نتایج جستجو برای: forgery
تعداد نتایج: 1967 فیلتر نتایج به سال:
In this era of digital computing, peoples are used to represent the information that they want to convey in visual forms. Representing in visual forms rather than in pure text form make them more understandable. Digital camera images are used in several important applications in the recent decades. But with widespread availability of image processing and editing software make the integrity of d...
Due to the availability of powerful image editing softwares, forgers can tamper the image content easily. There are various types of image forgery, such as image splicing and region duplication forgery. Region duplication is one of the most common manipulations used for tampering digital images. It is vital in image forensics to authenticate the digital image. In this paper, a novel region dupl...
Most of researches on image forensics have been mainly focused on detection of artifacts introduced by a single processing tool. They lead in the development of many specialized algorithms looking for one or more particular footprints under specific settings. Naturally, the performance of such algorithms are not perfect, and accordingly the provided output might be noisy, inaccurate and only pa...
Er. Saiqa Khan Er. Arun Kulkarni Computer Engineering Dept., Information Technology Dept., M.H Saboo Siddik College Of Engg., Thadomal Shahani Engineering College., Mumbai, India Mumbai, India Abstract—Copy-Move forgery is a specific type of image forgery, in which a part of digital image is copied and pasted to another part in the same image. This paper describes blind forensics approach for d...
In today's time because of less-cost and more-resolution digital cameras, there is ample amount of digital images across globe. Digital images have a crucial presence in specific domains like in insurance process, forensic lab work, monitoring systems, services of intelligence, medical imaging and journalism. The most needed requirement is the images we see should be authentic. With the availab...
A robust method for local image region feature description based on step sector statistics is proposed in this paper. The means and the standard deviations along the radial direction of the circle image region are extracted through the sector masks, and the rearrangement of these statistics makes this image region description method rotation-robust. The proposed description method is applied in...
The security of two message authentication code (MAC) algorithms is considered: the MD5-based envelope method (RFC 1828), and the banking standard MAA (ISO 8731–2). Customization of a general MAC forgery attack allows improvements in both cases. For the envelope method, the forgery attack is extended to allow key recovery; for example, a 128-bit key can be recovered using 2 known text-MAC pairs...
hundreds of stray coins are being donated every year to different iranian museums but it is difficult to establish their authenticities due to lack of knowledge about places of their findings. part of these stray metallic pieces is related to parthians. due to their lengthy rule, of about five centuries, parthian coins form important part of numismatic collection at the museums. authors have ta...
The purpose of this paper is the assessment of a family of shape factors for oo-line signature veriication. The initial method, suggested in 1], which extracts geometric features, is modiied to assess the performance of veriication in the general case of forgery. W e c o n-tribute to the information coded by adapting the coding method to the image and by i n tegrating a spatial distance into th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید