Journal articles on the topic 'Digital tampering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Digital tampering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shen, Jingyi, Yun Yao, and Hao Mei. "Design of Image Copy-Paste Forensics System Based on Moment Invariants." International Journal for Innovation Education and Research 9, no. 11 (2021): 552–55. http://dx.doi.org/10.31686/ijier.vol9.iss11.3547.
Full textChang, Yu Hong. "Based on Digital Image Forensics Double JPEG Compression Algorithm." Advanced Materials Research 1044-1045 (October 2014): 1098–101. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1098.
Full textFreiling, Felix, and Leonhard Hösch. "Controlled experiments in digital evidence tampering." Digital Investigation 24 (March 2018): S83—S92. http://dx.doi.org/10.1016/j.diin.2018.01.011.
Full textAminu, Ali Ahmad, and Nwojo Nnanna Agwu. "General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP)." Signal & Image Processing : An International Journal 12, no. 2 (2021): 13–32. http://dx.doi.org/10.5121/sipij.2021.12202.
Full textTang, Bin, Mengyao Sun, Haowen Zheng, Haiyun Han, and Yu Jin. "Analysis of Digital Media Image Tampering and Forgery Control." Transactions on Computer Science and Intelligent Systems Research 5 (August 12, 2024): 1073–77. http://dx.doi.org/10.62051/f9e87g27.
Full textWei, Wang, and Tang Bin. "Analysis on Feasible Methods of Digital Image Tampering Detection." Highlights in Science, Engineering and Technology 44 (April 13, 2023): 371–76. http://dx.doi.org/10.54097/hset.v44i.7386.
Full textMualfah, Desti, Yoze Rizki, and Meiriladiwis Gea. "Analisis Digital Forensik Keaslian Video Rekaman CCTV Menggunakan Metode Localization Tampering." Jurnal CoSciTech (Computer Science and Information Technology) 3, no. 1 (2022): 43–51. http://dx.doi.org/10.37859/coscitech.v3i1.3697.
Full textMainoo, Bernard. "Digital Multimedia Tampering Detection for Forensics Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 81–90. http://dx.doi.org/10.22624/aims/crp-bk3-p14.
Full textSchneider, Janine, Linus Düsel, Benedikt Lorch, Julia Drafz, and Felix Freiling. "Prudent design principles for digital tampering experiments." Forensic Science International: Digital Investigation 40 (April 2022): 301334. http://dx.doi.org/10.1016/j.fsidi.2022.301334.
Full textParashar, Nishtha, and Nirupama Tiwari. "A Survey Of Digital Image Tampering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 8, no. 10 (2015): 91–96. http://dx.doi.org/10.14257/ijsip.2015.8.10.10.
Full textParashar, Nishtha, Nirupama Tiwari, and Deepika Dubey. "A Survey of Digital Image Tampering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 9, no. 2 (2016): 415–20. http://dx.doi.org/10.14257/ijsip.2016.9.2.35.
Full textJoseph*, Silpa, and S. Palani kumar. "Detection and Localization of Image and Video Tampering." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (2020): 1951–56. http://dx.doi.org/10.35940/ijitee.c1158.029420.
Full textJain, Ayushi. "Tampering Detection and Content Authentication Using Encrypted Perceptual Hash for Image Database." Mathematical Statistician and Engineering Applications 70, no. 2 (2021): 1695–705. http://dx.doi.org/10.17762/msea.v70i2.2460.
Full textLi, Su Ying. "Round Descriptor Based on SIFT Operator Copy and Paste Forensics." Advanced Materials Research 912-914 (April 2014): 1379–82. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1379.
Full textShkilev, Roman, Alevtina Kormiltseva, Marina Achaeva, Aiziryak Tarasova, and Marguba Matquliyeva. "Fortifying Textual Integrity: Evolutionary Optimization-powered Watermarking for Tampering Attack Detection in Digital Documents." Fusion: Practice and Applications 14, no. 2 (2024): 97–108. http://dx.doi.org/10.54216/fpa.140208.
Full textSarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.
Full textCrescentia.A, Anto, and Sujatha G. "An Overview of Digital Video Tampering Detection Using Passive Methods and D-Hash Algorithm." International Journal of Engineering & Technology 7, no. 4.6 (2018): 373. http://dx.doi.org/10.14419/ijet.v7i4.6.28444.
Full textAgarwal, Ritu, and Mallika Pant. "Image tampering detection using genetic algorithm." MATEC Web of Conferences 277 (2019): 02026. http://dx.doi.org/10.1051/matecconf/201927702026.
Full textFallahpour, Mehdi, Shervin Shirmohammadi, Mehdi Semsarzadeh, and Jiying Zhao. "Tampering Detection in Compressed Digital Video Using Watermarking." IEEE Transactions on Instrumentation and Measurement 63, no. 5 (2014): 1057–72. http://dx.doi.org/10.1109/tim.2014.2299371.
Full textHsu, Ching-Sheng, and Shu-Fen Tu. "Probability-based tampering detection scheme for digital images." Optics Communications 283, no. 9 (2010): 1737–43. http://dx.doi.org/10.1016/j.optcom.2009.12.073.
Full textChen, Xiangning, Weitao Yuan, Shengbei Wang, Chao Wang, and Lin Wang. "Speech Watermarking for Tampering Detection Based on Modifications to LSFs." Mathematical Problems in Engineering 2019 (December 17, 2019): 1–10. http://dx.doi.org/10.1155/2019/7285624.
Full textZeng, Pingping, Lianhui Tong, Yaru Liang, Nanrun Zhou, and Jianhua Wu. "Multitask Image Splicing Tampering Detection Based on Attention Mechanism." Mathematics 10, no. 20 (2022): 3852. http://dx.doi.org/10.3390/math10203852.
Full textLu, Wenhuan, Zonglei Chen, Ling Li, et al. "Watermarking Based on Compressive Sensing for Digital Speech Detection and Recovery †." Sensors 18, no. 7 (2018): 2390. http://dx.doi.org/10.3390/s18072390.
Full textGuan, Zekai. "A Review of Feature Matching Based Image Tampering Detection Methods." Applied and Computational Engineering 135, no. 1 (2025): 49–56. https://doi.org/10.54254/2755-2721/2025.21080.
Full textK. K, Sindhu. "Digital Forensic Investigation on File System And Database Tampering." IOSR Journal of Engineering 02, no. 02 (2012): 2142–221. http://dx.doi.org/10.9790/3021-0202214221.
Full textAnderson, C. "Easy-to-alter digital images raise fears of tampering." Science 263, no. 5145 (1994): 317–18. http://dx.doi.org/10.1126/science.8278802.
Full textSitara, K., and B. M. Mehtre. "Digital video tampering detection: An overview of passive techniques." Digital Investigation 18 (September 2016): 8–22. http://dx.doi.org/10.1016/j.diin.2016.06.003.
Full textVijayaraghavan, P., M. Joe Nelson, R. Prasanna, and M. K. Raghavendran. "Surveillance Footage Video Tampering Detection." Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems 01, no. 01 (2020): 10–16. http://dx.doi.org/10.47812/ijamecs2010102.
Full textAlfian, Alfiansyah Imanda Putra, Rusydi Umar, and Abdul Fadlil. "Penerapan Metode Localization Tampering dan Hashing untuk Deteksi Rekayasa Video Digital." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 2 (2021): 400–406. http://dx.doi.org/10.29207/resti.v5i2.3015.
Full textLi, Yewen, Wei Song, Xiaobing Zhao, Juan Wang, and Lizhi Zhao. "A Novel Image Tamper Detection and Self-Recovery Algorithm Based on Watermarking and Chaotic System." Mathematics 7, no. 10 (2019): 955. http://dx.doi.org/10.3390/math7100955.
Full textHe, Yong Hui. "Image Tampering with Evidence Algorithm Based on Copy and Paste." Advanced Materials Research 1044-1045 (October 2014): 1178–81. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1178.
Full textWang, Xinyi, Shaozhang Niu, and Jiwei Zhang. "Digital Image Forensics Based on CFA Interpolation Feature and Gaussian Mixture Model." International Journal of Digital Crime and Forensics 11, no. 2 (2019): 1–12. http://dx.doi.org/10.4018/ijdcf.2019040101.
Full textKhachane, Siddharth, and Deepmalya Mondal. "Image Tampering Detection using Error Level Analysis and Concatenated Neural Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 2011–18. http://dx.doi.org/10.22214/ijraset.2023.55067.
Full textM, N. Vinitha Reddy, Thirumalesh K, Devraju P, Waseem Baig M, and Mohammed Ali S. "Bridging Restoration and Forensics: A Novel Framework for Image Tampering Detection." International Journal of Computational Learning & Intelligence 4, no. 3 (2025): 513–21. https://doi.org/10.5281/zenodo.15210515.
