Academic literature on the topic 'Digital forgery'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital forgery.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital forgery"

1

Sarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.

Full text
Abstract:
<em>Forgery is the criminal act that provides misleading information about a product or service. It is the process of making, adapting, or imitating documents or objects with the intent to deceive. Digital forgery (or digital tampering) is the process of manipulating documents or images for the intent of financial, social or political gain. This paper provides a brief introduction to the digital forgery.</em>
APA, Harvard, Vancouver, ISO, and other styles
2

Liang, Yu, Yadong Yu, Yina Wang, Dunjun Li, and Zejiong Zhou. "Counterfeiting in Depth Synthesis based on Digital Watermarking." Frontiers in Computing and Intelligent Systems 5, no. 3 (2023): 100–106. http://dx.doi.org/10.54097/fcis.v5i3.13998.

Full text
Abstract:
The purpose of this paper is to discuss and apply digital watermarking technology to solve the forgery problem in depth synthesis. With the rapid development of deep synthesis technology and its application in various fields, it is particularly important to protect the authenticity and integrity of digital content. Based on the understanding of digital watermarking, this paper explores an experimental design, which uses watermarking embedding and extraction algorithms and forgery detection technology to solve the problem of deep forgery, protect the copyright, integrity and anti-copy of digita
APA, Harvard, Vancouver, ISO, and other styles
3

Nirosha, Kandukuri. "Digital Image Forgery Detection Using Convolutional Neural Network." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 456–65. https://doi.org/10.22214/ijraset.2025.67285.

Full text
Abstract:
Digital images are a main source of shared information in social media. Digital image forgery has become a growing concern with the advancement of image editing tools, leading to the spread of misleading and manipulated content. Detecting such forgeries is crucial for ensuring the authenticity and reliability of digital images. Various digital image forgery detection techniques are tied to detecting only one type of forgery, such as image splicing or copy-move it is not applied in real life. To enhance digital image forgery detection using deep learning techniques via transfer learning is unco
APA, Harvard, Vancouver, ISO, and other styles
4

Hussien, Nadheer Younus, Rasha O. Mahmoud, and Hala Helmi Zayed. "Deep Learning on Digital Image Splicing Detection Using CFA Artifacts." International Journal of Sociotechnology and Knowledge Development 12, no. 2 (2020): 31–44. http://dx.doi.org/10.4018/ijskd.2020040102.

Full text
Abstract:
Digital image forgery is a serious problem of an increasing attention from the research society. Image splicing is a well-known type of digital image forgery in which the forged image is synthesized from two or more images. Splicing forgery detection is more challenging when compared with other forgery types because the forged image does not contain any duplicated regions. In addition, unavailability of source images introduces no evidence about the forgery process. In this study, an automated image splicing forgery detection scheme is presented. It depends on extracting the feature of images
APA, Harvard, Vancouver, ISO, and other styles
5

Lovepreet, Kaur*1 &. Sandeep Singh Dhaliwal2. "COPY MOVE FORGERY DETECTION IN DIGITAL IMAGES USING IMPROVED SIFT (I-SIFT) APPROACH." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 9, no. 3 (2020): 6–12. https://doi.org/10.5281/zenodo.3700407.

Full text
Abstract:
With this across the board use of computerized pictures, notwithstanding the expanding number of instruments and programming of advanced pictures altering, it has ended up being definitely not hard to control and change the genuine information of the image. Existing system for forgery detection has many problems like maximum angle that existing system can detect is 40 degree rotation. Existing systems cannot detect forgery if duplicate content is compressed or enhanced. In the proposed system, we have developed a novel approach namedI-SIFT for copy move forgery detection that can detect the co
APA, Harvard, Vancouver, ISO, and other styles
6

Vaishali Sharma. "Ensuring Visual Integrity: Deep Learning-Based Solutions for Authentic Image Forgery Detection." Journal of Electrical Systems 20, no. 11s (2024): 3491–508. https://doi.org/10.52783/jes.8129.

