Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Digital forgery.

Rozprawy doktorskie na temat „Digital forgery”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 26 najlepszych rozpraw doktorskich naukowych na temat „Digital forgery”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.

Pełny tekst źródła
Streszczenie:
The ready availability of image-editing software makes it important to ensure the authenticity of images. This thesis concerns the detection and localization of cloning, or Copy-Move Forgery (CMF), which is the most common type of image tampering, in which part(s) of the image are copied and pasted back somewhere else in the same image. Post-processing can be used to produce more realistic doctored images and thus can increase the difficulty of detecting forgery. This thesis presents three novel methods for CMF detection, using feature extraction, surface fitting and segmentation. The Dense Sc
Style APA, Harvard, Vancouver, ISO itp.
2

Lê, Thi Ai Nhàn. "Statistical Modeling for Detection of Digital Image Forgery." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0046.

Pełny tekst źródła
Streszczenie:
À l’ère du numérique, la crédibilité du contenu des images est une préoccupation majeure en raison de la popularité des outils d’édition faciles à utiliser et peu coûteux. Les images falsifiées peuvent être utilisées pour manipuler l’opinion publique lors des élections, commettre des fraudes et discréditer ou faire chanter des personnes. Face à cette situation préoccupante, nous développons dans cette thèse trois techniques efficaces basées sur (i) les traces de dématriçage (ii) les traces de compression JPEG, et (iii) les traces de rééchantillonnage pour détecter les images falsifiées et loca
Style APA, Harvard, Vancouver, ISO itp.
3

Swanepoel, Jacques Philip. "Digital signatures." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/98042.

Pełny tekst źródła
Streszczenie:
Thesis (PhD)--Stellenbosch University, 2015<br>AFRIKAANSE OPSOMMING : In hierdie verhandeling stel ons 'n nuwe strategie vir outomatiese handtekening-verifikasie voor. Die voorgestelde raamwerk gebruik 'n skrywer-onafhanklike benadering tot handtekening- modellering en is dus in staat om bevraagtekende handtekeninge, wat aan enige skrywer behoort, te bekragtig, op voorwaarde dat minstens een outentieke voorbeeld vir vergelykingsdoeleindes beskikbaar is. Ons ondersoek die tradisionele statiese geval (waarin 'n bestaande pen-op-papier handtekening vanuit 'n versyferde dokument onttrek word
Style APA, Harvard, Vancouver, ISO itp.
4

Mahfoudi, Gaël. "Authentication of Digital Images and Videos." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0043.

Pełny tekst źródła
Streszczenie:
Les médias digitaux font partie de notre vie de tous les jours. Après des années de photojournalisme, nous nous sommes habitués à considérer ces médias comme des témoignages objectifs de la réalité. Cependant les logiciels de retouches d'images et de vidéos deviennent de plus en plus puissants et de plus en plus simples à utiliser, ce qui permet aux contrefacteurs de produire des images falsifiées d'une grande qualité. L'authenticité de ces médias ne peut donc plus être prise pour acquise. Récemment, de nouvelles régulations visant à lutter contre le blanchiment d'argent ont vu le jour. Ces ré
Style APA, Harvard, Vancouver, ISO itp.
5

Iacovone, Michael Dax. "Memories We Forget." VCU Scholars Compass, 2005. http://hdl.handle.net/10156/1875.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Koch, Frank Henry Jr. "A Comparison of Digital Vegetation Mapping and Image Orthorectification Methods Using Aerial Photography of Valley Forge National Historical Park." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010417-180334.

Pełny tekst źródła
Streszczenie:
<p>In recent years, mapping software utilizing scanned?or ?softcopy??aerial photographs has become widely available. Using scanned photos of Valley Forge (PA) National Historical Park, I explored some of the latest tools for image processing and computer-based vegetation mapping. My primary objective was to compare different approaches for their efficiency and accuracy. In keeping with the USGS-NPS Vegetation Mapping Program protocol, I classified the park?s vegetation according to The Nature Conservancy?s National Vegetation Classification System (NVCS).<p>Initially, I scanned forty-nine 1:60
Style APA, Harvard, Vancouver, ISO itp.
7

Natour, Jamal, and Rewa Leila Anabtawi. "To download a movie or to buy fake branded clothes? : a study of consumers’ attitudes towards counterfeited and pirated products." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-9797.