Full textKingra, Staffy, Naveen Aggarwal, and Raahat Devender Singh. "Video Inter-frame Forgery Detection Approach for Surveillance and Mobile Recorded Videos." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 831. http://dx.doi.org/10.11591/ijece.v7i2.pp831-841.
Full textStaffy, Kingra, Aggarwal Naveen, and Devender Singh Raahat. "Mobile Recorded Videos." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 831–41. https://doi.org/10.11591/ijece.v7i2.pp831-841.
Full textSadiku, Matthew N. O., Adebowale E. Shadare, and Sarhan M. Musa. "Digital Chain of Custody." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 117. http://dx.doi.org/10.23956/ijarcsse.v7i7.109.
Full textManikantan, K. "Analyse And Overview on Digital Image Tampering Detection Using Matlab." International Journal of Computer Sciences and Engineering 6, no. 8 (2018): 902–6. http://dx.doi.org/10.26438/ijcse/v6i8.902906.
Full textBourouis, Sami, Roobaea Alroobaea, Abdullah M. Alharbi, Murad Andejany, and Saeed Rubaiee. "Recent Advances in Digital Multimedia Tampering Detection for Forensics Analysis." Symmetry 12, no. 11 (2020): 1811. http://dx.doi.org/10.3390/sym12111811.
Full textYang, Chen-Kuei, and Chang-Sheng Huang. "A Novel Watermarking Technique for Tampering Detection in Digital Images." ELCVIA Electronic Letters on Computer Vision and Image Analysis 3, no. 1 (2003): 1. http://dx.doi.org/10.5565/rev/elcvia.65.
Full textWei, Hui, Gao-bo Yang, and Ming Xia. "A Digital Video Tampering Forensics Scheme Based on Forensics Hash." Journal of Electronics & Information Technology 35, no. 12 (2014): 2934–41. http://dx.doi.org/10.3724/sp.j.1146.2013.00296.
Full textAbbadi, Nidhal, and Alyaa Mohsin. "Blind Digital Images Tampering Detection Based on Singular Value Decomposition." International Journal of Intelligent Engineering and Systems 13, no. 6 (2020): 338–48. http://dx.doi.org/10.22266/ijies2020.1231.30.
Full textSaha, Monica. "Forensic Technique for Forgery Detection and Localization in Digital Image." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2721–27. https://doi.org/10.22214/ijraset.2025.68495.
Full textNour Mohammad, Hasan Fayyad-Kazan, Mohamad Saab. "Anti- Forensics: The Tampering of Media." International Journal on Recent and Innovation Trends in Computing and Communication 8, no. 10 (2020): 06–30. http://dx.doi.org/10.17762/ijritcc.v8i10.5447.
Full textS, Manjunatha, and Malini M. Patil. "Efficient resampling features and convolution neural network model for image forgery detection." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 1 (2022): 183. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp183-190.
Full textS, Manjunatha, and Malini M. Patil. "Efficient resampling features and convolution neural network model for image forgery detection." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 1 (2022): 183–90. https://doi.org/10.11591/ijeecs.v25.i1.pp183-190.
Full textAkhtar, Naheed, Mubbashar Saddique, Khurshid Asghar, Usama Ijaz Bajwa, Muhammad Hussain, and Zulfiqar Habib. "Digital Video Tampering Detection and Localization: Review, Representations, Challenges and Algorithm." Mathematics 10, no. 2 (2022): 168. http://dx.doi.org/10.3390/math10020168.
Full textOnn, Ng Ching, Siti Nur Avivah, Mohammad Minhazul Alam, and Abubakar Ahmad. "Secure and Effective Image Integrity and Copyright Protection Using Two-Layer Authentication with Integer Wavelet Transform." IJACI : International Journal of Advanced Computing and Informatics 1, no. 1 (2025): 13–27. https://doi.org/10.71129/ijaci.v1.i1.pp13-27.
Full textGorle, Ramesh, and Anitha Guttavelli. "Enhanced Image Tampering Detection using Error Level Analysis and CNN." Engineering, Technology & Applied Science Research 15, no. 1 (2025): 19683–89. https://doi.org/10.48084/etasr.9593.
Full textLi, Xuejing, Qiancheng Chen, Runfu Chu, and Wei Wang. "Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability." PLOS ONE 19, no. 2 (2024): e0297632. http://dx.doi.org/10.1371/journal.pone.0297632.
Full text