Results 11 to 20 of about 35,854 (174)
Temporal Forensics and Anti-Forensics for Motion Compensated Video [PDF]
Due to the ease with which digital information can be altered, many digital forensic techniques have been developed to authenticate multimedia content. Similarly, a number of anti-forensic operations have recently been designed to make digital forgeries undetectable by forensic techniques.
Matthew C. Stamm +2 more
openaire +3 more sources
Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics
Video copy-move forgery detection is one of the hot topics in multimedia forensics to protect digital videos from malicious use. Several approaches have been presented through analyzing the side effect caused by copy-move operation.
Shan Jia +4 more
doaj +3 more sources
Passive forensics for video object removal tampering
Firstly, the concept and importance of digital video object removal tampering forensics were introduced. Then, several current passive forensics algorithms for object removal tampering were selected and divided into two categories that based on ...
Ye YAO, Wei-tong HU, Yi-zhi REN
doaj +3 more sources
Electric Network Frequency (ENF) is embedded in multimedia recordings if the recordings are captured with a device connected to power mains or placed near the power mains. It is exploited as a tool for multimedia authentication.
Georgios Karantaidis +1 more
doaj +1 more source
A Robust Approach to Multimodal Deepfake Detection
The widespread use of deep learning techniques for creating realistic synthetic media, commonly known as deepfakes, poses a significant threat to individuals, organizations, and society.
Davide Salvi +6 more
doaj +1 more source
Video Forensics: Identifying Colorized Images Using Deep Learning
In recent years there has been a significant increase in images and videos circulating in social networks and media, edited with different techniques, including colorization.
Carlos Ulloa +2 more
doaj +1 more source
A user-oriented network forensic analyser: the design of a high-level protocol analyser [PDF]
Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g.
Clarke, Nathan +3 more
core +2 more sources
Face recognition technologies for evidential evaluation of video traces [PDF]
Human recognition from video traces is an important task in forensic investigations and evidence evaluations. Compared with other biometric traits, face is one of the most popularly used modalities for human recognition due to the fact that its ...
Li, Chang-Tsun, Wei, Xingjie
core +1 more source
Identification of Social-Media Platform of Videos through the Use of Shared Features
Videos have become a powerful tool for spreading illegal content such as military propaganda, revenge porn, or bullying through social networks. To counter these illegal activities, it has become essential to try new methods to verify the origin of ...
Luca Maiano +3 more
doaj +1 more source
Reference face graph for face recognition [PDF]
Face recognition has been studied extensively; however, real-world face recognition still remains a challenging task. The demand for unconstrained practical face recognition is rising with the explosion of online multimedia such as social networks, and ...
An, L, Bhanu, B, Kafai, M
core +3 more sources

