Academic literature on the topic 'Digital tampering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital tampering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital tampering"

1

Shen, Jingyi, Yun Yao, and Hao Mei. "Design of Image Copy-Paste Forensics System Based on Moment Invariants." International Journal for Innovation Education and Research 9, no. 11 (2021): 552–55. http://dx.doi.org/10.31686/ijier.vol9.iss11.3547.

Full text
Abstract:
Copy-paste tampering is a common type of digital image tampering, which refers to copying a part of the image area in the same image, and then pasting it into another area of the image to generate a forged image, so as to carry out malicious operations such as fraud and framing. This kind of malicious forgery leads to the security problem of digital image. The research of digital image copy paste forensics has important theoretical significance and practical value. For digital image copy-paste tampering, this paper is based on moment invariant image copy paste tampering detection algorithm, an
APA, Harvard, Vancouver, ISO, and other styles
2

Chang, Yu Hong. "Based on Digital Image Forensics Double JPEG Compression Algorithm." Advanced Materials Research 1044-1045 (October 2014): 1098–101. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1098.

Full text
Abstract:
Means of digital image tampering diverse, new technical approach increasingly renovation, therefore, the detection of forged digital tampering issues are complex, and must not universal, once and for all solutions. In this paper, digital image tampering common practices through research, proposed a re-deposit operations for double JPEG image processing software compression testing technology method using image compression and decompression process lossy compression of images tamper with forensic, this method can play an effective role in the detection.
APA, Harvard, Vancouver, ISO, and other styles
3

Freiling, Felix, and Leonhard Hösch. "Controlled experiments in digital evidence tampering." Digital Investigation 24 (March 2018): S83—S92. http://dx.doi.org/10.1016/j.diin.2018.01.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aminu, Ali Ahmad, and Nwojo Nnanna Agwu. "General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP)." Signal & Image Processing : An International Journal 12, no. 2 (2021): 13–32. http://dx.doi.org/10.5121/sipij.2021.12202.

Full text
Abstract:
Digital image tampering detection has been an active area of research in recent times due to the ease with which digital image can be modified to convey false or misleading information. To address this problem, several studies have proposed forensics algorithms for digital image tampering detection. While these approaches have shown remarkable improvement, most of them only focused on detecting a specific type of image tampering. The limitation of these approaches is that new forensic method must be designed for each new manipulation approach that is developed. Consequently, there is a need to
APA, Harvard, Vancouver, ISO, and other styles
5

Tang, Bin, Mengyao Sun, Haowen Zheng, Haiyun Han, and Yu Jin. "Analysis of Digital Media Image Tampering and Forgery Control." Transactions on Computer Science and Intelligent Systems Research 5 (August 12, 2024): 1073–77. http://dx.doi.org/10.62051/f9e87g27.

Full text
Abstract:
In recent years, the continuous innovation of computer vision processing technology has greatly improved the quality of people's production and life, while the accompanying tampering risk has also gradually increased. There are frequent incidents of people with ulterior motives using computer image processing technology to tamper with digital media and falsifying and cheating others. This paper mainly analyzes the technology and method of digital media image tampering and forgery, the social harm caused by the resulting tampering risk, and puts forward the corresponding management countermeasu
APA, Harvard, Vancouver, ISO, and other styles
6

Wei, Wang, and Tang Bin. "Analysis on Feasible Methods of Digital Image Tampering Detection." Highlights in Science, Engineering and Technology 44 (April 13, 2023): 371–76. http://dx.doi.org/10.54097/hset.v44i.7386.

Full text
Abstract:
In order to solve the problem of image tampering detection in the blind forensics of digital images, this study first researches and summarizes the means and methods of image tampering and forgery, and provides suggestions for methods of tampering detection using open source tools for the methods that may be used for falsification. These methods have been publicly tested by open source companies for a long time, which proves their feasibility. The methods and conclusions suggested by the research can be used in the "falsification" application of pictures in many fields, and have certain academ
APA, Harvard, Vancouver, ISO, and other styles
7

Mualfah, Desti, Yoze Rizki, and Meiriladiwis Gea. "Analisis Digital Forensik Keaslian Video Rekaman CCTV Menggunakan Metode Localization Tampering." Jurnal CoSciTech (Computer Science and Information Technology) 3, no. 1 (2022): 43–51. http://dx.doi.org/10.37859/coscitech.v3i1.3697.

Full text
Abstract:
Video is one the valid evidence if the handling process is in accordance with digital forensic procedures. Closed circuit television is a video sourse that is often used as authentic evidence in court. The authenticity of the video is something that is often doubted by certain parties. For this reason, this discusses how to detect the authenticity of video as digital evidence by comparing the original video files and tampering video files resulting from attack frame addition and attack frame delection. The media info tool is used to analyze the metadata and the localization tampering method is
APA, Harvard, Vancouver, ISO, and other styles
8

Mainoo, Bernard. "Digital Multimedia Tampering Detection for Forensics Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 81–90. http://dx.doi.org/10.22624/aims/crp-bk3-p14.

Full text
Abstract:
In the virtual multimedia era, digital forensics is turning into a rising location of studies way to the huge quantity of picture and video documents generated. Ensuring the integrity of such media is of top-notch significance in lots of situations. This mission has end up extra complex, particularly with the development of symmetrical and asymmetrical community systems which make their authenticity tough. Consequently, it's far definitely vital to find out all feasible modes of manipulation through the improvement of latest forensics detector tools. For example, the symmetry and asymmetry inc
APA, Harvard, Vancouver, ISO, and other styles
9

Schneider, Janine, Linus Düsel, Benedikt Lorch, Julia Drafz, and Felix Freiling. "Prudent design principles for digital tampering experiments." Forensic Science International: Digital Investigation 40 (April 2022): 301334. http://dx.doi.org/10.1016/j.fsidi.2022.301334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Parashar, Nishtha, and Nirupama Tiwari. "A Survey Of Digital Image Tampering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 8, no. 10 (2015): 91–96. http://dx.doi.org/10.14257/ijsip.2015.8.10.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Digital tampering"

1

Nyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.

Full text
Abstract:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contrib
APA, Harvard, Vancouver, ISO, and other styles
2

Abecidan, Rony. "Stratégies d'apprentissage robustes pour la détection de manipulation d'images." Electronic Thesis or Diss., Centrale Lille Institut, 2024. http://www.theses.fr/2024CLIL0025.

Full text
Abstract:
Aujourd'hui, la manipulation d'images à des fins non éthiques est courante, notamment sur les réseaux sociaux et dans la publicité. Les utilisateurs malveillants peuvent par exemple créer des images synthétiques convaincantes pour tromper le public ou dissimuler des messages dans des images numériques, posant des risques pour la sécurité nationale. Les chercheurs en analyse forensique d'image travaillent donc avec les forces de l'ordre pour détecter ces manipulations. Les méthodes d'analyse forensique les plus avancées utilisent notamment des réseaux neuronaux convolutifs pour les détecter. Ce
APA, Harvard, Vancouver, ISO, and other styles
3

Hsiao, Dun-Yu. "Digital Image Tampering Synthesis and Identification." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2207200517502800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hsiao, Dun-Yu, and 蕭敦育. "Digital Image Tampering Synthesis and Identification." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/11083859577614039919.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電信工程學研究所<br>93<br>Have you ever edited some unsatisfied digital photographs of yours? If the answer is yes, then you have made some digital tampering. With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most of the time, digital tampering is not perceptible by human; however, some traces of digital tampering may be left in the media during the process. Based on this idea, several detection methods are proposed in this thesis to against various common digital
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Yin-Liang, and 王尹良. "Study of probability-based tampering authentication scheme for digital images." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/55w4hc.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊管理學系碩士班<br>97<br>In recent years, digital watermarking technology has been widely used for digital images of property rights protection and integrity authentication. Image integrity authentication is usually done by a fragile watermarking scheme, which means to embed an image of feature values as an authentication message. When authenticating image integrity, the embedded authentication message in the image is extracted for comparison with the image feature values to identify whether the image has been tampered with, and if so, locate the affected area. However, such authentica
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Li-Jen, and 劉立仁. "The Detection of Visual Secret ShadowCheating and Digital Image Tampering." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/27727060986799355416.

Full text
Abstract:
碩士<br>國立中正大學<br>資訊工程所<br>96<br>The communications through computer network are popular recently; therefore, the security problems of various image applications are getting much more important while transferring or passing images through the Internet. This thesis provided two methods for solving cheating problem in Visual Cryptography and detecting the tampering in digital images. Visual Cryptography (VC) has drawn much attention for providing the service of secret communication. Basically, VC is the process of encoding a secret into several meaningless shares and later decoding the secret by
APA, Harvard, Vancouver, ISO, and other styles
7

Chiu, Shian-Ren, and 邱顯仁. "Study of Hierarchical Tampering Detection and Recovery Schemes for Digital Images." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/80485277939778786629.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊管理學系碩士班<br>98<br>In recent years, digital watermarking technology has been widely used for protection and integrity authentication of digital images property rights. Image integrity authentication is usually accomplished with a fragile watermarking scheme, which means to embed an image of feature values as an authentication message. When image integrity needs to be authenticated, the embedded authentication message in the image is extracted for comparison with the image feature values to identify whether the image has been tampered with and to locate the affected area. However,
APA, Harvard, Vancouver, ISO, and other styles
8

Hung, Hsiao-Ying, and 洪筱盈. "A Wavelet Transform Based Digital Watermarking for Image Authentication and Tampering Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/18594281413291160363.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊管理研究所<br>92<br>The rapid expansion of the Internet and the recent advance of digital technologies have sharply increased the availability of digital media. In consequence, watermarking is developed as a suitable candidate for the ownership identification of digital data as it allows the invisible insertion of information with the imperceptible modification. This thesis is to investigate a wavelet based semi-fragile watermarking technique for image authentication and tampering detection. Image protection is achieved by the insertion of a secret wavelet tree based binary imag
APA, Harvard, Vancouver, ISO, and other styles
9

Wu, Hsien-Chu, and 吳憲珠. "Copyright Protection Techniques for Digital Images and Their Applications to Tampering Proof and Recovery." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/79884372922665844243.

Full text
Abstract:
博士<br>國立中正大學<br>資訊工程研究所<br>90<br>The goal of this dissertation is to develop improved image protection techniques to protect the intellectual property rights and to solve the above problems such as tamper proofing and recovery. First of all, this dissertation presents six digital copyrights protection schemes. The first proposed copyrights protection scheme takes advantage of visual cryptography to construct a master share from a digital image and come with an ownership share for each copyright. After stacking these two shares, the ownership information can be recovered directly by
APA, Harvard, Vancouver, ISO, and other styles
10

Chiu, Yen-Chung, and 邱彥中. "A Study on Digital Watermarking and Authentication of Images for Copyright Protection And Tampering Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/89084112095535503685.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學系所<br>92<br>Due to the advance of digital techniques, digital images may be copied or tampered with illegally. Therefore, it is important to develop methods to protect the copyright of digital images and verify their integrity. In this study, digital watermarking techniques for such purposes are proposed. In addition, the watermark must have an ability of robustness because users may apply various operations on a watermarked image. For color images, four methods are proposed to handle different attacks. First, a method based on creating peaks circularly and symmetrically in
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Digital tampering"

1

Forensic Analysis of Digital Image Tampering. Storming Media, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Digital tampering"

1

Tanasi, Alessandro. "Photo Manipulation: Software to Unmask Tampering." In Digital Investigative Journalism. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97283-1_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cao, Hong, and Alex C. Kot. "Detection of Tampering Inconsistencies on Mobile Photos." In Digital Watermarking. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18405-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Wei, Jing Dong, and Tieniu Tan. "A Survey of Passive Image Tampering Detection." In Digital Watermarking. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03688-0_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xu, Guanshuo, Jingyu Ye, and Yun-Qing Shi. "New Developments in Image Tampering Detection." In Digital-Forensics and Watermarking. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19321-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Asaad, Aras, and Sabah Jassim. "Topological Data Analysis for Image Tampering Detection." In Digital Forensics and Watermarking. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64185-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Luyi, Shilin Wang, Shenghong Li, and Jianhua Li. "Countering Universal Image Tampering Detection with Histogram Restoration." In Digital Forensics and Watermaking. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40099-5_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Singleton, Mitchell B., and Qingzhong Liu. "Detecting Digital Photo Tampering with Deep Learning." In Machine Learning and Intelligent Communications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00557-3_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sutthiwan, Patchara, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, and Wei Su. "Markovian Rake Transform for Digital Image Tampering Detection." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24556-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Luyi, Shilin Wang, Shenghong Li, and Jianhua Li. "New Feature Presentation of Transition Probability Matrix for Image Tampering Detection." In Digital Forensics and Watermarking. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32205-1_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chakraborty, Sunen, Paramita Dey, and Kingshuk Chatterjee. "Digital Image Tampering Detection Using Deep Learning: A Survey." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2710-4_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital tampering"

