Suggested Topics within your search.
Suggested Topics within your search.
- Child welfare 1
- Computer crimes 1
- Custody of children 1
- Digital forensic science 1
- Family assessment 1
- Family psychotherapy 1
- Forensic Psychiatry 1
- Forensic child psychology 1
- Forensic psychiatric nursing 1
- Investigation 1
- Journalistic ethics 1
- Language 1
- Law 1
- Moral and ethical aspects 1
- Photojournalism 1
- Psychiatric Nursing 1
- Psychiatric nursing 1
-
361
-
362
Region Duplication Forgery Detection Technique Based on SURF and HAC
Published 2013-01-01“…Region duplication forgery detection is a special type of forgery detection approach and widely used research topic under digital image forensics. In copy move forgery, a specific area is copied and then pasted into any other region of the image. …”
Get full text
Article -
363
A Solution to Reconstruct Cross-Cut Shredded Text Documents Based on Character Recognition and Genetic Algorithm
Published 2014-01-01“…This topic is relevant to the fields of forensics, investigative sciences, and archeology. …”
Get full text
Article -
364
Unknown presentation attack detection against rational attackers
Published 2021-09-01“…Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real‐life settings. …”
Get full text
Article -
365
Revealing Traces of Image Resampling and Resampling Antiforensics
Published 2017-01-01“…Image resampling is a common manipulation in image processing. The forensics of resampling plays an important role in image tampering detection, steganography, and steganalysis. …”
Get full text
Article -
366
Starting with the Digital Doesn’t Make it Easier
Published 2025-01-01“…Unrealistic expectations of collection processing, retention, growth, and publication onto openly accessible platforms can quickly overwhelm a libraries’ digital collections’ team due to size, need for digital forensics work, copyright limitations, or other capacity-related issues. …”
Get full text
Article -
367
A dual-stream model based on PRNU and quaternion RGB for detecting fake faces.
Published 2025-01-01“…The forensic examination of AIGC(Artificial Intelligence Generated Content) faces poses a contemporary challenge within the realm of color image forensics. …”
Get full text
Article -
368
Robust Face Detection and Identification under Occlusion using MTCNN and RESNET50
Published 2025-01-01“…Technologies are similar to digital forensics in that they can recognize people by scanning faces. …”
Get full text
Article -
369
-
370
Noise-attention-based forgery face detection method
Published 2023-08-01“…With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise, posing a significant threat to multimedia security and social stability.Therefore, it is crucial to research detection methods for forged faces.Face tampering and forgery can occur through various means and tools, leaving different levels of forgery traces during the tampering process.These traces can be partly reflected in the image noise.From the perspective of image noise, the noise components reflecting tampering traces of forged faces were extracted through a noise removal module.Furthermore, noise attention was generated to guide the backbone network in the detection of forged faces.The training of the noise removal module was supervised using SRM filters.In order to strengthen the guidance of the noise removal module, the noise obtained by the noise removal module was added back to the real face image, forming a pair of supervised training samples in a self-supervised manner.The experimental results illustrate that the noise features obtained by the noise removal module have a good degree of discrimination.Experiments were also conducted on several public datasets, and the proposed method achieves an accuracy of 98.32% on the Celeb-DF dataset, 92.61% on the DFDC dataset, and more than 94% on the FaceForensics++ dataset, thus proving the effectiveness of the proposed method.…”
Get full text
Article -
371
Audio classification using grasshopper‐ride optimization algorithm‐based support vector machine
Published 2021-08-01“…Abstract The accurate and robust detection of the audio has been widely grown as the speech technology in the area of audio forensics, speech recognition, and so on. However, in real time, it is a challenge to deal with the massive data arriving from distributed sources. …”
Get full text
Article -
372
Face super-resolution via iterative collaboration between multi-attention mechanism and landmark estimation
Published 2024-12-01“…Abstract Face super-resolution technology can significantly enhance the resolution and quality of face images, which is crucial for applications such as surveillance, forensics, and face recognition. However, existing methods often fail to fully utilize multi-scale information and facial priors, resulting in poor recovery of facial structures in complex images. …”
Get full text
Article -
373
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01“…In the era of deepfakes and AI-generated content, digital image manipulation poses significant challenges to image authenticity, creating doubts about the credibility of images. Traditional image forensics techniques often struggle to detect sophisticated tampering, and passive detection approaches are reactive, verifying authenticity only after counterfeiting occurs. …”
Get full text
Article -
374
Leveraging deep feature learning for handwriting biometric authentication
Published 2024-03-01“…The authentication of writers through handwritten text stands as a biometric technique with considerable practical importance in the field of document forensics and literary history. The verification process involves a meticulous examination of the questioned handwriting in comparison to the genuine handwriting of a known writer, aiming to determine whether a shared authorship exists. …”
Get full text
Article -
375
Comparative Analysis of the Full-Length Genome Sequence of a Clinical Isolate of Human Parainfluenza Virus 4B
Published 2012-01-01“…To gain better insights on hPIV-4B, and to test methods that we are developing for viral forensics, the entire genomic sequence of our virus was determined from archived RNA. …”
Get full text
Article -
376
A Multi-Granularity Features Representation and Dimensionality Reduction Network for Website Fingerprinting
Published 2025-01-01“…Website fingerprinting (WF) refers to the identification of target websites accessed by users in anonymous communication scenarios, playing a critical role in cybercrime investigation and forensics. In recent years, deep learning-based WF has become a research focus in this field. …”
Get full text
Article -
377
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation
Published 2025-01-01Get full text
Article -
378
Trajectory of human migration: insights from autosomal and non-autosomal variant clustering patterns
Published 2025-03-01“…These genetic variations have long been used as ancestry informative markers (AIMs) in forensics and evolutionary studies, primarily because of their uniparental inheritance and lack of recombination, despite the fact that gender-specific gene flow and socio-cultural practices may cause discrepancies. …”
Get full text
Article -
379
Quantum-Based Feature Selection for Multiclassification Problem in Complex Systems with Edge Computing
Published 2020-01-01Get full text
Article -
380
Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection
Published 2024-11-01“…We achieve the AUC of 99.70% and 90.71% on FaceForensics++ and WildDeepfake datasets. The generalization experiments on Celeb-DF-v2 and WildDeepfake datasets achieve the AUC of 80.16% and 65.15%. …”
Get full text
Article