Full text
Abstract:
Digital image manipulation has become increasingly prevalent with the advancement of image editing tools, posing significant challenges in digital forensics. Detecting and localizing two common types of image forgery copy-move forgery and spliced image forgery remains a critical task. This paper proposes an approach that leverages EfficientFormer for forgery detection and BCU-Net with a spatial attention mechanism for localization. EfficientFormer is used to classify images as forged or original, while BCU-Net precisely identifies and localizes the forged regions. The study utilizes well-known
APA, Harvard, Vancouver, ISO, and other styles
7

Mr. M. Sasikanth, Ms M. Sri Siva Sravani Devi, Ms K. Bindu Madhavi, Mr V. Vigneswara Rao, and Mr. J. Prudhvi. "Digital Image Forgery Detection using Hierarchical Learning." Journal of Nonlinear Analysis and Optimization 16, no. 01 (2025): 1186–94. https://doi.org/10.36893/jnao.2025.v16i01.0139.

Full text
Abstract:
Digital image forgery has emerged as a critical challenge in the digital era, with deep learning techniques offering promising solutions for detecting manipulated images. This paper presents a comprehensive approach to image forgery detection using convolutional neural networks (CNNs) and deep learning models such as ResNet, EfficientNet, and Vision Transformers (ViTs). The methodology involves dataset preprocessing, feature extraction, and classification of forged versus authentic images. Performance evaluation metrics such as accuracy, precision, recall, and F1-score are used to compare diff
APA, Harvard, Vancouver, ISO, and other styles
8

SU, YUTING, JING ZHANG, YU HAN, JING CHEN, and QINGZHONG LIU. "EXPOSING DIGITAL VIDEO LOGO-REMOVAL FORGERY BY INCONSISTENCY OF BLUR." International Journal of Pattern Recognition and Artificial Intelligence 24, no. 07 (2010): 1027–46. http://dx.doi.org/10.1142/s0218001410008317.

Full text
Abstract:
A novel approach for detecting video logo-removal forgery is proposed by measuring inconsistency of blur. Our approach is based on the assumption that if a digital video undergoes logo-removal forgery; the blurriness of the forged region is expected to be different as compared to the nontampered parts of the video. Blurriness is first estimated by analyzing the spatial and temporal statistical property of logo areas, and suspicious areas are roughly located; then features are extracted and a fine classification is implemented by applying support vector machine (SVM) to extract features. If the
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Anil. "A New Copy Move Forgery Detection Technique using Adaptive Over-segementation and Feature Point Matching." Bulletin of Electrical Engineering and Informatics 7, no. 3 (2018): 345–49. http://dx.doi.org/10.11591/eei.v7i3.754.

Full text
Abstract:
With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copy-move or splicing, resampling a digital image (stretch, rotate, resize), removal
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Anil. "A New Copy Move Forgery Detection Technique Using Adaptive Over-segementation and Feature Point Matching." Bulletin of Electrical Engineering and Informatics 7, no. 3 (2018): 345–49. https://doi.org/10.11591/eei.v7i3.754.

Full text
Abstract:
With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copymove or splicing, resampling a digital image (stretch, rotate, resize), removal a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Digital forgery"

1

Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.

Full text
Abstract:
The ready availability of image-editing software makes it important to ensure the authenticity of images. This thesis concerns the detection and localization of cloning, or Copy-Move Forgery (CMF), which is the most common type of image tampering, in which part(s) of the image are copied and pasted back somewhere else in the same image. Post-processing can be used to produce more realistic doctored images and thus can increase the difficulty of detecting forgery. This thesis presents three novel methods for CMF detection, using feature extraction, surface fitting and segmentation. The Dense Sc
APA, Harvard, Vancouver, ISO, and other styles
2

Lê, Thi Ai Nhàn. "Statistical Modeling for Detection of Digital Image Forgery." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0046.

Full text
Abstract:
À l’ère du numérique, la crédibilité du contenu des images est une préoccupation majeure en raison de la popularité des outils d’édition faciles à utiliser et peu coûteux. Les images falsifiées peuvent être utilisées pour manipuler l’opinion publique lors des élections, commettre des fraudes et discréditer ou faire chanter des personnes. Face à cette situation préoccupante, nous développons dans cette thèse trois techniques efficaces basées sur (i) les traces de dématriçage (ii) les traces de compression JPEG, et (iii) les traces de rééchantillonnage pour détecter les images falsifiées et loca
APA, Harvard, Vancouver, ISO, and other styles
3

Swanepoel, Jacques Philip. "Digital signatures." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/98042.

