Results 41 to 50 of about 36,393 (285)

Daxing Smartphone Identification Dataset

open access: yesIEEE Access, 2019
Over the past few years, the imaging device has changed from digital cameras to smartphone cameras. With the popularity of mobile Internet applications, there explode massive digital images and videos captured by such smartphones, which are nearly held ...
Huawei Tian   +5 more
doaj   +1 more source

Dataset for file fragment classification of video file formats

open access: yesBMC Research Notes, 2020
Objectives File fragment classification of video file formats is a topic of interest in network forensics. There are some publicly available datasets for file fragments of various file types such as textual, audio, and image file formats.
Narges Sadeghi   +2 more
doaj   +1 more source

Media Forensics Considerations on DeepFake Detection with Hand-Crafted Features

open access: yesJournal of Imaging, 2021
DeepFake detection is a novel task for media forensics and is currently receiving a lot of research attention due to the threat these targeted video manipulations propose to the trust placed in video footage.
Dennis Siegel   +3 more
doaj   +1 more source

Autoencoder with recurrent neural networks for video forgery detection

open access: yes, 2017
Video forgery detection is becoming an important issue in recent years, because modern editing software provide powerful and easy-to-use tools to manipulate videos.
Cozzolino, Davide   +3 more
core   +1 more source

A tool to support the creation of datasets of tampered videos [PDF]

open access: yes, 2015
Digital Video Forensics is getting a growing interest from the Multimedia research community, as the need for methods to validate the authenticity of a video content is increasing with the number of videos freely available to the digital users.
A Rocha   +10 more
core   +1 more source

A Thorough Investigation Into the ENF Reconstruction in Videos Exposed by Rolling Shutter

open access: yesIEEE Access, 2023
In electric network frequency (ENF)-based video forensics, the analysis of videos captured by rolling shutter systems, where each row of a frame is exposed at different time instances, is critical. To gain the advantage of increased sampling frequency in
Saffet Vatansever
doaj   +1 more source

On the Reverse Engineering of the Citadel Botnet [PDF]

open access: yes, 2014
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the
A Rahimian   +4 more
core   +3 more sources

CRISPR/Cas9‐Assisted Microrobots for Fast and Ultrasensitive “On‐The‐Fly” Next‐Generation DNA Detection

open access: yesAdvanced Functional Materials, EarlyView.
This work presents self‐propelled CRISPR/Cas9‐functionalized Au–MRs for rapid, amplification‐free, “on‐the‐fly” DNA detection. By harnessing motion‐assisted signal recovery, the platform achieved the limit of detection in low fM DNA concentrations, enabling detection across a wide dynamic range within only 5 min, which is significantly faster than any ...
Jyoti   +3 more
wiley   +1 more source

Forensic of video object removal tamper based on 3D dual-stream network

open access: yesTongxin xuebao, 2021
In order to solve the problems of inaccurate temporal detection and location of the object removal tampered video, a video tamper forensics method based on 3D dual-stream network was proposed.Firstly, the spatial rich model (SRM) layer was used to ...
Lizhi XIONG, Mengqi CAO, Zhangjie FU
doaj   +2 more sources

PRNU-Based Video Source Attribution: Which Frames Are You Using?

open access: yesJournal of Imaging, 2022
Photo Response Non-Uniformity (PRNU) is reputed the most successful trace to identify the source of a digital video. However, its effectiveness is mainly limited by compression and the effect of recently introduced electronic image stabilization on ...
Pasquale Ferrara   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy