Gotowa bibliografia na temat „Digital forgery”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Digital forgery”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Digital forgery"
Sarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.
Pełny tekst źródłaLiang, Yu, Yadong Yu, Yina Wang, Dunjun Li, and Zejiong Zhou. "Counterfeiting in Depth Synthesis based on Digital Watermarking." Frontiers in Computing and Intelligent Systems 5, no. 3 (2023): 100–106. http://dx.doi.org/10.54097/fcis.v5i3.13998.
Pełny tekst źródłaNirosha, Kandukuri. "Digital Image Forgery Detection Using Convolutional Neural Network." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 456–65. https://doi.org/10.22214/ijraset.2025.67285.
Pełny tekst źródłaHussien, Nadheer Younus, Rasha O. Mahmoud, and Hala Helmi Zayed. "Deep Learning on Digital Image Splicing Detection Using CFA Artifacts." International Journal of Sociotechnology and Knowledge Development 12, no. 2 (2020): 31–44. http://dx.doi.org/10.4018/ijskd.2020040102.
Pełny tekst źródłaLovepreet, Kaur*1 &. Sandeep Singh Dhaliwal2. "COPY MOVE FORGERY DETECTION IN DIGITAL IMAGES USING IMPROVED SIFT (I-SIFT) APPROACH." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 9, no. 3 (2020): 6–12. https://doi.org/10.5281/zenodo.3700407.
Pełny tekst źródłaVaishali Sharma. "Ensuring Visual Integrity: Deep Learning-Based Solutions for Authentic Image Forgery Detection." Journal of Electrical Systems 20, no. 11s (2024): 3491–508. https://doi.org/10.52783/jes.8129.
Pełny tekst źródłaMr. M. Sasikanth, Ms M. Sri Siva Sravani Devi, Ms K. Bindu Madhavi, Mr V. Vigneswara Rao, and Mr. J. Prudhvi. "Digital Image Forgery Detection using Hierarchical Learning." Journal of Nonlinear Analysis and Optimization 16, no. 01 (2025): 1186–94. https://doi.org/10.36893/jnao.2025.v16i01.0139.
Pełny tekst źródłaSU, YUTING, JING ZHANG, YU HAN, JING CHEN, and QINGZHONG LIU. "EXPOSING DIGITAL VIDEO LOGO-REMOVAL FORGERY BY INCONSISTENCY OF BLUR." International Journal of Pattern Recognition and Artificial Intelligence 24, no. 07 (2010): 1027–46. http://dx.doi.org/10.1142/s0218001410008317.
Pełny tekst źródłaGupta, Anil. "A New Copy Move Forgery Detection Technique using Adaptive Over-segementation and Feature Point Matching." Bulletin of Electrical Engineering and Informatics 7, no. 3 (2018): 345–49. http://dx.doi.org/10.11591/eei.v7i3.754.
Pełny tekst źródłaGupta, Anil. "A New Copy Move Forgery Detection Technique Using Adaptive Over-segementation and Feature Point Matching." Bulletin of Electrical Engineering and Informatics 7, no. 3 (2018): 345–49. https://doi.org/10.11591/eei.v7i3.754.
Pełny tekst źródłaRozprawy doktorskie na temat "Digital forgery"
Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.
Pełny tekst źródłaLê, Thi Ai Nhàn. "Statistical Modeling for Detection of Digital Image Forgery." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0046.
Pełny tekst źródłaSwanepoel, Jacques Philip. "Digital signatures." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/98042.
Pełny tekst źródłaMahfoudi, Gaël. "Authentication of Digital Images and Videos." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0043.
Pełny tekst źródłaIacovone, Michael Dax. "Memories We Forget." VCU Scholars Compass, 2005. http://hdl.handle.net/10156/1875.
Pełny tekst źródłaKoch, Frank Henry Jr. "A Comparison of Digital Vegetation Mapping and Image Orthorectification Methods Using Aerial Photography of Valley Forge National Historical Park." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010417-180334.
Pełny tekst źródłaNatour, Jamal, and Rewa Leila Anabtawi. "To download a movie or to buy fake branded clothes? : a study of consumers’ attitudes towards counterfeited and pirated products." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-9797.
Pełny tekst źródłaAndersson, Elsa, Moa Strömland, and Catherine Quassdorf. "Microinteractions: Don’t forget to raise your hand! : A qualitative study concerning microinteractions in digital meeting platforms and the impact they have on workflow efficiencies in the creative industry." Thesis, Jönköping University, JTH, Avdelningen för datateknik och informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-53487.
Pełny tekst źródłaAbecidan, Rony. "Stratégies d'apprentissage robustes pour la détection de manipulation d'images." Electronic Thesis or Diss., Centrale Lille Institut, 2024. http://www.theses.fr/2024CLIL0025.
Pełny tekst źródłaChen, Biing-Jang, and 陳炳彰. "Time-Stamped Digital Signatures against Forgery." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/23265863679022155270.
Pełny tekst źródłaKsiążki na temat "Digital forgery"
Autotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. IEEE, 2001.
Znajdź pełny tekst źródłaPotter, Whitney. Digital Temperature Control for the Blacksmith Forge. CreateSpace Independent Publishing Platform, 2010.
Znajdź pełny tekst źródłaSen, D. Understanding Digital Music and Sound Forge 6. BPB Publications, 2004.
Znajdź pełny tekst źródłaCowhey, Peter F., and Jonathan D. Aronson. Data Privacy. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0008.
Pełny tekst źródłaErdogan, Nezih, and Ebru Kayaalp. Exploring Past Images in a Digital Age. Amsterdam University Press, 2023. http://dx.doi.org/10.5117/9789463723442.
Pełny tekst źródłaLivingstone, Sonia, and Alicia Blum-Ross. Parenting for a Digital Future. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190874698.001.0001.
Pełny tekst źródłaSubramaniam, Mohan. The Future of Competitive Strategy. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/14129.001.0001.
Pełny tekst źródłaHite, J. C., and Karen Hite. Digital Agency Hacker: Forget Theory! Tactical Wisdom from an INC 5000 Agency. Stepup Strategies, 2022.
Znajdź pełny tekst źródłaCzęści książek na temat "Digital forgery"
Bleumer, Gerrit. "Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_206-2.
Pełny tekst źródłaBleumer, Gerrit. "Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_206.
Pełny tekst źródłaBleumer, Gerrit. "Existential Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_202-2.
Pełny tekst źródłaBleumer, Gerrit. "Selective Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_225-2.
Pełny tekst źródłaBleumer, Gerrit. "Existential Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_202.
Pełny tekst źródłaBleumer, Gerrit. "Selective Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_225.
Pełny tekst źródłaRoy, Aniket, Rahul Dixit, Ruchira Naskar, and Rajat Subhra Chakraborty. "Copy-Move Forgery Detection in Transform Domain." In Digital Image Forensics. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-7644-2_6.
Pełny tekst źródłaRoy, Aniket, Rahul Dixit, Ruchira Naskar, and Rajat Subhra Chakraborty. "Copy-Move Forgery Detection Exploiting Statistical Image Features." In Digital Image Forensics. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-7644-2_4.
Pełny tekst źródłaWang, Wan, Xinghao Jiang, Shilin Wang, Meng Wan, and Tanfeng Sun. "Identifying Video Forgery Process Using Optical Flow." In Digital-Forensics and Watermarking. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43886-2_18.
Pełny tekst źródłaHel-Or, Hagit, and Ido Yerushalmy. "Camera-Based Image Forgery Detection." In Handbook of Digital Forensics of Multimedia Data and Devices. John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118705773.ch14.
Pełny tekst źródłaStreszczenia konferencji na temat "Digital forgery"
Kumar, B. Pavan, V. M. Vinayagam, S. A. Babu, C. Guruparthasarthi, G. Janardhan, and M. Deepthi. "Digital Image Forgery Detection Using Deep Learning." In 2024 2nd World Conference on Communication & Computing (WCONF). IEEE, 2024. http://dx.doi.org/10.1109/wconf61366.2024.10692152.
Pełny tekst źródłaKolekar, Sachin M., Aarti P. Pimpalkar, Rahul P. More, Sumit A. Hirve, Mayuresh B. Gulame, and Nilesh N. Thorat. "Digital Image Tamper-Forgery Detection in Security." In 2024 2nd International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC). IEEE, 2024. https://doi.org/10.1109/icmacc62921.2024.10894413.
Pełny tekst źródłaAhmad, Shujaa, and Bindu Verma. "Forgery Detection in Digital Images Using CNN and ELA." In 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N). IEEE, 2024. https://doi.org/10.1109/icac2n63387.2024.10895131.
Pełny tekst źródłaZhu, Nan, Xin Wang, Kun Wang, and Xu Zhang. "Video inter-frame forgery detection based on CNN and ViT." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073212.
Pełny tekst źródłaThorat, Nilesh N., Prashant Dhotre, Nilesh Kulal, Aarti P. Pimpalkar, Vijaya S. Patil, and Sachin M. Kolekar. "Tamper-forgery Image Detection in Security Digital Image: A Review." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837567.
Pełny tekst źródłaSucith, R., P. Mathiazhagan, M. Ajith, and G. Lingesh. "Deep Learning Approaches for Detecting Forgery Attacks on Digital Images." In 2025 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2025. https://doi.org/10.1109/ickecs65700.2025.11035693.
Pełny tekst źródłaNampoothiri, V. Parameswaran, and N. Sugitha. "Digital image forgery — A threaten to digital forensics." In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, 2016. http://dx.doi.org/10.1109/iccpct.2016.7530370.
Pełny tekst źródłaBattiato, Sebastiano, and Giuseppe Messina. "Digital forgery estimation into DCT domain." In the First ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1631081.1631091.
Pełny tekst źródłaMurali, S., Basavaraj S. Anami, and Govindraj B. Chittapur. "Detection of digital photo image forgery." In 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT). IEEE, 2012. http://dx.doi.org/10.1109/icaccct.2012.6320754.
Pełny tekst źródłaMashatan, Atefeh, and Khaled Ouafi. "Forgery-resilience for digital signature schemes." In the 7th ACM Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2414456.2414469.
Pełny tekst źródła