نتایج جستجو برای: forgery
تعداد نتایج: 1967 فیلتر نتایج به سال:
Document forgery is an increasing problem for both private companies and public administrations. It can be said to represent the loss of time resources. There are many classical solutions these problems such as detection integrated security pattern. In cases, it important that we resort forensic techniques detection. The idea behind using also implemented artificial intelligence/machine learnin...
The development of powerful image editing software has made it easy to create visually convincing digital image forgeries. Recently some research works based on general low-level visual features in the field of digital image forensics have been conducted to address this problem. However, there has been little work by analyzing the high-level semantic content of the image. This paper discusses t...
The usage and market size of video event data recorders (VEDRs), also known as car black boxes, are rapidly increasing. Since VEDRs can provide more visual information about car accident situations than any other device that is currently used for accident investigations (e.g., closed-circuit television), the integrity of the VEDR contents is important to any meaningful investigation. Researcher...
Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise...
Image forgery is becoming more prevalent in our daily lives due to advances in computers and image-editing software. As forgers develop more sophisticated forgeries, researchers must keep up to design more advanced ways of detecting these forgeries. Copy-move forgery is one type of image forgery where one region of an image is copied to another region in an attempt to cover a potentially import...
With the powerful image editing tools available today, it is very easy to create forgeries without leaving visible traces. Boundaries between host image and forgery can be concealed, illumination changed, and so on, in a naive form of counter-forensics. For this reason, most modern techniques for forgery detection rely on the statistical distribution of micro-patterns, enhanced through high-lev...
As forgeries have become popular, the importance of forgery detection is much increased. Copy-move forgery, one of the most commonly used methods, copies a part of the image and pastes it into another part of the the image. In this paper, we propose a detection method of copy-move forgery that localizes duplicated regions using Zernike moments. Since the magnitude of Zernike moments is algebrai...
The invention of the web has introduced the incredible growth and developments within the noted analysis fields like medication, satellite imaging, processing of image, security, biometrics, and biological science. The algorithms applied in the twenty 21st century has created the human life easier and secure, but the security is a major concern in the digital image processing domain. A new stud...
Copy-move forgery is the most popular and simplest image manipulation method. In this type of forgery, an area from the image copied, then after post processing such as rotation and scaling, placed on the destination. The goal of Copy-move forgery is to hide or duplicate one or more objects in the image. Key-point based Copy-move forgery detection methods have five main steps: preprocessing, fe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید