Gotowa bibliografia na temat „Digital forgery”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Digital forgery”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Digital forgery"

1

Sarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.

Pełny tekst źródła
Streszczenie:
<em>Forgery is the criminal act that provides misleading information about a product or service. It is the process of making, adapting, or imitating documents or objects with the intent to deceive. Digital forgery (or digital tampering) is the process of manipulating documents or images for the intent of financial, social or political gain. This paper provides a brief introduction to the digital forgery.</em>
Style APA, Harvard, Vancouver, ISO itp.
2

Liang, Yu, Yadong Yu, Yina Wang, Dunjun Li, and Zejiong Zhou. "Counterfeiting in Depth Synthesis based on Digital Watermarking." Frontiers in Computing and Intelligent Systems 5, no. 3 (2023): 100–106. http://dx.doi.org/10.54097/fcis.v5i3.13998.

Pełny tekst źródła
Streszczenie:
The purpose of this paper is to discuss and apply digital watermarking technology to solve the forgery problem in depth synthesis. With the rapid development of deep synthesis technology and its application in various fields, it is particularly important to protect the authenticity and integrity of digital content. Based on the understanding of digital watermarking, this paper explores an experimental design, which uses watermarking embedding and extraction algorithms and forgery detection technology to solve the problem of deep forgery, protect the copyright, integrity and anti-copy of digita
Style APA, Harvard, Vancouver, ISO itp.
3

Nirosha, Kandukuri. "Digital Image Forgery Detection Using Convolutional Neural Network." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 456–65. https://doi.org/10.22214/ijraset.2025.67285.

Pełny tekst źródła
Streszczenie:
Digital images are a main source of shared information in social media. Digital image forgery has become a growing concern with the advancement of image editing tools, leading to the spread of misleading and manipulated content. Detecting such forgeries is crucial for ensuring the authenticity and reliability of digital images. Various digital image forgery detection techniques are tied to detecting only one type of forgery, such as image splicing or copy-move it is not applied in real life. To enhance digital image forgery detection using deep learning techniques via transfer learning is unco
Style APA, Harvard, Vancouver, ISO itp.
4

Hussien, Nadheer Younus, Rasha O. Mahmoud, and Hala Helmi Zayed. "Deep Learning on Digital Image Splicing Detection Using CFA Artifacts." International Journal of Sociotechnology and Knowledge Development 12, no. 2 (2020): 31–44. http://dx.doi.org/10.4018/ijskd.2020040102.

Pełny tekst źródła
Streszczenie:
Digital image forgery is a serious problem of an increasing attention from the research society. Image splicing is a well-known type of digital image forgery in which the forged image is synthesized from two or more images. Splicing forgery detection is more challenging when compared with other forgery types because the forged image does not contain any duplicated regions. In addition, unavailability of source images introduces no evidence about the forgery process. In this study, an automated image splicing forgery detection scheme is presented. It depends on extracting the feature of images
Style APA, Harvard, Vancouver, ISO itp.
5

Lovepreet, Kaur*1 &. Sandeep Singh Dhaliwal2. "COPY MOVE FORGERY DETECTION IN DIGITAL IMAGES USING IMPROVED SIFT (I-SIFT) APPROACH." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 9, no. 3 (2020): 6–12. https://doi.org/10.5281/zenodo.3700407.

Pełny tekst źródła
Streszczenie:
With this across the board use of computerized pictures, notwithstanding the expanding number of instruments and programming of advanced pictures altering, it has ended up being definitely not hard to control and change the genuine information of the image. Existing system for forgery detection has many problems like maximum angle that existing system can detect is 40 degree rotation. Existing systems cannot detect forgery if duplicate content is compressed or enhanced. In the proposed system, we have developed a novel approach namedI-SIFT for copy move forgery detection that can detect the co
Style APA, Harvard, Vancouver, ISO itp.
6

Vaishali Sharma. "Ensuring Visual Integrity: Deep Learning-Based Solutions for Authentic Image Forgery Detection." Journal of Electrical Systems 20, no. 11s (2024): 3491–508. https://doi.org/10.52783/jes.8129.