Pełny tekst źródła
Streszczenie:
Purchasing counterfeited luxury products and downloading pirated items have becomemore common nowadays. Fashion and IT industries are affected negatively by consumers’supportive attitude towards piracy and counterfeits. Many luxury branded companies havetheir exclusive brand names stolen by counterfeits producers. Likewise producers ofcomputer software, music, and movies are affected by individuals who download/streamtheir items for free. Consumers’ attitudes towards counterfeiting and piracy are importantto examine as to understand their acceptance and rejection towards counterfeits and pirac
Style APA, Harvard, Vancouver, ISO itp.
8

Andersson, Elsa, Moa Strömland, and Catherine Quassdorf. "Microinteractions: Don’t forget to raise your hand! : A qualitative study concerning microinteractions in digital meeting platforms and the impact they have on workflow efficiencies in the creative industry." Thesis, Jönköping University, JTH, Avdelningen för datateknik och informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-53487.

Pełny tekst źródła
Streszczenie:
This research paper studies the extent of how microinteractions are utilized in Microsoft Teams and the impact that they have on workflow efficiencies, specifically in the creative industry. In a novel time where Covid-19 virus has increased the demand of digital platforms, the importance of research within remote meeting utilization, and the interaction possibilities within, is of utter importance. Also, since we are missing out on the spontaneous interactions that occur when meeting face-to-face, the microinteractions within digital meeting platforms now carry a heavier weight when interacti
Style APA, Harvard, Vancouver, ISO itp.
9

Abecidan, Rony. "Stratégies d'apprentissage robustes pour la détection de manipulation d'images." Electronic Thesis or Diss., Centrale Lille Institut, 2024. http://www.theses.fr/2024CLIL0025.

Pełny tekst źródła
Streszczenie:
Aujourd'hui, la manipulation d'images à des fins non éthiques est courante, notamment sur les réseaux sociaux et dans la publicité. Les utilisateurs malveillants peuvent par exemple créer des images synthétiques convaincantes pour tromper le public ou dissimuler des messages dans des images numériques, posant des risques pour la sécurité nationale. Les chercheurs en analyse forensique d'image travaillent donc avec les forces de l'ordre pour détecter ces manipulations. Les méthodes d'analyse forensique les plus avancées utilisent notamment des réseaux neuronaux convolutifs pour les détecter. Ce
Style APA, Harvard, Vancouver, ISO itp.
10

Chen, Biing-Jang, and 陳炳彰. "Time-Stamped Digital Signatures against Forgery." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/23265863679022155270.

Pełny tekst źródła
Streszczenie:
碩士<br>朝陽大學<br>資訊管理系碩士班<br>87<br>While a digital signature was generated, the signer merely used his own secret key to sign a document. Later, the verifier used the signer's public key to authenticate the truthfulness and the identity of the signature's owner. But the signer could deny the signature by declaring that he lost his secret key. Owing to the problem of repudiation, some extra information must be appended into the signature to strength the undeniability. A new digital signature scheme attached a time-stamp which is fair and unchangeable is proposed in this thesis. According to the ad
Style APA, Harvard, Vancouver, ISO itp.
11

Yang, Ging-Chu, and 楊青矗. "Copy-Move Forgery Detection in Digital Image." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/7jw5nc.

Pełny tekst źródła
Streszczenie:
碩士<br>佛光大學<br>資訊學系<br>97<br>Digital images are easy to be tempered and edited due to availability of image editing software. Generally, image tampering protection can be divided into two kinds: (1) active protection: The original digital image is embedded with a watermark which can be used to detect tampering. (2) passive protection: it does not need any digital watermark or signature but relies on the image processing technology to detect the forgery. Passive approaches have not yet been thoroughly researched. The most common ways to temper a digital image is copy-paste forgery which is used
Style APA, Harvard, Vancouver, ISO itp.
12

Elrefaei, Roya M. m., and 羅雅. "Detecting Smile and Forgery in Digital Color Images." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/64467847089017165412.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>電信工程學研究所<br>97<br>This thesis proposes three techniques for digital image processing, in which we designed algorithms, enhanced techniques and came up with good results. There are open literature dealt with detecting human face expressions and most of them are done using neural network technique that means very time consuming. First chapter proposes a new simple and an efficient algorithm for smile detection in frontal face; in which it could be exploited as one unique function of camera. In our approach, the smile detection technique consists mainly of three steps used on segm
Style APA, Harvard, Vancouver, ISO itp.
13

Syu, Hao-Yu, and 徐浩淯. "Digital Image Forgery Detection Based on Gabor Magnitude." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/07067230632497323342.

Pełny tekst źródła
Streszczenie:
碩士<br>國立高雄海洋科技大學<br>電訊工程研究所<br>105<br>With advancement of media editing software, even people who are not image processing experts can easily alter digital images. Various methods of digital image forgery exist, such as image splicing, copy-move forgery, and image retouching. The most common method of tampering with a digital image is copy-move forgery, in which a part of an image is duplicated and used to substitute another part of the same image at a different location. In this thesis, we present an efficient and robust method to detect such artifacts. First, the tampered image is segmented
Style APA, Harvard, Vancouver, ISO itp.
14

Bakas, Jamimamul. "Compressed Multimedia Forgery Detection through Blind Digital Forensics." Thesis, 2022. http://ethesis.nitrkl.ac.in/10367/1/2022_PhD_JBakas_516CS6008_Compressed.pdf.

Pełny tekst źródła
Streszczenie:
In today’s cyber world, digital images and videos act as the most frequently transmitted information carriers. However, the present day easy availability of low–cost image and video processing software and desktop tools, having immense number of multimedia manipulating features, pose threat to the fidelity of digital multimedia data. Digital images and videos being the major sources of evidence towards faithfulness of any event for law enforcement across the world, as well as in media and broadcast industries, maintenance of their trustworthiness and reliability is a major challenge in today’s
Style APA, Harvard, Vancouver, ISO itp.
15

Malviya, Pankaj. "Digital Forensic Technique for Multiple Compression based JPEG Forgery." Thesis, 2015. http://ethesis.nitrkl.ac.in/6778/1/Digital__Malvia_2015.pdf.

Pełny tekst źródła
Streszczenie:
In today's digital world digital multimedia like, images, voice-notes and videos etc., are the major source of information/data exchange. The authenticity of these multimedia is greatly vital in the legitimate business, media world and broadcast industry. However, with enormous multiplication of ease, simple-to-utilize data manipulation tools and softwares lead to the faithfulness of digital images is in question. In our work, we propose a technique to identify digital forgery or tampering in JPEG (Joint Photographic Experts Group) images which are based on multiple compression factor. We are
Style APA, Harvard, Vancouver, ISO itp.
16

Shandilya, Meenal. "Detection of Geometric Transformations in Copy-Move Forgery of Digital Images." Thesis, 2015. http://ethesis.nitrkl.ac.in/7590/1/2015_MT_Detection_Shandila.pdf.

Pełny tekst źródła
Streszczenie:
Digital Forensics is a branch of forensic science which is related to cyber crime. It basically involves the detection, recovery and investigation of material found in digital devices. Digital images and videos plays most important role in digital forensics. They are the prime evidences of any crime scene. So the fidelity of the image is important. Digital images can be easily manipulated and edited with the help of image processing tools. Copy-move Forgery is the most primitive form of cyber attack on digital images. In Copy-move forgery a part of image (region) itself is copied and pasted in
Style APA, Harvard, Vancouver, ISO itp.
17

Prasad, S. "Signal Processing Algorithms For Digital Image Forensics." Thesis, 2008. http://hdl.handle.net/2005/655.

Pełny tekst źródła
Streszczenie:
Availability of digital cameras in various forms and user-friendly image editing softwares has enabled people to create and manipulate digital images easily. While image editing can be used for enhancing the quality of the images, it can also be used to tamper the images for malicious purposes. In this context, it is important to question the originality of digital images. Digital image forensics deals with the development of algorithms and systems to detect tampering in digital images. This thesis presents some simple algorithms which can be used to detect tampering in digital images. Out of
Style APA, Harvard, Vancouver, ISO itp.
18

Prasad, S. "Signal Processing Algorithms For Digital Image Forensics." Thesis, 2007. https://etd.iisc.ac.in/handle/2005/655.

Pełny tekst źródła
Streszczenie:
Availability of digital cameras in various forms and user-friendly image editing softwares has enabled people to create and manipulate digital images easily. While image editing can be used for enhancing the quality of the images, it can also be used to tamper the images for malicious purposes. In this context, it is important to question the originality of digital images. Digital image forensics deals with the development of algorithms and systems to detect tampering in digital images. This thesis presents some simple algorithms which can be used to detect tampering in digital images. Out of
Style APA, Harvard, Vancouver, ISO itp.
19

Chang-MingLee and 李昌明. "Passive Digital Video Forensic System Based on Spliced Forgery Features and Sensor Pattern Noise." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/94767444360121547280.

Pełny tekst źródła
Streszczenie:
碩士<br>國立成功大學<br>工程科學系碩博士班<br>98<br>In this research, a passive spliced forgery detection system for digital videos is proposed. The proposed system consists of four parts. The first one is feature vector extraction which generates the features of the frame. The feature vector contains the frame quality features, the moment features, the local frequency features, and the Markov features. The second one is to determine if the processed frame belongs to a suspected frame. After finish the second part, each frame is classified as a normal or suspected frame. The third part is firstly to take an ad
Style APA, Harvard, Vancouver, ISO itp.
20

YADAV, PRASHIT. "DETECTION OF COPY MORE FORGERY IN DIGITAL IMAGES USING AN OPTIMIZED BLOCK BASED APPROACH." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14922.

Pełny tekst źródła
Streszczenie:
Technology is growing exponentially and so does the sophistication of various imaging tools that makes it easier for a person to forge digital images. There are several types of forgeries which are done on images out of which Copy-Move is one of the most widely used. In this type of forgery a portion of an image is copied and pasted over to another portion to conceal some information. Several approaches have been developed so far to detect such kind of forgery. In the block based approach the image is divided into overlapping blocks and each block is matched against every other block for
Style APA, Harvard, Vancouver, ISO itp.
21

KUMAR, AKSHAT. "DETECTING DUPLICATE REGIONS IN DIGITAL IMAGES USING IMPROVED LOCALIZATION METHOD." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15630.

Pełny tekst źródła
Streszczenie:
Now days, the uses of digital images has increased and so has the forgery mechanisms. Copy-Move forgery is one of the types of image forgery. In the case of copy-move forgery one small region of image is replaced with another region within the same image. Many algorithms already developed for detecting copy-move regions but the major problem for most of the algorithms are localization of duplicate regions within same image after detecting copy-move part. Here we present an efficient approach for detecting duplicate regions in a digital image. In our method, we have used PCA (Principal Componen
Style APA, Harvard, Vancouver, ISO itp.
22

"The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery." Master's thesis, 2015. http://hdl.handle.net/2286/R.I.29668.

Pełny tekst źródła
Streszczenie:
abstract: Splicing of digital images is a powerful form of tampering which transports regions of an image to create a composite image. When used as an artistic tool, this practice is harmless but when these composite images can be used to create political associations or are submitted as evidence in the judicial system they become more impactful. In these cases, distinction between an authentic image and a tampered image can become important. Many proposed approaches to image splicing detection follow the model of extracting features from an authentic and tampered dataset and then classifyin
Style APA, Harvard, Vancouver, ISO itp.
23

(6630773), Emily R. Bartusiak. "An Adversarial Approach to Spliced Forgery Detection and Localization in Satellite Imagery." Thesis, 2019.

Znajdź pełny tekst źródła
Streszczenie:
The widespread availability of image editing tools and improvements in image processing techniques make image manipulation feasible for the general population. Oftentimes, easy-to-use yet sophisticated image editing tools produce results that contain modifications imperceptible to the human observer. Distribution of forged images can have drastic ramifications, especially when coupled with the speed and vastness of the Internet. Therefore, verifying image integrity poses an immense and important challenge to the digital forensic community. Satellite images specifically can be modified in a
Style APA, Harvard, Vancouver, ISO itp.
24

Yoshida, Kayo. "Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem." Thesis, 2009. http://hdl.handle.net/10012/4219.

Pełny tekst źródła
Streszczenie:
The Boneh-Boyen signature scheme is a short signature scheme which is provably secure in the standard model under the q-Strong Diffie-Hellman (SDH) assumption. The primary objective of this thesis is to examine the relationship between the Boneh-Boyen signature scheme and SDH. The secondary objective is to survey surrounding topics such as the generic group model, related signature schemes, intractability assumptions, and the relationship to identity-based encryption (IBE) schemes. Along these lines, we analyze the plausibility of the SDH assumption using the generic bilinear group model.
Style APA, Harvard, Vancouver, ISO itp.
25

Dillon, Andrew, and Sally Maynard. ""Don't forget to put the cat out" - or why collaborative authoring software and everyday writing pass one another by." 1995. http://hdl.handle.net/10150/105975.

Pełny tekst źródła
Streszczenie:
This item is not the definitive copy. Please use the following citation when referencing this material: Dillon, A. and Maynard, S. (1995) Don't forget to put the cat out! Why collaborative hypermedia and everyday writing pass one another by. The New Review of Hypermedia and Multimedia: Applications and Research, 1, 135-153. Abstract: Hypermedia technology is seen as offering potentially innovative support for the process of writing as much as information access and reading. However, authoring enviroments to date have had little impact in the realâ world production of text. One possible
Style APA, Harvard, Vancouver, ISO itp.
26

Lin, Po-hsu, and 林柏旭. "A study of the impact of Digital Technology to the realism of Journalism The case of Faked News and Forged Photography." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/np9t37.

Pełny tekst źródła
Streszczenie:
碩士<br>南華大學<br>傳播管理學研究所<br>95<br>The study analyzes the impact of digital technology to the traditional news production and the problematic concept of realism. With case studies of five faked reports--two of them are faked news resources from the internet, and three of them are digitally fabricated photographs, the study seeks to address the following two questions: What characterizes “faked reports” in the age of digitalized news production? And when examining these five cases according to the standard of objectivity, impartiality, and realism in traditional journalism, what are the loopholes
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!