Showing 361 - 380 results of 964 for search '"forensics"', query time: 0.06s Refine Results
  1. 361
  2. 362

    Region Duplication Forgery Detection Technique Based on SURF and HAC by Parul Mishra, Nishchol Mishra, Sanjeev Sharma, Ravindra Patel

    Published 2013-01-01
    “…Region duplication forgery detection is a special type of forgery detection approach and widely used research topic under digital image forensics. In copy move forgery, a specific area is copied and then pasted into any other region of the image. …”
    Get full text
    Article
  3. 363

    A Solution to Reconstruct Cross-Cut Shredded Text Documents Based on Character Recognition and Genetic Algorithm by Hedong Xu, Jing Zheng, Ziwei Zhuang, Suohai Fan

    Published 2014-01-01
    “…This topic is relevant to the fields of forensics, investigative sciences, and archeology. …”
    Get full text
    Article
  4. 364

    Unknown presentation attack detection against rational attackers by Ali Khodabakhsh, Zahid Akhtar

    Published 2021-09-01
    “…Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real‐life settings. …”
    Get full text
    Article
  5. 365

    Revealing Traces of Image Resampling and Resampling Antiforensics by Anjie Peng, Yadong Wu, Xiangui Kang

    Published 2017-01-01
    “…Image resampling is a common manipulation in image processing. The forensics of resampling plays an important role in image tampering detection, steganography, and steganalysis. …”
    Get full text
    Article
  6. 366

    Starting with the Digital Doesn’t Make it Easier by Amanda Boczar

    Published 2025-01-01
    “…Unrealistic expectations of collection processing, retention, growth, and publication onto openly accessible platforms can quickly overwhelm a libraries’ digital collections’ team due to size, need for digital forensics work, copyright limitations, or other capacity-related issues. …”
    Get full text
    Article
  7. 367

    A dual-stream model based on PRNU and quaternion RGB for detecting fake faces. by Mohan Hua, Shuangliang Li, Jinwei Wang

    Published 2025-01-01
    “…The forensic examination of AIGC(Artificial Intelligence Generated Content) faces poses a contemporary challenge within the realm of color image forensics. …”
    Get full text
    Article
  8. 368

    Robust Face Detection and Identification under Occlusion using MTCNN and RESNET50 by Eiman Wahab, Wajeeha Shafique, Habiba Amir, Sameena Javed, Muhammad Marouf

    Published 2025-01-01
    “…Technologies are similar to digital forensics in that they can recognize people by scanning faces. …”
    Get full text
    Article
  9. 369
  10. 370

    Noise-attention-based forgery face detection method by Bolin ZHANG, Chuntao ZHU, Qilin YIN, Jingqiao FU, Lingyi LIU, Jiarui LIU, Hongmei LIU, Wei LU

    Published 2023-08-01
    “…With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise, posing a significant threat to multimedia security and social stability.Therefore, it is crucial to research detection methods for forged faces.Face tampering and forgery can occur through various means and tools, leaving different levels of forgery traces during the tampering process.These traces can be partly reflected in the image noise.From the perspective of image noise, the noise components reflecting tampering traces of forged faces were extracted through a noise removal module.Furthermore, noise attention was generated to guide the backbone network in the detection of forged faces.The training of the noise removal module was supervised using SRM filters.In order to strengthen the guidance of the noise removal module, the noise obtained by the noise removal module was added back to the real face image, forming a pair of supervised training samples in a self-supervised manner.The experimental results illustrate that the noise features obtained by the noise removal module have a good degree of discrimination.Experiments were also conducted on several public datasets, and the proposed method achieves an accuracy of 98.32% on the Celeb-DF dataset, 92.61% on the DFDC dataset, and more than 94% on the FaceForensics++ dataset, thus proving the effectiveness of the proposed method.…”
    Get full text
    Article
  11. 371

    Audio classification using grasshopper‐ride optimization algorithm‐based support vector machine by Suryabhan Pratap Singh, Umesh Chandra Jaiswal

    Published 2021-08-01
    “…Abstract The accurate and robust detection of the audio has been widely grown as the speech technology in the area of audio forensics, speech recognition, and so on. However, in real time, it is a challenge to deal with the massive data arriving from distributed sources. …”
    Get full text
    Article
  12. 372

    Face super-resolution via iterative collaboration between multi-attention mechanism and landmark estimation by Chang-Teng Shi, Meng-Jun Li, Zhi Yong An

    Published 2024-12-01
    “…Abstract Face super-resolution technology can significantly enhance the resolution and quality of face images, which is crucial for applications such as surveillance, forensics, and face recognition. However, existing methods often fail to fully utilize multi-scale information and facial priors, resulting in poor recovery of facial structures in complex images. …”
    Get full text
    Article
  13. 373

    A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression by Chen-Hsiu Huang, Ja-Ling Wu

    Published 2025-01-01
    “…In the era of deepfakes and AI-generated content, digital image manipulation poses significant challenges to image authenticity, creating doubts about the credibility of images. Traditional image forensics techniques often struggle to detect sophisticated tampering, and passive detection approaches are reactive, verifying authenticity only after counterfeiting occurs. …”
    Get full text
    Article
  14. 374

    Leveraging deep feature learning for handwriting biometric authentication by Parvaneh Afzali, Abdoreza Rezapour, Ahmad Rezaee Jordehi

    Published 2024-03-01
    “…The authentication of writers through handwritten text stands as a biometric technique with considerable practical importance in the field of document forensics and literary history. The verification process involves a meticulous examination of the questioned handwriting in comparison to the genuine handwriting of a known writer, aiming to determine whether a shared authorship exists. …”
    Get full text
    Article
  15. 375

    Comparative Analysis of the Full-Length Genome Sequence of a Clinical Isolate of Human Parainfluenza Virus 4B by John A. Lednicky, Thomas B. Waltzek, Micah D. Halpern, Sara B. Hamilton

    Published 2012-01-01
    “…To gain better insights on hPIV-4B, and to test methods that we are developing for viral forensics, the entire genomic sequence of our virus was determined from archived RNA. …”
    Get full text
    Article
  16. 376

    A Multi-Granularity Features Representation and Dimensionality Reduction Network for Website Fingerprinting by Yaojun Ding, Bingxuan Hu

    Published 2025-01-01
    “…Website fingerprinting (WF) refers to the identification of target websites accessed by users in anonymous communication scenarios, playing a critical role in cybercrime investigation and forensics. In recent years, deep learning-based WF has become a research focus in this field. …”
    Get full text
    Article
  17. 377
  18. 378

    Trajectory of human migration: insights from autosomal and non-autosomal variant clustering patterns by Samayeta Sarkar Tuli, Joyatry Sarker, Mrinmoy Saha Roddur, Anik Biswas, Reefa Nawar, Tahmina Akter, Md. Wahid Murad, Abu Ashfaqur Sajib

    Published 2025-03-01
    “…These genetic variations have long been used as ancestry informative markers (AIMs) in forensics and evolutionary studies, primarily because of their uniparental inheritance and lack of recombination, despite the fact that gender-specific gene flow and socio-cultural practices may cause discrepancies. …”
    Get full text
    Article
  19. 379
  20. 380

    Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection by Hanxian Duan, Qian Jiang, Xin Jin, Michal Wozniak, Yi Zhao, Liwen Wu, Shaowen Yao, Wei Zhou

    Published 2024-11-01
    “…We achieve the AUC of 99.70% and 90.71% on FaceForensics++ and WildDeepfake datasets. The generalization experiments on Celeb-DF-v2 and WildDeepfake datasets achieve the AUC of 80.16% and 65.15%. …”
    Get full text
    Article