Pełny tekst źródła
Streszczenie:
Digital image manipulation has become increasingly prevalent with the advancement of image editing tools, posing significant challenges in digital forensics. Detecting and localizing two common types of image forgery copy-move forgery and spliced image forgery remains a critical task. This paper proposes an approach that leverages EfficientFormer for forgery detection and BCU-Net with a spatial attention mechanism for localization. EfficientFormer is used to classify images as forged or original, while BCU-Net precisely identifies and localizes the forged regions. The study utilizes well-known
Style APA, Harvard, Vancouver, ISO itp.
7

Mr. M. Sasikanth, Ms M. Sri Siva Sravani Devi, Ms K. Bindu Madhavi, Mr V. Vigneswara Rao, and Mr. J. Prudhvi. "Digital Image Forgery Detection using Hierarchical Learning." Journal of Nonlinear Analysis and Optimization 16, no. 01 (2025): 1186–94. https://doi.org/10.36893/jnao.2025.v16i01.0139.

Pełny tekst źródła
Streszczenie:
Digital image forgery has emerged as a critical challenge in the digital era, with deep learning techniques offering promising solutions for detecting manipulated images. This paper presents a comprehensive approach to image forgery detection using convolutional neural networks (CNNs) and deep learning models such as ResNet, EfficientNet, and Vision Transformers (ViTs). The methodology involves dataset preprocessing, feature extraction, and classification of forged versus authentic images. Performance evaluation metrics such as accuracy, precision, recall, and F1-score are used to compare diff
Style APA, Harvard, Vancouver, ISO itp.
8

SU, YUTING, JING ZHANG, YU HAN, JING CHEN, and QINGZHONG LIU. "EXPOSING DIGITAL VIDEO LOGO-REMOVAL FORGERY BY INCONSISTENCY OF BLUR." International Journal of Pattern Recognition and Artificial Intelligence 24, no. 07 (2010): 1027–46. http://dx.doi.org/10.1142/s0218001410008317.

Pełny tekst źródła
Streszczenie:
A novel approach for detecting video logo-removal forgery is proposed by measuring inconsistency of blur. Our approach is based on the assumption that if a digital video undergoes logo-removal forgery; the blurriness of the forged region is expected to be different as compared to the nontampered parts of the video. Blurriness is first estimated by analyzing the spatial and temporal statistical property of logo areas, and suspicious areas are roughly located; then features are extracted and a fine classification is implemented by applying support vector machine (SVM) to extract features. If the
Style APA, Harvard, Vancouver, ISO itp.
9

Gupta, Anil. "A New Copy Move Forgery Detection Technique using Adaptive Over-segementation and Feature Point Matching." Bulletin of Electrical Engineering and Informatics 7, no. 3 (2018): 345–49. http://dx.doi.org/10.11591/eei.v7i3.754.

Pełny tekst źródła
Streszczenie:
With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copy-move or splicing, resampling a digital image (stretch, rotate, resize), removal
Style APA, Harvard, Vancouver, ISO itp.
10

Gupta, Anil. "A New Copy Move Forgery Detection Technique Using Adaptive Over-segementation and Feature Point Matching." Bulletin of Electrical Engineering and Informatics 7, no. 3 (2018): 345–49. https://doi.org/10.11591/eei.v7i3.754.

Pełny tekst źródła
Streszczenie:
With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copymove or splicing, resampling a digital image (stretch, rotate, resize), removal a
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Digital forgery"

1

Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.

Pełny tekst źródła
Streszczenie:
The ready availability of image-editing software makes it important to ensure the authenticity of images. This thesis concerns the detection and localization of cloning, or Copy-Move Forgery (CMF), which is the most common type of image tampering, in which part(s) of the image are copied and pasted back somewhere else in the same image. Post-processing can be used to produce more realistic doctored images and thus can increase the difficulty of detecting forgery. This thesis presents three novel methods for CMF detection, using feature extraction, surface fitting and segmentation. The Dense Sc
Style APA, Harvard, Vancouver, ISO itp.
2

Lê, Thi Ai Nhàn. "Statistical Modeling for Detection of Digital Image Forgery." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0046.

Pełny tekst źródła
Streszczenie:
À l’ère du numérique, la crédibilité du contenu des images est une préoccupation majeure en raison de la popularité des outils d’édition faciles à utiliser et peu coûteux. Les images falsifiées peuvent être utilisées pour manipuler l’opinion publique lors des élections, commettre des fraudes et discréditer ou faire chanter des personnes. Face à cette situation préoccupante, nous développons dans cette thèse trois techniques efficaces basées sur (i) les traces de dématriçage (ii) les traces de compression JPEG, et (iii) les traces de rééchantillonnage pour détecter les images falsifiées et loca
Style APA, Harvard, Vancouver, ISO itp.
3

Swanepoel, Jacques Philip. "Digital signatures." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/98042.