1

Mo, Xiaolong, Huabiao Li, and Ruiwei Meng. "Research on the Application of Anti-tampering Technology in Digital Cultural Communication." In 2024 International Conference on Culture-Oriented Science & Technology (CoST). IEEE, 2024. http://dx.doi.org/10.1109/cost64302.2024.00029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zakey, Asmath, Dinura Bawantha, Dinuth Shehara, Nethmi Hasara, Kavinga Yapa Abeywardena, and Harinda Fernando. "A Dual-Branch CNN and Metadata Analysis Approach for Robust Image Tampering Detection." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Nan, Kun Wang, and Xu Zhang. "Document image tampering detection and localization based on dual-path network with progressive supervision." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chaugule, Swapnil S., and Dalila B. Megherbi. "An Image Security System for Digital Private Image Exchange Using Redundant Watermarks for Authentication, Information Hiding, Tampering Detection, and Data Self-Recovery with Partial Carrier Capacity Utilization." In NAECON 2024 - IEEE National Aerospace and Electronics Conference. IEEE, 2024. http://dx.doi.org/10.1109/naecon61878.2024.10670631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ali, Zain, Areej Ahmed, and Hafsa Bibi. "Innovative Approaches to Liquefaction Mitigation in Seismic Zones: A Comprehensive Overview." In 14th International Civil Engineering Conference. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-78q4kr.

Full text
Abstract:
Another vulnerability that arises due to soil conditions is the liquefaction of soil in seismic zones which is a major risk as this form of soil behaves like liquid when it experiences an earthquake leading to effects such as infrastructure and posing dangerous risks to the lives of people. The conventional mitigation measures including tampering of soil and provision of drainage system present certain disadvantages in as much as cost, eco-friendly nature, and efficiency are concerned. Newer development strategies for liquefaction mitigation are targeted at advanced techniques of ground improv
APA, Harvard, Vancouver, ISO, and other styles
6

Mall, Vinod, Kedar Bhatt, Suman K. Mitra, and Anil K. Roy. "Exposing structural tampering in digital images." In 2012 IEEE International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, 2012. http://dx.doi.org/10.1109/ispcc.2012.6224369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Teerakanok, Songpon, and Tetsutaro Uehara. "Digital Media Tampering Detection Techniques: An Overview." In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2017. http://dx.doi.org/10.1109/compsac.2017.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

ARGHIRESCU, Sebastian-Alexandru. "Security of Digital Files: Audio Tampering Detection." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2024. http://dx.doi.org/10.19107/cybercon.2024.06.

Full text
Abstract:
In an age where most of the data we interact with daily is stored digitally, methods of checking its authenticity become more and more essential. This is especially true for sound, as the increasing public availability of AI models makes tampering with audio files easier than ever. In this paper, we will be investigating the current landscape of audio forensics as well as our new hardware-based solution for double encoding detection.
APA, Harvard, Vancouver, ISO, and other styles
9

Fan, Jiayuan, Tao Chen, and Jiuwen Cao. "Image tampering detection using noise histogram features." In 2015 IEEE International Conference on Digital Signal Processing (DSP). IEEE, 2015. http://dx.doi.org/10.1109/icdsp.2015.7252037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Yulin, and Jian Zhao. "Asymmetric locating position of information hiding against tampering." In Second International Conference on Digital Image Processing. SPIE, 2010. http://dx.doi.org/10.1117/12.856010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!