Results 51 to 60 of about 29,824 (175)
Detection and localization of copy-move tampering along with adversarial attack in a digital image
Authenticating digital images is increasingly challenging due to the prevalence of tampering techniques such as copy-move tampering, where parts of an image are copied and pasted within the same image.
Anjali Diwan, Anil K. Roy
doaj +1 more source
Inter-frame tampering in surveillance videos undermines the integrity of video evidence, potentially influencing law enforcement investigations and court decisions.
Naheed Akhtar +2 more
doaj +1 more source
TRANSFER LEARNING APPROACH FOR SPLICING AND COPY-MOVE IMAGE TAMPERING DETECTION
Image authentication before using in any security critical applications has become necessary as the image editing tools are increasing and are handy to use in today''s world.
Nagaveni K Hebbar, Ashwini S Kunte
doaj +1 more source
Camera-based Image Forgery Localization using Convolutional Neural Networks
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example is the photo response non-uniformity (PRNU) noise pattern, a powerful device fingerprint.
Cozzolino, Davide, Verdoliva, Luisa
core +1 more source
Detecting tampering in a random hypercube
Consider the random hypercube $H_2^n(p_n)$ obtained from the hypercube $H_2^n$ by deleting any given edge with probabilty $1-p_n$, independently of all the other edges. A diameter path in $H_2^n$ is a longest geodesic path in $H_2^n$. Consider the following two ways of tampering with the random graph $H_2^n(p_n)$: (i) choose a diameter path at random ...
openaire +4 more sources
Image Tampering Detection and Repairing
It is very crucial to design efficient methods to provide authentication to document images mainly for images whose security must be protected. In digital media the authentication, tampering detection and repairing of the tampered data is main concern. Nowadays many digital documents are transferred on the internet regularly e.g.
Ashwini Jarali, Sarika Jankar, Jyoti Rao
openaire +1 more source
Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix [PDF]
[[abstract]]In order to improve the detection of malicious tampering of images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been distorted incidentally. However, watermarks are sensitive to geometric
謝景棠
core +1 more source
Brief Cognizance into Tampered Image Detection
Abstract: This paper is a testament to the research carried out to detect tampered images using deep learning and machine learning techniques, including the implementation of various standard and hybrid convolution neural networks, thus creating a comparative study for the neural networks.
Raghav Gupta +3 more
openaire +1 more source
The Turing test aimed to recognize the behavior of a human from that of a computer algorithm. Such challenge is more relevant than ever in today's social media context, where limited attention and technology constrain the expressive power of humans ...
Davis, Clayton +4 more
core +1 more source
Auditable Restoration of Distributed Programs
We focus on a protocol for auditable restoration of distributed systems. The need for such protocol arises due to conflicting requirements (e.g., access to the system should be restricted but emergency access should be provided).
Hajisheykhi, Reza +2 more
core +1 more source

