidyadharan, Sabu M. Thampi
openaire   +1 more source

Tamper detection marking for object files

IEEE Military Communications Conference, 2003. MILCOM 2003., 2004
Much of present day computer software is highly mobile, with a great amount of software being delivered to a client host via a network shortly before execution begins. The integrity of mobile code is one important aspect for the secure execution of the code on the client host.
M. Jochen, L.L. Pollock, L.M. Marvel
openaire   +1 more source

Local tampering detection in video sequences

2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), 2013
Video sequences are often believed to provide stronger forensic evidence than still images, e.g., when used in lawsuits. However, a wide set of powerful and easy-to-use video authoring tools is today available to anyone. Therefore, it is possible for an attacker to maliciously forge a video sequence, e.g., by removing or inserting an object in a scene.
BESTAGINI, PAOLO   +3 more
openaire   +3 more sources

Tampering Detection in Low-Power Smart Cameras

2015
A desirable feature in smart cameras is the ability to autonomously detect any tampering event/attack that would prevent a clear view over the monitored scene. No matter whether tampering is due to atmospheric phenomena (e.g., few rain drops over the camera lens) or to malicious attacks (e.g., occlusions or device displacements), these have to be ...
Gaibotti, Adriano   +3 more
openaire   +2 more sources

Temperature sensitive active tamper detection circuit

2017 IEEE 23rd International Symposium for Design and Technology in Electronic Packaging (SIITME), 2017
Electronic modules designed for processing sensitive data, such as cryptographic modules, firmware solutions protected by intellectual property rights and secure communication devices, use special circuits designed for protecting these solutions from unauthorized physical access.
D. C. Vasile, P. M. Svasta
openaire   +1 more source

Tamper detection for active surveillance systems

2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2013
If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time address this important problem for an active camera.
Theodore Tsesmelis   +3 more
openaire   +1 more source

Robust Image Alignment for Tampering Detection

IEEE Transactions on Information Forensics and Security, 2012
The widespread use of classic and newest technologies available on Internet (e.g., emails, social networks, digital repositories) has induced a growing interest on systems able to protect the visual content against malicious manipulations that could be performed during their transmission.
BATTIATO, SEBASTIANO   +3 more
openaire   +2 more sources

Tampered Image Detection Using Image Matching

2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation, 2008
With the development of image processing software, such as Photoshop, scientific analysis for detecting tampered images becomes a critical research issue. A hybrid image matching algorithm for image analysis is proposed and evaluated. Features are extracted using blob detectors and interest point detectors.
Zhenghao Li   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy