Academic literature on the topic 'Digital tampering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital tampering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Digital tampering"
Shen, Jingyi, Yun Yao, and Hao Mei. "Design of Image Copy-Paste Forensics System Based on Moment Invariants." International Journal for Innovation Education and Research 9, no. 11 (2021): 552–55. http://dx.doi.org/10.31686/ijier.vol9.iss11.3547.
Full textChang, Yu Hong. "Based on Digital Image Forensics Double JPEG Compression Algorithm." Advanced Materials Research 1044-1045 (October 2014): 1098–101. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1098.
Full textFreiling, Felix, and Leonhard Hösch. "Controlled experiments in digital evidence tampering." Digital Investigation 24 (March 2018): S83—S92. http://dx.doi.org/10.1016/j.diin.2018.01.011.
Full textAminu, Ali Ahmad, and Nwojo Nnanna Agwu. "General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP)." Signal & Image Processing : An International Journal 12, no. 2 (2021): 13–32. http://dx.doi.org/10.5121/sipij.2021.12202.
Full textTang, Bin, Mengyao Sun, Haowen Zheng, Haiyun Han, and Yu Jin. "Analysis of Digital Media Image Tampering and Forgery Control." Transactions on Computer Science and Intelligent Systems Research 5 (August 12, 2024): 1073–77. http://dx.doi.org/10.62051/f9e87g27.
Full textWei, Wang, and Tang Bin. "Analysis on Feasible Methods of Digital Image Tampering Detection." Highlights in Science, Engineering and Technology 44 (April 13, 2023): 371–76. http://dx.doi.org/10.54097/hset.v44i.7386.
Full textMualfah, Desti, Yoze Rizki, and Meiriladiwis Gea. "Analisis Digital Forensik Keaslian Video Rekaman CCTV Menggunakan Metode Localization Tampering." Jurnal CoSciTech (Computer Science and Information Technology) 3, no. 1 (2022): 43–51. http://dx.doi.org/10.37859/coscitech.v3i1.3697.
Full textMainoo, Bernard. "Digital Multimedia Tampering Detection for Forensics Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 81–90. http://dx.doi.org/10.22624/aims/crp-bk3-p14.
Full textSchneider, Janine, Linus Düsel, Benedikt Lorch, Julia Drafz, and Felix Freiling. "Prudent design principles for digital tampering experiments." Forensic Science International: Digital Investigation 40 (April 2022): 301334. http://dx.doi.org/10.1016/j.fsidi.2022.301334.
Full textParashar, Nishtha, and Nirupama Tiwari. "A Survey Of Digital Image Tampering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 8, no. 10 (2015): 91–96. http://dx.doi.org/10.14257/ijsip.2015.8.10.10.
Full textDissertations / Theses on the topic "Digital tampering"
Nyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.
Full textAbecidan, Rony. "Stratégies d'apprentissage robustes pour la détection de manipulation d'images." Electronic Thesis or Diss., Centrale Lille Institut, 2024. http://www.theses.fr/2024CLIL0025.
Full textHsiao, Dun-Yu. "Digital Image Tampering Synthesis and Identification." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2207200517502800.
Full textHsiao, Dun-Yu, and 蕭敦育. "Digital Image Tampering Synthesis and Identification." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/11083859577614039919.
Full textWang, Yin-Liang, and 王尹良. "Study of probability-based tampering authentication scheme for digital images." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/55w4hc.
Full textLiu, Li-Jen, and 劉立仁. "The Detection of Visual Secret ShadowCheating and Digital Image Tampering." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/27727060986799355416.
Full textChiu, Shian-Ren, and 邱顯仁. "Study of Hierarchical Tampering Detection and Recovery Schemes for Digital Images." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/80485277939778786629.
Full textHung, Hsiao-Ying, and 洪筱盈. "A Wavelet Transform Based Digital Watermarking for Image Authentication and Tampering Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/18594281413291160363.
Full textWu, Hsien-Chu, and 吳憲珠. "Copyright Protection Techniques for Digital Images and Their Applications to Tampering Proof and Recovery." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/79884372922665844243.
Full textChiu, Yen-Chung, and 邱彥中. "A Study on Digital Watermarking and Authentication of Images for Copyright Protection And Tampering Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/89084112095535503685.
Full textBooks on the topic "Digital tampering"
Book chapters on the topic "Digital tampering"
Tanasi, Alessandro. "Photo Manipulation: Software to Unmask Tampering." In Digital Investigative Journalism. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97283-1_17.
