نتایج جستجو برای: forgery

تعداد نتایج: 1967  

2014
Resmi Sekhar Chithra A. S Judith Redi Wiem Taktak Jean-Luc Dugelay Pravin Kakar I. Amerini S. Bravo-Solorio A. K. Nandi

Photographs are taken as valid evidences in various scenarios of our day to day life. Because of the developments in the field of Image Processing, altering images according to ones need is not a difficult task. Techniques of Image Forensics play its crucial role at this juncture. One of the mostly found types of image tampering is Copy-Move forgery. A copy-move forgery is performed by copying ...

2014
K. Hemalatha M. Anitha N. Pushpalatha

A defective method or a robust hashing method is developed for detecting forgery which includes removal, insertion and replacement of objects and abnormal color modifications and locating the forged area, and tells the nature of forgery. This undesirable method is used both globally and locally. The local feature represents position and texture information of salient regions in the image, and i...

2014
Thomas Peyrin Lei Wang

In this article, we study the security of iterative hash-based MACs, such as HMAC or NMAC, with regards to universal forgery attacks. Leveraging recent advances in the analysis of functional graphs built from the iteration of HMAC or NMAC, we exhibit the very first generic universal forgery attack against hash-based MACs. In particular, our work implies that the universal forgery resistance of ...

2008
Sachin Gupta Anoop Namboodiri

Text-dependent writer verification systems are preferred over text-independent systems due to the accuracy they achieve with small amount of data. However, text-dependent systems are prone to forgery. This paper proposes a novel boosting based framework for writerspecific text generation to increase the accuracy and a method of text variation to make the system robust to forgery. The approach i...

2016
Bihan Wen Ye Zhu Subramanian Ramanathan Tian-Tsong Ng Xuanjing Shen Stefan Winkler

We present COVERAGE – a novel database containing copymove forged images and their originals with similar but genuine objects. COVERAGE is designed to highlight and address tamper detection ambiguity of popular methods, caused by self-similarity within natural images. In COVERAGE, forged–original pairs are annotated with (i) the duplicated and forged region masks, and (ii) the tampering factor/...

Journal: :Storicamente 2022

Storicamente: rivista scientifica di storia, open access, supportata dal Dipartimento Storia Culture Civiltà dell'Università Bologna. contemporanea, moderna, medievale, antica, antropologia e geografia

Journal: :Journal of Criminal Law and Criminology (1931-1951) 1937

Journal: :Journal of Criminal Law and Criminology (1931-1951) 1944

Journal: :IEEE Access 2022

Recently, digital images have become used in many applications, where they the focus of image processing researchers. Image forgery represents one hot topic on which researchers prioritize their studies. We concentrate copy-move as a deceptive type. In forgery, part an is copied and placed same to produce image. This paper proposes accurate convolutional neural network(CNN) architecture for eff...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید