Results 61 to 70 of about 29,824 (175)

Two–Stage Detection and Localization of Inter–Frame Tampering in Surveillance Videos Using Texture and Optical Flow

open access: yesMathematics
Surveillance cameras provide security and protection through real-time monitoring or through the investigation of recorded videos. The authenticity of surveillance videos cannot be taken for granted, but tampering detection is challenging.
Naheed Akhtar   +2 more
doaj   +1 more source

Passive forensics for video object removal tampering

open access: yes网络与信息安全学报, 2017
Firstly, the concept and importance of digital video object removal tampering forensics were introduced. Then, several current passive forensics algorithms for object removal tampering were selected and divided into two categories that based on ...
Ye YAO, Wei-tong HU, Yi-zhi REN
doaj   +3 more sources

Autoencoder with recurrent neural networks for video forgery detection

open access: yes, 2017
Video forgery detection is becoming an important issue in recent years, because modern editing software provide powerful and easy-to-use tools to manipulate videos.
Cozzolino, Davide   +3 more
core   +1 more source

The PS-Battles Dataset - an Image Collection for Image Manipulation Detection

open access: yes, 2018
The boost of available digital media has led to a significant increase in derivative work. With tools for manipulating objects becoming more and more mature, it can be very difficult to determine whether one piece of media was derived from another one or
Heller, Silvan   +2 more
core  

Forensic Investigation of MP3 Audio Recordings

open access: yesТеория и практика судебной экспертизы, 2020
Special aspects of MP3-recordings technical investigation are addressed. The following features of formation and research of MP3 phonograms are explained: traces of MP3 coding in time and spectral domain, special aspects of MP3-files structure analysis ...
A. G. Boyarov, I. S. Siparov
doaj   +1 more source

Pseudo-siamese network image tampering localization model based on reinforced samples

open access: yes网络与信息安全学报
With the continuous development of the internet, an increasing number of images have been tampered with on the network, accompanied by a growing range of techniques to cover up tampering traces.However, most current detection models neglect the impact of
Jinwei WANG   +3 more
doaj   +3 more sources

Image Hash Minimization for Tamper Detection

open access: yes2017 Ninth International Conference on Advances in Pattern Recognition (ICAPR), 2017
Tamper detection using image hash is a very common problem of modern days. Several research and advancements have already been done to address this problem. However, most of the existing methods lack the accuracy of tamper detection when the tampered area is low, as well as requiring long image hashes.
Maity, Subhajit, Karsh, Ram Kumar
openaire   +2 more sources

Improved Speech Authenticity Detection in Chinese–English Bilingual Contexts

open access: yesSensors
The rapid evolution of voice technology has heightened the need for robust detection systems to distinguish between authentic and tampered speech. Recent competitions have significantly advanced the development of countermeasures against spoofing attacks.
Cheng-Yuan Tsai   +4 more
doaj   +1 more source

Anti-Tamper Radio Meets Reconfigurable Intelligent Surface for System-Level Tamper Detection

open access: yes18th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Many computing systems need to be protected against physical attacks using active tamper detection based on sensors. One technical solution is to employ an ATR (Anti-Tamper Radio) approach, analyzing the radio wave propagation effects within a protected device to detect unauthorized physical alterations.
Maryam Shaygan Tabar   +5 more
openaire   +2 more sources

Detection of Montage in Lossy Compressed Digital Audio Recordings

open access: yesArchives of Acoustics, 2014
This paper addresses the problem of tampering detection and discusses methods used for authenticity analysis of digital audio recordings. Presented approach is based on frame offset measurement in audio files compressed and decoded by using perceptual ...
Rafał KORYCKI
doaj   +1 more source

Home - About - Disclaimer - Privacy