Results 61 to 70 of about 29,824 (175)
Surveillance cameras provide security and protection through real-time monitoring or through the investigation of recorded videos. The authenticity of surveillance videos cannot be taken for granted, but tampering detection is challenging.
Naheed Akhtar +2 more
doaj +1 more source
Passive forensics for video object removal tampering
Firstly, the concept and importance of digital video object removal tampering forensics were introduced. Then, several current passive forensics algorithms for object removal tampering were selected and divided into two categories that based on ...
Ye YAO, Wei-tong HU, Yi-zhi REN
doaj +3 more sources
Autoencoder with recurrent neural networks for video forgery detection
Video forgery detection is becoming an important issue in recent years, because modern editing software provide powerful and easy-to-use tools to manipulate videos.
Cozzolino, Davide +3 more
core +1 more source
The PS-Battles Dataset - an Image Collection for Image Manipulation Detection
The boost of available digital media has led to a significant increase in derivative work. With tools for manipulating objects becoming more and more mature, it can be very difficult to determine whether one piece of media was derived from another one or
Heller, Silvan +2 more
core
Forensic Investigation of MP3 Audio Recordings
Special aspects of MP3-recordings technical investigation are addressed. The following features of formation and research of MP3 phonograms are explained: traces of MP3 coding in time and spectral domain, special aspects of MP3-files structure analysis ...
A. G. Boyarov, I. S. Siparov
doaj +1 more source
Pseudo-siamese network image tampering localization model based on reinforced samples
With the continuous development of the internet, an increasing number of images have been tampered with on the network, accompanied by a growing range of techniques to cover up tampering traces.However, most current detection models neglect the impact of
Jinwei WANG +3 more
doaj +3 more sources
Image Hash Minimization for Tamper Detection
Tamper detection using image hash is a very common problem of modern days. Several research and advancements have already been done to address this problem. However, most of the existing methods lack the accuracy of tamper detection when the tampered area is low, as well as requiring long image hashes.
Maity, Subhajit, Karsh, Ram Kumar
openaire +2 more sources
Improved Speech Authenticity Detection in Chinese–English Bilingual Contexts
The rapid evolution of voice technology has heightened the need for robust detection systems to distinguish between authentic and tampered speech. Recent competitions have significantly advanced the development of countermeasures against spoofing attacks.
Cheng-Yuan Tsai +4 more
doaj +1 more source
Anti-Tamper Radio Meets Reconfigurable Intelligent Surface for System-Level Tamper Detection
Many computing systems need to be protected against physical attacks using active tamper detection based on sensors. One technical solution is to employ an ATR (Anti-Tamper Radio) approach, analyzing the radio wave propagation effects within a protected device to detect unauthorized physical alterations.
Maryam Shaygan Tabar +5 more
openaire +2 more sources
Detection of Montage in Lossy Compressed Digital Audio Recordings
This paper addresses the problem of tampering detection and discusses methods used for authenticity analysis of digital audio recordings. Presented approach is based on frame offset measurement in audio files compressed and decoded by using perceptual ...
Rafał KORYCKI
doaj +1 more source

