Results 41 to 50 of about 36,393 (285)
Daxing Smartphone Identification Dataset
Over the past few years, the imaging device has changed from digital cameras to smartphone cameras. With the popularity of mobile Internet applications, there explode massive digital images and videos captured by such smartphones, which are nearly held ...
Huawei Tian +5 more
doaj +1 more source
Dataset for file fragment classification of video file formats
Objectives File fragment classification of video file formats is a topic of interest in network forensics. There are some publicly available datasets for file fragments of various file types such as textual, audio, and image file formats.
Narges Sadeghi +2 more
doaj +1 more source
Media Forensics Considerations on DeepFake Detection with Hand-Crafted Features
DeepFake detection is a novel task for media forensics and is currently receiving a lot of research attention due to the threat these targeted video manipulations propose to the trust placed in video footage.
Dennis Siegel +3 more
doaj +1 more source
Autoencoder with recurrent neural networks for video forgery detection
Video forgery detection is becoming an important issue in recent years, because modern editing software provide powerful and easy-to-use tools to manipulate videos.
Cozzolino, Davide +3 more
core +1 more source
A tool to support the creation of datasets of tampered videos [PDF]
Digital Video Forensics is getting a growing interest from the Multimedia research community, as the need for methods to validate the authenticity of a video content is increasing with the number of videos freely available to the digital users.
A Rocha +10 more
core +1 more source
A Thorough Investigation Into the ENF Reconstruction in Videos Exposed by Rolling Shutter
In electric network frequency (ENF)-based video forensics, the analysis of videos captured by rolling shutter systems, where each row of a frame is exposed at different time instances, is critical. To gain the advantage of increased sampling frequency in
Saffet Vatansever
doaj +1 more source
On the Reverse Engineering of the Citadel Botnet [PDF]
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the
A Rahimian +4 more
core +3 more sources
This work presents self‐propelled CRISPR/Cas9‐functionalized Au–MRs for rapid, amplification‐free, “on‐the‐fly” DNA detection. By harnessing motion‐assisted signal recovery, the platform achieved the limit of detection in low fM DNA concentrations, enabling detection across a wide dynamic range within only 5 min, which is significantly faster than any ...
Jyoti +3 more
wiley +1 more source
Forensic of video object removal tamper based on 3D dual-stream network
In order to solve the problems of inaccurate temporal detection and location of the object removal tampered video, a video tamper forensics method based on 3D dual-stream network was proposed.Firstly, the spatial rich model (SRM) layer was used to ...
Lizhi XIONG, Mengqi CAO, Zhangjie FU
doaj +2 more sources
PRNU-Based Video Source Attribution: Which Frames Are You Using?
Photo Response Non-Uniformity (PRNU) is reputed the most successful trace to identify the source of a digital video. However, its effectiveness is mainly limited by compression and the effect of recently introduced electronic image stabilization on ...
Pasquale Ferrara +2 more
doaj +1 more source