Full text
Abstract:
Thesis (PhD)--Stellenbosch University, 2015<br>AFRIKAANSE OPSOMMING : In hierdie verhandeling stel ons 'n nuwe strategie vir outomatiese handtekening-verifikasie voor. Die voorgestelde raamwerk gebruik 'n skrywer-onafhanklike benadering tot handtekening- modellering en is dus in staat om bevraagtekende handtekeninge, wat aan enige skrywer behoort, te bekragtig, op voorwaarde dat minstens een outentieke voorbeeld vir vergelykingsdoeleindes beskikbaar is. Ons ondersoek die tradisionele statiese geval (waarin 'n bestaande pen-op-papier handtekening vanuit 'n versyferde dokument onttrek word
APA, Harvard, Vancouver, ISO, and other styles
4

Mahfoudi, Gaël. "Authentication of Digital Images and Videos." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0043.

Full text
Abstract:
Les médias digitaux font partie de notre vie de tous les jours. Après des années de photojournalisme, nous nous sommes habitués à considérer ces médias comme des témoignages objectifs de la réalité. Cependant les logiciels de retouches d'images et de vidéos deviennent de plus en plus puissants et de plus en plus simples à utiliser, ce qui permet aux contrefacteurs de produire des images falsifiées d'une grande qualité. L'authenticité de ces médias ne peut donc plus être prise pour acquise. Récemment, de nouvelles régulations visant à lutter contre le blanchiment d'argent ont vu le jour. Ces ré
APA, Harvard, Vancouver, ISO, and other styles
5

Iacovone, Michael Dax. "Memories We Forget." VCU Scholars Compass, 2005. http://hdl.handle.net/10156/1875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Koch, Frank Henry Jr. "A Comparison of Digital Vegetation Mapping and Image Orthorectification Methods Using Aerial Photography of Valley Forge National Historical Park." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010417-180334.

Full text
Abstract:
<p>In recent years, mapping software utilizing scanned?or ?softcopy??aerial photographs has become widely available. Using scanned photos of Valley Forge (PA) National Historical Park, I explored some of the latest tools for image processing and computer-based vegetation mapping. My primary objective was to compare different approaches for their efficiency and accuracy. In keeping with the USGS-NPS Vegetation Mapping Program protocol, I classified the park?s vegetation according to The Nature Conservancy?s National Vegetation Classification System (NVCS).<p>Initially, I scanned forty-nine 1:60
APA, Harvard, Vancouver, ISO, and other styles
7

Natour, Jamal, and Rewa Leila Anabtawi. "To download a movie or to buy fake branded clothes? : a study of consumers’ attitudes towards counterfeited and pirated products." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-9797.

Full text
Abstract:
Purchasing counterfeited luxury products and downloading pirated items have becomemore common nowadays. Fashion and IT industries are affected negatively by consumers’supportive attitude towards piracy and counterfeits. Many luxury branded companies havetheir exclusive brand names stolen by counterfeits producers. Likewise producers ofcomputer software, music, and movies are affected by individuals who download/streamtheir items for free. Consumers’ attitudes towards counterfeiting and piracy are importantto examine as to understand their acceptance and rejection towards counterfeits and pirac
APA, Harvard, Vancouver, ISO, and other styles
8

Andersson, Elsa, Moa Strömland, and Catherine Quassdorf. "Microinteractions: Don’t forget to raise your hand! : A qualitative study concerning microinteractions in digital meeting platforms and the impact they have on workflow efficiencies in the creative industry." Thesis, Jönköping University, JTH, Avdelningen för datateknik och informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-53487.

