Results 51 to 60 of about 29,824 (175)

Detection and localization of copy-move tampering along with adversarial attack in a digital image

open access: yesDiscover Computing
Authenticating digital images is increasingly challenging due to the prevalence of tampering techniques such as copy-move tampering, where parts of an image are copied and pasted within the same image.
Anjali Diwan, Anil K. Roy
doaj   +1 more source

DEEP-STA: Deep Learning-Based Detection and Localization of Various Types of Inter-Frame Video Tampering Using Spatiotemporal Analysis

open access: yesMathematics
Inter-frame tampering in surveillance videos undermines the integrity of video evidence, potentially influencing law enforcement investigations and court decisions.
Naheed Akhtar   +2 more
doaj   +1 more source

TRANSFER LEARNING APPROACH FOR SPLICING AND COPY-MOVE IMAGE TAMPERING DETECTION

open access: yesICTACT Journal on Image and Video Processing, 2021
Image authentication before using in any security critical applications has become necessary as the image editing tools are increasing and are handy to use in today''s world.
Nagaveni K Hebbar, Ashwini S Kunte
doaj   +1 more source

Camera-based Image Forgery Localization using Convolutional Neural Networks

open access: yes, 2018
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example is the photo response non-uniformity (PRNU) noise pattern, a powerful device fingerprint.
Cozzolino, Davide, Verdoliva, Luisa
core   +1 more source

Detecting tampering in a random hypercube

open access: yesElectronic Journal of Probability, 2013
Consider the random hypercube $H_2^n(p_n)$ obtained from the hypercube $H_2^n$ by deleting any given edge with probabilty $1-p_n$, independently of all the other edges. A diameter path in $H_2^n$ is a longest geodesic path in $H_2^n$. Consider the following two ways of tampering with the random graph $H_2^n(p_n)$: (i) choose a diameter path at random ...
openaire   +4 more sources

Image Tampering Detection and Repairing

open access: yesInternational Journal of Computer Applications, 2014
It is very crucial to design efficient methods to provide authentication to document images mainly for images whose security must be protected. In digital media the authentication, tampering detection and repairing of the tampered data is main concern. Nowadays many digital documents are transferred on the internet regularly e.g.
Ashwini Jarali, Sarika Jankar, Jyoti Rao
openaire   +1 more source

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix [PDF]

open access: yes
[[abstract]]In order to improve the detection of malicious tampering of images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been distorted incidentally. However, watermarks are sensitive to geometric
謝景棠
core   +1 more source

Brief Cognizance into Tampered Image Detection

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2023
Abstract: This paper is a testament to the research carried out to detect tampered images using deep learning and machine learning techniques, including the implementation of various standard and hybrid convolution neural networks, thus creating a comparative study for the neural networks.
Raghav Gupta   +3 more
openaire   +1 more source

The Rise of Social Bots

open access: yes, 2016
The Turing test aimed to recognize the behavior of a human from that of a computer algorithm. Such challenge is more relevant than ever in today's social media context, where limited attention and technology constrain the expressive power of humans ...
Davis, Clayton   +4 more
core   +1 more source

Auditable Restoration of Distributed Programs

open access: yes, 2015
We focus on a protocol for auditable restoration of distributed systems. The need for such protocol arises due to conflicting requirements (e.g., access to the system should be restricted but emergency access should be provided).
Hajisheykhi, Reza   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy