Sign Up to like & get
recommendations!
1
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6075-5
Abstract: The image acquisition device, the light is filtered through a Color Filter Array (CFA), where each pixel captures only one color (from Red, Green, and Blue), while others are calibrated. This process is known as…
read more here.
Keywords:
cfa artifacts;
image;
forgery detection;
approach ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6595-z
Abstract: In this paper, fractional quaternion cosine transforms (FrQCT) is proposed to generalize the conventional fractional cosine transforms (FrCT) to quaternion signal processing in a holistic manner. Firstly, the new transform FrQCT is defined and the…
read more here.
Keywords:
cosine;
fractional quaternion;
forgery detection;
quaternion cosine ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-08162-3
Abstract: Image forgery detection is the basic key to solve many problems, especially social problems such as those in Facebook, and court cases. The common form of image forgery is the copy-move forgery, in which a…
read more here.
Keywords:
trigonometric transforms;
image;
forgery detection;
forgery ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-08495-z
Abstract: The image forgery activities are on the rise because of the development of various image editing tools. Such activities are done by attackers with intentions of defaming people and websites or for gaining monetary advantage, extortion…
read more here.
Keywords:
forgery;
image;
copy move;
forgery detection ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Wireless Personal Communications"
DOI: 10.1007/s11277-021-08964-5
Abstract: It is a generic belief that digital video can be proffered as visual evidence in areas like politics, criminal litigation, journalism and military intelligence services. Multicamera smartphones with megapixels of resolution are a common hand-held…
read more here.
Keywords:
video;
video forgery;
forgery detection;
forgery ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Signal, Image and Video Processing"
DOI: 10.1007/s11760-016-1023-1
Abstract: In multimedia forensics, it is important to identify those images that were captured by a specific camera from a given set of N data images as well as detecting the tampered region in these images…
read more here.
Keywords:
technique;
zernike moments;
forgery detection;
camera ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Evolving Systems"
DOI: 10.1007/s12530-021-09367-4
Abstract: Digital images face widespread tampering through a copy-move attack, wherein objects are added or removed from an image to create the copy-move forged image. This paper proposes a robust Copy Move Forgery Detection (CMFD) scheme…
read more here.
Keywords:
forgery detection;
copy move;
copy;
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2964516
Abstract: Multimedia files play an important role in everyday life. Today, the majority of the population owns state-of-the-art cameras integrated into their mobile devices. Technological development not only facilitates the generation of multimedia content, but also…
read more here.
Keywords:
passive image;
detection based;
based demosaicing;
image ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3096240
Abstract: Content authentication of digital images has captured the attention of forensic experts and security researchers due to a multi-fold increase in the dissemination of multimedia data through the open and vulnerable Internet. Shrewd attackers successfully…
read more here.
Keywords:
digital images;
detection digital;
image;
deep features ... See more keywords
Photo by nspm from unsplash
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2022.3232290
Abstract: Face forgery generating algorithms that produce a range of manipulated videos/images have developed quickly. Consequently, this causes an increase in the production of fake information, making it difficult to identify. Because facial manipulation technologies raise…
read more here.
Keywords:
meta deepfake;
forgery detection;
detection;
model ... See more keywords
Photo by usgs from unsplash
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3241837
Abstract: In the last decades, deep learning (DL) has emerged as a powerful and dominant technique for solving challenging problems in various fields. Likewise, in the field of digital image forensics, a large and growing body…
read more here.
Keywords:
methods image;
image forgery;
based methods;
forgery detection ... See more keywords