Full text
Abstract:
This research paper studies the extent of how microinteractions are utilized in Microsoft Teams and the impact that they have on workflow efficiencies, specifically in the creative industry. In a novel time where Covid-19 virus has increased the demand of digital platforms, the importance of research within remote meeting utilization, and the interaction possibilities within, is of utter importance. Also, since we are missing out on the spontaneous interactions that occur when meeting face-to-face, the microinteractions within digital meeting platforms now carry a heavier weight when interacti
APA, Harvard, Vancouver, ISO, and other styles
9

Abecidan, Rony. "Stratégies d'apprentissage robustes pour la détection de manipulation d'images." Electronic Thesis or Diss., Centrale Lille Institut, 2024. http://www.theses.fr/2024CLIL0025.

Full text
Abstract:
Aujourd'hui, la manipulation d'images à des fins non éthiques est courante, notamment sur les réseaux sociaux et dans la publicité. Les utilisateurs malveillants peuvent par exemple créer des images synthétiques convaincantes pour tromper le public ou dissimuler des messages dans des images numériques, posant des risques pour la sécurité nationale. Les chercheurs en analyse forensique d'image travaillent donc avec les forces de l'ordre pour détecter ces manipulations. Les méthodes d'analyse forensique les plus avancées utilisent notamment des réseaux neuronaux convolutifs pour les détecter. Ce
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Biing-Jang, and 陳炳彰. "Time-Stamped Digital Signatures against Forgery." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/23265863679022155270.

Full text
Abstract:
碩士<br>朝陽大學<br>資訊管理系碩士班<br>87<br>While a digital signature was generated, the signer merely used his own secret key to sign a document. Later, the verifier used the signer's public key to authenticate the truthfulness and the identity of the signature's owner. But the signer could deny the signature by declaring that he lost his secret key. Owing to the problem of repudiation, some extra information must be appended into the signature to strength the undeniability. A new digital signature scheme attached a time-stamp which is fair and unchangeable is proposed in this thesis. According to the ad
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Digital forgery"

1

Autotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. IEEE, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Potter, Whitney. Digital Temperature Control for the Blacksmith Forge. CreateSpace Independent Publishing Platform, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sen, D. Understanding Digital Music and Sound Forge 6. BPB Publications, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Instant Sound Forge. CMP Books, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garrigus, Scott R. Sound Forge Power. Laxmi Publications, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cowhey, Peter F., and Jonathan D. Aronson. Data Privacy. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0008.

Full text
Abstract:
Chapter 8 lays out the political economic trade-offs in privacy protection designs and their implications for the types of privacy risks and constraints on innovations. To delve more deeply, it then contrasts the U.S. and EU approaches. This leads into an analysis of the protracted U.S.–EU disputes on privacy safeguards and the efforts to forge international agreements on privacy protection forged at the Organization for Economic Cooperation and Development and the Asia-Pacific Economic Cooperation. The most promising initiatives will require a significant role for global civil society in gove
APA, Harvard, Vancouver, ISO, and other styles
7

Erdogan, Nezih, and Ebru Kayaalp. Exploring Past Images in a Digital Age. Amsterdam University Press, 2023. http://dx.doi.org/10.5117/9789463723442.

Full text
Abstract:
Film archives are fast spreading around the world, and with them issues surrounding archival digitisation, artistic appropriation, and academic reinterpretation of film material that demand scholarly attention. Exploring Past Images in a Digital Age: Reinventing the Archive aims to fill this demand with a thought-provoking collection of original articles contributed by renowned scholars, archivists, and artists. It urges the reader to “forget” standard ways of thinking about film archives and come to grips with the challenges of analysing and recontextualising an area in transit from the analo
APA, Harvard, Vancouver, ISO, and other styles
8

Livingstone, Sonia, and Alicia Blum-Ross. Parenting for a Digital Future. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190874698.001.0001.

Full text
Abstract:
In the decades it takes to bring up a child, parents face challenges that are both helped and hindered by the fact that they are living through a period of unprecedented digital innovation. Drawing on extensive research with parents both rich and poor, parenting toddlers to teenagers, this book reveals how digital technologies give parenting struggles a distinctive character, as parents determine how to forge new territory with little precedent, or support. It argues that, in late modernity, parents are both more burdened with responsibilities and yet increasingly charged with respecting and d
APA, Harvard, Vancouver, ISO, and other styles
9

Subramaniam, Mohan. The Future of Competitive Strategy. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/14129.001.0001.