Full textCao, Hong, and Alex C. Kot. "Detection of Tampering Inconsistencies on Mobile Photos." In Digital Watermarking. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18405-5_9.
Full textWang, Wei, Jing Dong, and Tieniu Tan. "A Survey of Passive Image Tampering Detection." In Digital Watermarking. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03688-0_27.
Full textXu, Guanshuo, Jingyu Ye, and Yun-Qing Shi. "New Developments in Image Tampering Detection." In Digital-Forensics and Watermarking. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19321-2_1.
Full textAsaad, Aras, and Sabah Jassim. "Topological Data Analysis for Image Tampering Detection." In Digital Forensics and Watermarking. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64185-0_11.
Full textChen, Luyi, Shilin Wang, Shenghong Li, and Jianhua Li. "Countering Universal Image Tampering Detection with Histogram Restoration." In Digital Forensics and Watermaking. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40099-5_23.
Full textSingleton, Mitchell B., and Qingzhong Liu. "Detecting Digital Photo Tampering with Deep Learning." In Machine Learning and Intelligent Communications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00557-3_47.
Full textSutthiwan, Patchara, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, and Wei Su. "Markovian Rake Transform for Digital Image Tampering Detection." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24556-5_1.
Full textChen, Luyi, Shilin Wang, Shenghong Li, and Jianhua Li. "New Feature Presentation of Transition Probability Matrix for Image Tampering Detection." In Digital Forensics and Watermarking. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32205-1_30.
Full textChakraborty, Sunen, Paramita Dey, and Kingshuk Chatterjee. "Digital Image Tampering Detection Using Deep Learning: A Survey." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2710-4_17.
Full textConference papers on the topic "Digital tampering"
Mo, Xiaolong, Huabiao Li, and Ruiwei Meng. "Research on the Application of Anti-tampering Technology in Digital Cultural Communication." In 2024 International Conference on Culture-Oriented Science & Technology (CoST). IEEE, 2024. http://dx.doi.org/10.1109/cost64302.2024.00029.
Full textZakey, Asmath, Dinura Bawantha, Dinuth Shehara, Nethmi Hasara, Kavinga Yapa Abeywardena, and Harinda Fernando. "A Dual-Branch CNN and Metadata Analysis Approach for Robust Image Tampering Detection." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012015.
Full textZhu, Nan, Kun Wang, and Xu Zhang. "Document image tampering detection and localization based on dual-path network with progressive supervision." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073213.
Full textChaugule, Swapnil S., and Dalila B. Megherbi. "An Image Security System for Digital Private Image Exchange Using Redundant Watermarks for Authentication, Information Hiding, Tampering Detection, and Data Self-Recovery with Partial Carrier Capacity Utilization." In NAECON 2024 - IEEE National Aerospace and Electronics Conference. IEEE, 2024. http://dx.doi.org/10.1109/naecon61878.2024.10670631.
Full textAli, Zain, Areej Ahmed, and Hafsa Bibi. "Innovative Approaches to Liquefaction Mitigation in Seismic Zones: A Comprehensive Overview." In 14th International Civil Engineering Conference. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-78q4kr.
Full textMall, Vinod, Kedar Bhatt, Suman K. Mitra, and Anil K. Roy. "Exposing structural tampering in digital images." In 2012 IEEE International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, 2012. http://dx.doi.org/10.1109/ispcc.2012.6224369.
Full textTeerakanok, Songpon, and Tetsutaro Uehara. "Digital Media Tampering Detection Techniques: An Overview." In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2017. http://dx.doi.org/10.1109/compsac.2017.109.
Full textARGHIRESCU, Sebastian-Alexandru. "Security of Digital Files: Audio Tampering Detection." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2024. http://dx.doi.org/10.19107/cybercon.2024.06.
Full textFan, Jiayuan, Tao Chen, and Jiuwen Cao. "Image tampering detection using noise histogram features." In 2015 IEEE International Conference on Digital Signal Processing (DSP). IEEE, 2015. http://dx.doi.org/10.1109/icdsp.2015.7252037.
Full textWang, Yulin, and Jian Zhao. "Asymmetric locating position of information hiding against tampering." In Second International Conference on Digital Image Processing. SPIE, 2010. http://dx.doi.org/10.1117/12.856010.
Full text