Pełny tekst źródła
Streszczenie:
Thesis (PhD)--Stellenbosch University, 2015<br>AFRIKAANSE OPSOMMING : In hierdie verhandeling stel ons 'n nuwe strategie vir outomatiese handtekening-verifikasie voor. Die voorgestelde raamwerk gebruik 'n skrywer-onafhanklike benadering tot handtekening- modellering en is dus in staat om bevraagtekende handtekeninge, wat aan enige skrywer behoort, te bekragtig, op voorwaarde dat minstens een outentieke voorbeeld vir vergelykingsdoeleindes beskikbaar is. Ons ondersoek die tradisionele statiese geval (waarin 'n bestaande pen-op-papier handtekening vanuit 'n versyferde dokument onttrek word
Style APA, Harvard, Vancouver, ISO itp.
4

Mahfoudi, Gaël. "Authentication of Digital Images and Videos." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0043.

Pełny tekst źródła
Streszczenie:
Les médias digitaux font partie de notre vie de tous les jours. Après des années de photojournalisme, nous nous sommes habitués à considérer ces médias comme des témoignages objectifs de la réalité. Cependant les logiciels de retouches d'images et de vidéos deviennent de plus en plus puissants et de plus en plus simples à utiliser, ce qui permet aux contrefacteurs de produire des images falsifiées d'une grande qualité. L'authenticité de ces médias ne peut donc plus être prise pour acquise. Récemment, de nouvelles régulations visant à lutter contre le blanchiment d'argent ont vu le jour. Ces ré
Style APA, Harvard, Vancouver, ISO itp.
5

Iacovone, Michael Dax. "Memories We Forget." VCU Scholars Compass, 2005. http://hdl.handle.net/10156/1875.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Koch, Frank Henry Jr. "A Comparison of Digital Vegetation Mapping and Image Orthorectification Methods Using Aerial Photography of Valley Forge National Historical Park." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010417-180334.

Pełny tekst źródła
Streszczenie:
<p>In recent years, mapping software utilizing scanned?or ?softcopy??aerial photographs has become widely available. Using scanned photos of Valley Forge (PA) National Historical Park, I explored some of the latest tools for image processing and computer-based vegetation mapping. My primary objective was to compare different approaches for their efficiency and accuracy. In keeping with the USGS-NPS Vegetation Mapping Program protocol, I classified the park?s vegetation according to The Nature Conservancy?s National Vegetation Classification System (NVCS).<p>Initially, I scanned forty-nine 1:60
Style APA, Harvard, Vancouver, ISO itp.
7

Natour, Jamal, and Rewa Leila Anabtawi. "To download a movie or to buy fake branded clothes? : a study of consumers’ attitudes towards counterfeited and pirated products." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-9797.

Pełny tekst źródła
Streszczenie:
Purchasing counterfeited luxury products and downloading pirated items have becomemore common nowadays. Fashion and IT industries are affected negatively by consumers’supportive attitude towards piracy and counterfeits. Many luxury branded companies havetheir exclusive brand names stolen by counterfeits producers. Likewise producers ofcomputer software, music, and movies are affected by individuals who download/streamtheir items for free. Consumers’ attitudes towards counterfeiting and piracy are importantto examine as to understand their acceptance and rejection towards counterfeits and pirac
Style APA, Harvard, Vancouver, ISO itp.
8

Andersson, Elsa, Moa Strömland, and Catherine Quassdorf. "Microinteractions: Don’t forget to raise your hand! : A qualitative study concerning microinteractions in digital meeting platforms and the impact they have on workflow efficiencies in the creative industry." Thesis, Jönköping University, JTH, Avdelningen för datateknik och informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-53487.

Pełny tekst źródła
Streszczenie:
This research paper studies the extent of how microinteractions are utilized in Microsoft Teams and the impact that they have on workflow efficiencies, specifically in the creative industry. In a novel time where Covid-19 virus has increased the demand of digital platforms, the importance of research within remote meeting utilization, and the interaction possibilities within, is of utter importance. Also, since we are missing out on the spontaneous interactions that occur when meeting face-to-face, the microinteractions within digital meeting platforms now carry a heavier weight when interacti
Style APA, Harvard, Vancouver, ISO itp.
9

Abecidan, Rony. "Stratégies d'apprentissage robustes pour la détection de manipulation d'images." Electronic Thesis or Diss., Centrale Lille Institut, 2024. http://www.theses.fr/2024CLIL0025.

Pełny tekst źródła
Streszczenie:
Aujourd'hui, la manipulation d'images à des fins non éthiques est courante, notamment sur les réseaux sociaux et dans la publicité. Les utilisateurs malveillants peuvent par exemple créer des images synthétiques convaincantes pour tromper le public ou dissimuler des messages dans des images numériques, posant des risques pour la sécurité nationale. Les chercheurs en analyse forensique d'image travaillent donc avec les forces de l'ordre pour détecter ces manipulations. Les méthodes d'analyse forensique les plus avancées utilisent notamment des réseaux neuronaux convolutifs pour les détecter. Ce
Style APA, Harvard, Vancouver, ISO itp.
10

Chen, Biing-Jang, and 陳炳彰. "Time-Stamped Digital Signatures against Forgery." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/23265863679022155270.

Pełny tekst źródła
Streszczenie:
碩士<br>朝陽大學<br>資訊管理系碩士班<br>87<br>While a digital signature was generated, the signer merely used his own secret key to sign a document. Later, the verifier used the signer's public key to authenticate the truthfulness and the identity of the signature's owner. But the signer could deny the signature by declaring that he lost his secret key. Owing to the problem of repudiation, some extra information must be appended into the signature to strength the undeniability. A new digital signature scheme attached a time-stamp which is fair and unchangeable is proposed in this thesis. According to the ad
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Digital forgery"

1

Autotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. IEEE, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Potter, Whitney. Digital Temperature Control for the Blacksmith Forge. CreateSpace Independent Publishing Platform, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Sen, D. Understanding Digital Music and Sound Forge 6. BPB Publications, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Instant Sound Forge. CMP Books, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Garrigus, Scott R. Sound Forge Power. Laxmi Publications, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Cowhey, Peter F., and Jonathan D. Aronson. Data Privacy. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0008.

Pełny tekst źródła
Streszczenie:
Chapter 8 lays out the political economic trade-offs in privacy protection designs and their implications for the types of privacy risks and constraints on innovations. To delve more deeply, it then contrasts the U.S. and EU approaches. This leads into an analysis of the protracted U.S.–EU disputes on privacy safeguards and the efforts to forge international agreements on privacy protection forged at the Organization for Economic Cooperation and Development and the Asia-Pacific Economic Cooperation. The most promising initiatives will require a significant role for global civil society in gove
Style APA, Harvard, Vancouver, ISO itp.
7

Erdogan, Nezih, and Ebru Kayaalp. Exploring Past Images in a Digital Age. Amsterdam University Press, 2023. http://dx.doi.org/10.5117/9789463723442.

Pełny tekst źródła
Streszczenie:
Film archives are fast spreading around the world, and with them issues surrounding archival digitisation, artistic appropriation, and academic reinterpretation of film material that demand scholarly attention. Exploring Past Images in a Digital Age: Reinventing the Archive aims to fill this demand with a thought-provoking collection of original articles contributed by renowned scholars, archivists, and artists. It urges the reader to “forget” standard ways of thinking about film archives and come to grips with the challenges of analysing and recontextualising an area in transit from the analo
Style APA, Harvard, Vancouver, ISO itp.
8

Livingstone, Sonia, and Alicia Blum-Ross. Parenting for a Digital Future. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190874698.001.0001.

Pełny tekst źródła
Streszczenie:
In the decades it takes to bring up a child, parents face challenges that are both helped and hindered by the fact that they are living through a period of unprecedented digital innovation. Drawing on extensive research with parents both rich and poor, parenting toddlers to teenagers, this book reveals how digital technologies give parenting struggles a distinctive character, as parents determine how to forge new territory with little precedent, or support. It argues that, in late modernity, parents are both more burdened with responsibilities and yet increasingly charged with respecting and d
Style APA, Harvard, Vancouver, ISO itp.
9

Subramaniam, Mohan. The Future of Competitive Strategy. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/14129.001.0001.