Full text
Abstract:
How legacy firms can combine their traditional strengths with the power of data and digital ecosystems to forge a new competitive strategy for the digital era. How can legacy firms remain relevant in the digital era? In The Future of Competitive Strategy, strategic management expert Mohan Subramaniam explains how firms can leverage both their traditional strengths and the modern-day power of data and digital ecosystems to forge a new competitive strategy. Drawing on the experiences of a range of companies, including Caterpillar, Sleep Number, and Whirlpool, he explains how firms can benefit fr
APA, Harvard, Vancouver, ISO, and other styles
10

Hite, J. C., and Karen Hite. Digital Agency Hacker: Forget Theory! Tactical Wisdom from an INC 5000 Agency. Stepup Strategies, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Digital forgery"

1

Bleumer, Gerrit. "Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_206-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bleumer, Gerrit. "Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bleumer, Gerrit. "Existential Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_202-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bleumer, Gerrit. "Selective Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_225-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bleumer, Gerrit. "Existential Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bleumer, Gerrit. "Selective Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Roy, Aniket, Rahul Dixit, Ruchira Naskar, and Rajat Subhra Chakraborty. "Copy-Move Forgery Detection in Transform Domain." In Digital Image Forensics. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-7644-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Roy, Aniket, Rahul Dixit, Ruchira Naskar, and Rajat Subhra Chakraborty. "Copy-Move Forgery Detection Exploiting Statistical Image Features." In Digital Image Forensics. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-7644-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Wan, Xinghao Jiang, Shilin Wang, Meng Wan, and Tanfeng Sun. "Identifying Video Forgery Process Using Optical Flow." In Digital-Forensics and Watermarking. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43886-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hel-Or, Hagit, and Ido Yerushalmy. "Camera-Based Image Forgery Detection." In Handbook of Digital Forensics of Multimedia Data and Devices. John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118705773.ch14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital forgery"

1

Kumar, B. Pavan, V. M. Vinayagam, S. A. Babu, C. Guruparthasarthi, G. Janardhan, and M. Deepthi. "Digital Image Forgery Detection Using Deep Learning." In 2024 2nd World Conference on Communication & Computing (WCONF). IEEE, 2024. http://dx.doi.org/10.1109/wconf61366.2024.10692152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kolekar, Sachin M., Aarti P. Pimpalkar, Rahul P. More, Sumit A. Hirve, Mayuresh B. Gulame, and Nilesh N. Thorat. "Digital Image Tamper-Forgery Detection in Security." In 2024 2nd International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC). IEEE, 2024. https://doi.org/10.1109/icmacc62921.2024.10894413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmad, Shujaa, and Bindu Verma. "Forgery Detection in Digital Images Using CNN and ELA." In 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N). IEEE, 2024. https://doi.org/10.1109/icac2n63387.2024.10895131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Nan, Xin Wang, Kun Wang, and Xu Zhang. "Video inter-frame forgery detection based on CNN and ViT." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thorat, Nilesh N., Prashant Dhotre, Nilesh Kulal, Aarti P. Pimpalkar, Vijaya S. Patil, and Sachin M. Kolekar. "Tamper-forgery Image Detection in Security Digital Image: A Review." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sucith, R., P. Mathiazhagan, M. Ajith, and G. Lingesh. "Deep Learning Approaches for Detecting Forgery Attacks on Digital Images." In 2025 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2025. https://doi.org/10.1109/ickecs65700.2025.11035693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nampoothiri, V. Parameswaran, and N. Sugitha. "Digital image forgery — A threaten to digital forensics." In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, 2016. http://dx.doi.org/10.1109/iccpct.2016.7530370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Battiato, Sebastiano, and Giuseppe Messina. "Digital forgery estimation into DCT domain." In the First ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1631081.1631091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Murali, S., Basavaraj S. Anami, and Govindraj B. Chittapur. "Detection of digital photo image forgery." In 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT). IEEE, 2012. http://dx.doi.org/10.1109/icaccct.2012.6320754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mashatan, Atefeh, and Khaled Ouafi. "Forgery-resilience for digital signature schemes." In the 7th ACM Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2414456.2414469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!