Pełny tekst źródła
Streszczenie:
How legacy firms can combine their traditional strengths with the power of data and digital ecosystems to forge a new competitive strategy for the digital era. How can legacy firms remain relevant in the digital era? In The Future of Competitive Strategy, strategic management expert Mohan Subramaniam explains how firms can leverage both their traditional strengths and the modern-day power of data and digital ecosystems to forge a new competitive strategy. Drawing on the experiences of a range of companies, including Caterpillar, Sleep Number, and Whirlpool, he explains how firms can benefit fr
Style APA, Harvard, Vancouver, ISO itp.
10

Hite, J. C., and Karen Hite. Digital Agency Hacker: Forget Theory! Tactical Wisdom from an INC 5000 Agency. Stepup Strategies, 2022.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Digital forgery"

1

Bleumer, Gerrit. "Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_206-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Bleumer, Gerrit. "Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_206.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Bleumer, Gerrit. "Existential Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_202-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Bleumer, Gerrit. "Selective Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_225-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bleumer, Gerrit. "Existential Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_202.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Bleumer, Gerrit. "Selective Forgery of Digital Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_225.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Roy, Aniket, Rahul Dixit, Ruchira Naskar, and Rajat Subhra Chakraborty. "Copy-Move Forgery Detection in Transform Domain." In Digital Image Forensics. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-7644-2_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Roy, Aniket, Rahul Dixit, Ruchira Naskar, and Rajat Subhra Chakraborty. "Copy-Move Forgery Detection Exploiting Statistical Image Features." In Digital Image Forensics. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-7644-2_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Wang, Wan, Xinghao Jiang, Shilin Wang, Meng Wan, and Tanfeng Sun. "Identifying Video Forgery Process Using Optical Flow." In Digital-Forensics and Watermarking. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43886-2_18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Hel-Or, Hagit, and Ido Yerushalmy. "Camera-Based Image Forgery Detection." In Handbook of Digital Forensics of Multimedia Data and Devices. John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118705773.ch14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Digital forgery"

1

Kumar, B. Pavan, V. M. Vinayagam, S. A. Babu, C. Guruparthasarthi, G. Janardhan, and M. Deepthi. "Digital Image Forgery Detection Using Deep Learning." In 2024 2nd World Conference on Communication & Computing (WCONF). IEEE, 2024. http://dx.doi.org/10.1109/wconf61366.2024.10692152.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Kolekar, Sachin M., Aarti P. Pimpalkar, Rahul P. More, Sumit A. Hirve, Mayuresh B. Gulame, and Nilesh N. Thorat. "Digital Image Tamper-Forgery Detection in Security." In 2024 2nd International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC). IEEE, 2024. https://doi.org/10.1109/icmacc62921.2024.10894413.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ahmad, Shujaa, and Bindu Verma. "Forgery Detection in Digital Images Using CNN and ELA." In 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N). IEEE, 2024. https://doi.org/10.1109/icac2n63387.2024.10895131.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Zhu, Nan, Xin Wang, Kun Wang, and Xu Zhang. "Video inter-frame forgery detection based on CNN and ViT." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073212.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Thorat, Nilesh N., Prashant Dhotre, Nilesh Kulal, Aarti P. Pimpalkar, Vijaya S. Patil, and Sachin M. Kolekar. "Tamper-forgery Image Detection in Security Digital Image: A Review." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837567.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Sucith, R., P. Mathiazhagan, M. Ajith, and G. Lingesh. "Deep Learning Approaches for Detecting Forgery Attacks on Digital Images." In 2025 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2025. https://doi.org/10.1109/ickecs65700.2025.11035693.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Nampoothiri, V. Parameswaran, and N. Sugitha. "Digital image forgery — A threaten to digital forensics." In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, 2016. http://dx.doi.org/10.1109/iccpct.2016.7530370.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Battiato, Sebastiano, and Giuseppe Messina. "Digital forgery estimation into DCT domain." In the First ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1631081.1631091.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Murali, S., Basavaraj S. Anami, and Govindraj B. Chittapur. "Detection of digital photo image forgery." In 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT). IEEE, 2012. http://dx.doi.org/10.1109/icaccct.2012.6320754.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Mashatan, Atefeh, and Khaled Ouafi. "Forgery-resilience for digital signature schemes." In the 7th ACM Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2414456.2414469.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!